The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
Auto Bounce Messages Management Details »» | ||||||||||||||||||||||||||
Brought to you by Syrian Medical Society & Milado Introduction: quoted from wikipedia with adaptation. Any long-lived forums is going to eventually contain addresses that can't be reached. Addresses that were once valid can become unusable because the person receiving the mail there has switched to a different provider (possibly as a result of changing jobs or schools). In another scenario, the address may still exist but be abandoned, with unread mail accumulating until there is not enough room left to accept any more. The presence of invalid addresses in the forums results in bounce messages being sent to the owner of the forums. If the mailing list is small, the owner can read the bounce messages and manually remove the invalid addresses from the forums. With a larger forums, this is a tedious, unpleasant job, so it is desirable to automate the process. In short: This hack automates handling of the bounce messages. Requirements:
Features:
I believe there is no need to delete the user subscriptions. because once a user got moved to the "Awaiting email confirmation" usergroup, he / she won't be sent any additional emails. How Does It Work? You have your catch-all email box, that will be used to receive the bounce messages. Of course we must have a POP3 access to retrieve messages from it. Let's suppose that your catch-all email address is bounces@yourdomain.ext After we set it properly, it will work as described below: 1) By default: On every single message being sent, vBulletin generates a unique Message-ID for it, example: Code:
Message-ID: <20080608103128.551e45224330@www.yourdomain.ext> PHP Code:
Code:
Message-ID: <20080608103128.551e45224330@www.yourdomain.ext> Code:
bounces@yourdomain.ext Code:
bounce20080608103128.551e45224330@yourdomain.ext So every message will be recorded in the database. each record consists of : toemail, bounceemail (the one we generated) and the timeline (for sake of pruning.) 2) A cron job runs every ten minutes to retrieve bounce messages from the catch-all email box. If the message sent to something similar to the bounceemail we generate, it will update the appropriate record in the database to be marked as returned. and delete the message from the POP3 server. 3) Another cron job runs once an hour, reads the bounced emails from the database and moves their owners to an usergroup which is determined by the admin from the settings. 4) Yet another cron job, will run once daily, to prune the records that haven't returned bounces in a settable period of time (30 days by default). Did I miss something here? Yeh, right. this is the first beta, I believe the core is almost done. but there may be some functions to add, and few things to tweak. I'm all opened to your suggestions. So feel free to dream! Installation & Upgrade: 1) Have your own catch-all email with POP3 access. I don't have the time to write a how-to article for this please do it yourself, you'll be luckily if someone explains it to others. 2) Upload files from the /upload/ folder in the package to their appropriate locations. 3) Install the xml product file: product-bounce_management.xml, of course choose yes to override when upgrading. 4) Refresh your AdminCP. you will see at the navigation side, above the Users tab, a new tab called "Bounces Management" 5) At that tab, go to the settings: Set your POP server settings, your "Bounce Usergroup" and "Exclude Usergroups". 6) At the same tab you will find a link called "Test POP Connection" to test the connection with your POP server. 7) Enjoy! Click install to let me enjoy too! Settings: Attachment 81933 Know issues: - In rare situations, a vacation reply may returned via the bounce path rather than the webmaster path. Change log:
The product marked as not supported, but that doesn't mean you won't see me again here. So please try to help each other. License & Credits: 1) I use the pop3_class from Manuel Lemos, Copyright (c) 1999-2005 to retrieve messages from the POP server, so all the credits regarding this go to him. Here is his license (included in the package too): Quote:
Click install to receive updates. You like it? nominate it. I'm looking forward to enter the Mod Of The Month competition. I depend on you. Also donations will help me to improve the product. :up: Show Your Support
|
Comments |
#132
|
|||
|
|||
Quote:
|
#133
|
||||
|
||||
I'd throw in US$50. I deal with bounces daily and hate it.
|
#134
|
||||
|
||||
Will continue beta 2 as soon as I have time.
|
#135
|
||||
|
||||
Uninstalled
it stop the all mail function of the forum so members waiting email activation not activated |
#136
|
|||
|
|||
Just a warning before anyone else adds this
It automatically placed a link in the footer of your forum, which when clicked, goes to the Syrian medical society (or something), the webpage has a trojan virus on it. |
#137
|
||||
|
||||
1- Everyone knows that this hack adds credits in the footer, and is free to remove them.
2- How can you make such an accusation? My website (Syrian Medical Society) is reputable website, and have never been as a distribution for malwares. Here are what google says about it: safe browsing unmask parasites says: This page seems to be <suspicious> because of the following line: HTML Code:
document.write('<marquee onmouseover="this.stop()" onmouseout="this.start()" direction="right" scrollamount="3" scrolldelay="20" class="smallfont">آخر ما نُشر لدينا ?? <a href="http://www.syrianmeds.net/forum/topic12165-newpost.html" target="_blank" class="smallfont">الفيزيولوجيا المرضية</a> ?? <a href="http://www.syrianmeds.net/forum/topic12162-newpost.html" target="_blank" class="smallfont">جراحة 3</a> ?? <a href="http://www.syrianmeds.net/forum/topic12160-newpost.html" target="_blank" class="smallfont">دوري علامات الطب سنة تانية</a> ?? <a href="http://www.syrianmeds.net/forum/topic12159-newpost.html" target="_blank" class="smallfont">داخلية 4</a> ?? <a href="http://www.syrianmeds.net/forum/topic12158-newpost.html" target="_blank" class="smallfont">داخلية 2</a> ?? <a href="http://www.syrianmeds.net/forum/topic12157-newpost.html" target="_blank" class="smallfont">التشريح المرضي العام</a> ?? <a href="http://www.syrianmeds.net/forum/topic12156-newpost.html" target="_blank" class="smallfont">أدوية 1</a> ?? <a href="http://www.syrianmeds.net/forum/topic12155-newpost.html" target="_blank" class="smallfont">تشريح 2</a> ?? <a href="http://www.syrianmeds.net/forum/topic12149-newpost.html" target="_blank" class="smallfont">الصحة تطلب من الصيادلة سحب عدد من المستحضرات الدوائية لمخالفتها للمواصفات</a> ?? <a href="http://www.syrianmeds.net/forum/topic12147-newpost.html" target="_blank" class="smallfont">ألم شديد في القدم</a></marquee>'); So please, before you make such an accusation, have the evidence that supports your claim. |
#138
|
||||
|
||||
The only mallware that there is, is your virus scanner. For some reason several virus scanners/ link scanners report a lot of sites, that have no problem whatsoever, as containing mallware, virus or troyan horses. This happened to a site of mine that was coded in prolog in 1998 and therefore contained exotic code antivira could not understand and therefor antivira classified it as a troyan horse. I assure you that it was not. There are a mass of examples to be found on the net. Antivirus programs are simply not fit to scan websites for 'suspect' scripts.
|
#139
|
||||
|
||||
Statistics!
|
#140
|
|||
|
|||
Stats? That cool, this feature will be released in next update?
Any ETA, Milad? Thanks! |
#141
|
|||
|
|||
nice! any more word on this feature or any other updates on this mod? It is truly a fantastic modification which I hope to see continued!
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|