Smart Network Data Services Windows Live & MSN Hotmail Postmaster Services
|
|
|
- Abraham Wells
- 9 years ago
- Views:
Transcription
1 Smart Network Data Services Windows Live & MSN Hotmail Postmaster Services Eliot Gillum Development Manager, Hotmail and Windows Live Mail NANOG 37 June 7, 2006
2 Agenda Postmaster Services SNDS Problem Goal Today Tomorrow Motivation Feedback / Dialog Questions / Discussion
3 Postmaster Services Service Postmaster Sender ID Junk Mail Reporting Program (JMRP) Smart Network Data Services (SNDS) Support Benefits Starting point for any questions related to delivering communications to MSN Hotmail and Windows Live consumers Simple authentication technology that has been adopted by thousands of organizations around the world Leverages SPF records which have been published by over 1M domains in the world Virtually eliminates false positives on large sources of legitimate mail ~85% reduction of false negatives on spoofed mail Conveys messages reported by Hotmail and Windows Live accounts Helps keep internet clean from those who would abuse ISP mail servers Provides feedback, potentially to be used for opt-out processes, to senders Free service that provides data on mail volume, spam, complaints, etc. Easy online registration and instant access to data Innovative way to make the Internet a better place! Self-help and escalation paths for senders having deliverability issues
4 Smart Network Data Services SNDS postmaster.msn.com/snds
5 Problem Bad stuff on the Internet: spam, phishing, zombies, ID theft, DoS Result: customers unhappy Solution #1: Try to stop bad things just before they hit customer Result: progress, learnings Solution #2: Apply learnings upstream Result: game changing progress! #2:#1 is too low
6 ISP-centric Efficiency Solution #1 Solution #2 ISP ISP ISP ISP ISP ISP ISP ISP n ISPs have n-1 problems O(n 2 ) n ISPs have 1 problem O(n)
7 Crux Today people & ISPs are measured by how much bad stuff they receive As opposed to what they originate Similarity to the health insurance industry "ISPs should monitor their networks for sources of spam LEAVING their network" - Charles Stiles, AOL, NANOG32 Hutzler to Levine on spam ( The solution is taking responsibility for networks being sources of spam What do we have to do to persuade networks that dealing with their own spam problem, even at significant short term cost, is better for the net and themselves than limping along as we do now? Machines maintained by home/small-business users are an important aspect of global Internet health David Moore, CAIDA, USENIX Sec, Aug 02
8 7 Step Program 1. Recognize the problem 2. Believe that someone can help 3. Decide to do something 8. Make an inventory of those harmed 9. Make amends to them 10. Continue to inventory 12. Tell others about the program SNDS Me You SNDS Tools SNDS You
9 What is SNDS? Website offering free instant access to rich data on activity coming from your IP space as seen by Microsoft Data that correlates with Internet evils Informs ISP to enable local policy decisions Automated authorization mechanism Uses WHOIS and rdns Users are people not companies A force multiplier
10 SNDS Goal Provide information which enables ISPs to monitor for and remediate any undesired activity Qualitative and quantitative data Factual, actionable information about sent to us and, by extension, to the world in general No ISP left behind Stop problems upstream of the destination Evangelize virtues of doing so Bring TCR down to absolute minimum Make the Internet a better, safer place
11 We Have Data Windows Live Mail / MSN Hotmail is a spam and spoofing target 240+ million accounts in over 220 countries/territories Many kinds of data 4 billion inbound mails/day 90/10 spam/ham by filtering technologies User reports on: Spam Fraud Phishing Viruses Malware Reporting tools across Microsoft Windows Live / MSN Hotmail web UI Internet Explorer MSN Toolbar Outlook Express Live
12 Inbound Mail System Partner block lists SmartScreen Inbound Connection filter Brightmail User filters Safelists (Sender Score) Sender ID Connections Internal block lists Establish score User lists Trash Inbox Junk
13 SNDS Today
14 Today s Scenarios Illustrate magnitude and evidence of problem Additional resources Monitoring infrastructure Spam Enact port 25 blocking Justify classical blocks Enable reactive surgical blocks Work with the customer! Notify them Help them Motivate them
15 SNDS Stats 2500 users Mostly senders 67 Million IPs 10-20% of inbound mail & complaints Output drops by 57% on /24+ when monitored via SNDS
16 SNDS Tomorrow* Usability Signup by ASN Better support for upstream providers Access transfer Utility Programmatic access Data Virus-infected s Phishing HoneyMonkey Sample messages
17 Tomorrow s Scenarios Lowered Barrier to entry Recurring cost ISP types End-user Tier 1/2 monitoring tier 2/3 Directly attack more than just spam Virus s infected PCs, outbound virus filters Phishing/malware hosting take-downs
18 Safety Tools Stinger Nessus Windows Update Windows Defender Malicious Software Removal Tool Windows Live Safety Center Windows OneCare Phishing Filter Add-in for MSN Toolbar Also built into Internet Explorer 7
19 Safety Tools
20 Motivation Hypothesis: everyone benefits Customers Infected users get fixed Safer, cheaper, better Internet experience ISPs Solution #1 isn t solving the problem Altruistic is the new selfish Microsoft Only benefits if everyone else does
21 ISP Motivation Customers They re unhappy, unsafe They like people who fix that Be the hero Retain customers Win new ones Fixing has more benefit than bandaging Cost reductions Bandwidth Support Community NANOG?
22 Motivation Alternatives Industry scorecard Public recognition Public shame Logo ISP program Government: Legislation / Regulation [FTC Chairman Deborah Platt Majoras] emphasized the importance of information sharing Press Release, Oct 04
23 Business Case Industry attention at the ISP level is now concentrating on product marketing aspects of the Internet service model: Dependability, Integrity, Value-add Geoff Huston, APNIC, NANOG 35 Appeal to cost reduction and revenue generation Marketing: Safety makes customers happy Sales: Safety has revenue sharing potential Operations & Support: Safety reduces costs This is starting to happen Automatically Detecting, Isolating, and Cleaning Infected Hosts Eric Gauthier, Boston University, NANOG 30
24 Feedback Usability how easily can you work with it? Utility what are you able to accomplish? What s missing? Tools to aid customer remediation How do ISPs see cost vs. benefits? Costs, benefits, NANOG aggregation? How do we get to critical mass? [email protected]
25 Discussion How does SNDS fit into the larger ecosystem? Relationship to: SenderBase.org SCOMP / JMRP REACT Should / how do other ISPs provide this? Common schema, authorization, authentication Federation, delegation, aggregation Forum BoF? Track? NANOG? MAAWG? Mailing list: [email protected]
26 Conclusion Postmaster: Start page: JMRP, support, Sender ID, and SNDS: Try it! Tell your friends Tell your boss Stay tuned Tell us what happened! What comes next?
27 Authorization Mechanism Based on being able to receive mail at a trusted address Address determination Reverse DNS If all the IPs in the range are in the same domain, then trust the standard mailboxes, postmaster and abuse, at that domain Domain determined by largest known TLD plus one more hostname component Range must be less than /23 in size WHOIS Trust any addresses that appear in the most specific WHOIS record for the range
28 SenderID Key Results SIDF with reputation improves filtering Legitimate, SIDF-compliant mail realizes a substantial reduction in false-positives Improves deliverability and resulting open rates High volume good senders who publish, their false positives has essentially dropped to zero False negatives on fail (implying spoofing) is ~85% lower than a random sampling of non-sidf mail Improving brand and customer protection Business value, improving deliverability while reducing false positives and false negatives with reputation
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
The What, Why, and How of Email Authentication
The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
DMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125
Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing [email protected] (781) 290-5714 www.twitter.com/pinpointe
Email Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
Protect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path
Knowledge Guide: Deliverability Your Reputation Holds the Key to Deliverability virtualroi May 2009 by: Return Path Your Reputation Holds the Key to Deliverability Twenty percent of legitimate email never
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Top 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue.
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Product Description In order to provide the best possible deliverability tool set, Eloqua has
Spreading the Word: Raising Awareness and Funds with Email. Presented by: Alec Stern, VP, Constant Contact
Spreading the Word: Raising Awareness and Funds with Email Presented by: Alec Stern, VP, Constant Contact Agenda Section 1: Email 101 Section 2: Getting Started Section 3: Getting Your Email Delivered
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
A New Way For Emailers To Defend Themselves Against Email Fraud
June 27, 2012 Defining DMARC A New Way For Emailers To Defend Themselves Against Email Fraud by Shar VanBoskirk with Sarah Glass and Elizabeth Komar Why Read This Report Hundreds of brands are hijacked
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
DST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Smart E-Marketer s Guide
30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step
The Top 10 Reasons You Need an Email Marketing Service. Email Marketing from Constant Contact
Email Marketing from Constant Contact The Top 10 Reasons You Need an Email Marketing Service Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com Email marketing
Deliverability Best Practices by Tamara Gielen
Deliverability Best Practices by Tamara Gielen Hello, my name is Tamara Gielen Blogger Community manager Speaker Independent consultant Trainer Based in Belgium 2010 Tamara Gielen BVBA all rights reserved
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
INinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability
Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Introduction It s estimated that 70%* of all email is spam - not just unwelcome promotional messages, but phishing scams, hoaxes and
Quick Heal Exchange Protection 4.0
Quick Heal Exchange Protection 4.0 Customizable Spam Filter. Uninterrupted Antivirus Security. Product Highlights Built-in defense keeps your business communications and sensitive information secure from
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
How To Secure A Website With A Password Protected Login Process (Www.Siphone)
Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
How-To-Guide. Disney MP2009-1223
How-To-Guide The speed and efficiency of email marketing is at your fingertips with the Disney Online Post Office. Now you can send emails with content created by Disney and customized with your agency
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
Post-Send Vetting Techniques... 6 Methodology... 6
Messaging Anti-Abuse Working Group (MAAWG) Vetting Best Common Practices (BCP) November 2011 Introduction... 1 Why Vet?... 2 Pre-Send Vetting Techniques... 2 Corporate Entity Formation and History... 2
WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
Email Data Management Best Practices
Email Data Management Best Practices September 17, 2008 These Best Practices have been developed by the IAB Email Committee. About the IAB Email Committee: The Email Committee is dedicated to removing
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
Marketer s Field Guide to Gmail, Outlook.com, and Yahoo!
Marketer s Field Guide to Gmail,, and Yahoo! Thanks to better ways to filter and block spam, inboxes are nearly free of unwanted mail, but not without a price. According to past Return Path studies, permissioned
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
The Anatomy of Email Delivery
The Anatomy of Email Delivery Bill Pease, Chief Scientist Convio Outline Email Delivery Overview What is email deliverability? How does it vary across ISPs? Who is responsible for email delivery? What
5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment
Email Security.cloud Configuring DLP on to your email flow and applying security to your hosted email deployment Phil Walters Principal Learning Consultant, Technical Field Enablement Email Security.cloud
Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content
Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content The recent flurry of media coverage around identity theft and what is being called the new scam of phishing, in which online
Exchange Online Protection In-Depth
Exchange Online Protection In-Depth Mike Crowley Baseline Technologies Session Agenda Introduction to EOP Administration DMARC, SPF & DKIM Advanced Threat Protection EOP Deployment Tips Introduction to
Improve Email Deliverability: Tactics for Handling Complaints and Boosting Reputation. Sponsored by
Improve Email Deliverability: Tactics for Handling Complaints and Boosting Reputation Sponsored by Introductions Adam T. Sutton, Senior Reporter MarketingSherpa / MECLABS Primary Research @AdamTSutton
IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE
IronPort Plug-in for Outlook VERSION 1.8 ADMINISTRATOR GUIDE COPYRIGHT Copyright 2007 by IronPort Systems Inc. All rights reserved. Part Number: 421-0065B Revision Date: October 23, 2007 The IronPort logo,
Reputation Monitor User Guide
August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures
Enterprise Email Marketing: The 8 Essential Success Factors
Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
ITS Spam Filtering Service Quick Guide 2: Using the Quarantine
ITS Spam Filtering Service Quick Guide 2: Using the Quarantine The quarantine is where suspected spam messages are held on the ITS Spam Filtering server. In the graphic below, the quarantine window displays
This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability rating.
BLUEHORNET USER GUIDE EMAIL AUTHENTICATION AND DOMAIN MONITORING TOOLS This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
Mailrelay The best email marketing solution for your needs
Mailrelay The best email marketing solution for your needs The e-mail marketing has become one of the best techniques to reduce costs on the internet. This type of marketing has established itself as the
EXCHANGE ONLINE PROTECTION SPAM OVERVIEW. Tech Tips, Tricks and Tools by MessageOps
EXCHANGE ONLINE PROTECTION SPAM OVERVIEW Tech Tips, Tricks and Tools by MessageOps TABLE OF CONTENTS: OVERVIEW AND DOCUMENT INTENTION..3 TRANSPORT RULES..... 4 CONTENT FILTER... 12 MALWARE FILTER......15
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Email Deliverability: Optimizing Your Email Marketing Strategy. Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst
: Optimizing Your Email Marketing Strategy Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst Version 1.0.08 Table of Contents Table of Contents... 2 About this Document...
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
2014 Sender Score Benchmark Report
2014 Sender Score Benchmark Report SENDER SCORE: WHY REPUTATION MATTERS IN EMAIL MARKETING 55 SCORE Every email sender has a reputation, or Sender Score. A Sender Score is a proxy for mailbox providers
Service Launch Guide (US Customer) SEG Filtering
Secure Network Gateway / Secure E-Mail Gateway (SEG) Service Service Launch Guide Service Launch Guide (US Customer) SEG Filtering Overview The following information will guide you through the steps required
Internet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
