Introduction Header Body content Todo List. Analysis. Joe Huang Anti-Spam Team Cellopoint. February 21, Joe Huang Analysis 1 / 62

Size: px
Start display at page:

Download "Introduction Header Body content Todo List. Email Analysis. Joe Huang Anti-Spam Team Cellopoint. February 21, 2014. Joe Huang Email Analysis 1 / 62"

Transcription

1 Analysis Joe Huang Anti-Spam Team Cellopoint February 21, 2014 Joe Huang Analysis 1 / 62

2 Joe Huang Analysis 2 / 62

3 For spam filtering, we would like to study the content of an to find discriminative features from abnormal behavior malicious behavior The source of samples is drawn from long-term analysis (LA) data considered as the ground truth Joe Huang Analysis 3 / 62

4 Data Statistics Sabrina Chang manually classified s into ham and spam Table : Long-term analysis (LA) data statistics Type # s Avg. size (GB) ham spam Joe Huang Analysis 4 / 62

5 eml parser.py eml parser.py is a python program for content extraction Written by Georges Toth It can serve as an auxiliary tool Joe Huang Analysis 5 / 62

6 From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Analysis Joe Huang Analysis 6 / 62

7 Lengthy From From Bad references Multiple Recipients Character Transition in Subject EmptyDomain From fields are usually generated by clients from user settings Names or easily recognized titles Lengthy names are abnormal (more than seven words) Figure : Lengthy From in spam Figure : Lengthy From in ham Joe Huang Analysis 7 / 62

8 Statisitics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain The s with more than seven words in From fields Table : Lengthy From Type # s/total Percentage ham 7/ % spam 230/ % Joe Huang Analysis 8 / 62

9 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Number of words in the author name Words are separated with whitespaces Figure : Different words are in various colors Joe Huang Analysis 9 / 62

10 Multiple From From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Multiple senders in From field can be spam suspects Figure : Multiple senders in spam Joe Huang Analysis 10 / 62

11 Statisitics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain The number of s containing multiple senders in the From field Table : Multiple From Type # s/total Percentage ham 1/ % spam 69/ % Joe Huang Analysis 11 / 62

12 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Number of senders in the From field Figure : Different senders are in various colors Joe Huang Analysis 12 / 62

13 Bad References From Bad references Multiple Recipients Character Transition in Subject EmptyDomain References fields are used when the message is a part of threads RE: in subjects In the case above, References should appear. No distinction between hams and spams Joe Huang Analysis 13 / 62

14 Statisitics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Table : Mails with bad references in the whole sample Type # s/total Percentage ham 1797/ % spam 1068/ % Joe Huang Analysis 14 / 62

15 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Presence of RE: or Re: in subjects Presence of Reference fields in the header Joe Huang Analysis 15 / 62

16 Sample From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Figure : An has RE: in the subject but no References fields Figure : An doesn t have RE: in the subject but References fields exist Joe Huang Analysis 16 / 62

17 Multiple Recipients From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Some mails contain multiple recipients Spammers put recipients in a sorted manner with dictionary attack Figure : Sorted multiple recipients Joe Huang Analysis 17 / 62

18 From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Multiple Recipients (cont d) We take the sorted multiple recipients into consideration In hams, NYUST and NCKU contribute to most of the samples Joe Huang Analysis 18 / 62

19 Statisitics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Table : Multiple Recipients ( s containing multiple recipients w.r.t. the whole hams/spams) Type # s/total Percentage ham 2085/ % spam 2646/ % Table : Multiple Recipients ( s containing sorted multiple recipients w.r.t all the s containing multiple recipients (Percentage (1)) and all the s (Percentage (2)) Type # s/total Percentage (1) Percentage(2) ham 145/ % 1.25% spam 1136/ % 6.49% Joe Huang Analysis 19 / 62

20 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Number of recipients in the To field Indicator of ordering Joe Huang Analysis 20 / 62

21 Sample From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Figure : Ordered multiple recipients Figure : Non-ordered multiple recipients Joe Huang Analysis 21 / 62

22 From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Character Transition in Subject Spams tend to use text in various charsets This might leads to larger amount of transitions Figure : Multiple charset transition Joe Huang Analysis 22 / 62

23 Statistics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Count the most frequent five charsets and transition times Table : Top 5 charsets and transition times in ham Charset Frequency Transition Frequency BasicLatin CJKUnifiedIdeo Latin-1Supplement HalfFullwidthForm Hiragana Table : Top 5 charsets and transition times in spam Charset Frequency Transition Frequency BasicLatin CJKUnifiedIdeo Latin-1Supplement HangulSylb Cyrillic Joe Huang Analysis 23 / 62

24 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Break the subject into tokens w.r.t. different charsets Average length of tokens, number of tokens, std. of token lengths Figure : A subject consisting of tokens of multiple charsets Joe Huang Analysis 24 / 62

25 EmptyDomain From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Some spams might contain Resulted from bounce attack Figure : A header with EmptySender@EmptyDomain Joe Huang Analysis 25 / 62

26 Statistics From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Search for in the Receive field Table : EmptySender@EmptyDomain Type # mails/total Percentage ham 304/ % spam 1770/ % Joe Huang Analysis 26 / 62

27 Feature From Bad references Multiple Recipients Character Transition in Subject EmptyDomain Presence of Joe Huang Analysis 27 / 62

28 Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Font size, font family and color Some s tend to apply many font type, size and colors EDMs may also have contents in complicated font settings Joe Huang Analysis 28 / 62

29 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Occurrences of font-size, font-family and color in the body Table : font-size occurrence Type Avg. # Occurence ham spam Table : Average font-family occurrence Type Avg. # Occurence ham spam Table : Average color occurrence Type Avg. # Occurence Avg. # unique occurence ham spam Joe Huang Analysis 29 / 62

30 Feature Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Count the occurrences of font sizes, families and colors Unique and non-unique cases Joe Huang Analysis 30 / 62

31 Inconsistent Hyperlink Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Valid or benign hyperlinks usually appear with related label texts Some labels may be also hyperlinks but different from those in href These abnormal hyperlinks tend to mislead users Figure : URL text with inconsistent hyperlink Joe Huang Analysis 31 / 62

32 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Consider s with inconsistent hyperlinks Table : Inconsistent Hyperlink (INCSTHLINK) Type # s/total Percentage Total # links Avg. links/mail ham 68/ % spam 1023/ % Joe Huang Analysis 32 / 62

33 Feature Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Count the occurrences of inconsistent hyperlinks Joe Huang Analysis 33 / 62

34 Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Random strings in Received Host names usually appear after From in Received fields Some might be random strings Figure : Random string Figure : Invalid host name Joe Huang Analysis 34 / 62

35 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Strings with consonant/vowel ratio less than 2 are considered random Consider random host name and invalid host name separately Table : Random host name (RNDHNAME) Type # s/total Percentage Total # RNDHNAME Avg. #/mail ham 94/ % 94 1 spam 131/ % Table : Invalid host name (INVLDHNAME) Type # s/total Percentage Total # INVLDHNAME Avg. #/mail ham 631/ % spam 423/ % Joe Huang Analysis 35 / 62

36 Feature Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Presence of random strings in Received Joe Huang Analysis 36 / 62

37 Random strings in From Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment The From field usually contains the address of the message composser The user name in the address sometimes appears to be abnormal in spams Figure : Random string in an user name of an address Joe Huang Analysis 37 / 62

38 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Strings with consonant/vowel ratio less than 2.5 are considered random Table : Random user name in from (RNDUNAME) Type # s/total Percentage ham 574/ % spam 1777/ % Joe Huang Analysis 38 / 62

39 Statistics (cont d) Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Frequencies of alphabets is also counted Table : Alphabet frequencies in the user name of From field in hams (total: 17359) Alphabet Frequency Percentage Alphabet Frequency Percentage a % n % b % o % c % p % d % q % e % r % f % s % g % t % h % u % i % v % j % w % k % x % l % y % m % z % Joe Huang Analysis 39 / 62

40 Statistics (cont d) Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Frequencies of alphabets is also counted Table : Alphabet frequencies in the user name of From field in spams (total: 22457) Alphabet Frequency Percentage Alphabet Frequency Percentage a % n % b % o % c % p % d % q % e % r % f % s % g % t % h % u % i % v % j % w % k % x % l % y % m % z % Joe Huang Analysis 40 / 62

41 Statistics (cont d) Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Figure : Percentage of alphabet occurrences in user names of From Joe Huang Analysis 41 / 62

42 Feature Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Presence of random strings in From Joe Huang Analysis 42 / 62

43 Body Existence Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Some spams might contain empty body Empty parts should at least have information of themselves Joe Huang Analysis 43 / 62

44 Sample Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Figure : An with multipart message Figure : An with an empty body Joe Huang Analysis 44 / 62

45 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment An with empty body from which only one part consisting of whitespaces can be extracted Table : Body existence Type # mails/total Percentage ham 6/ % spam 29/ % Joe Huang Analysis 45 / 62

46 Attachment Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment s with HTML format often has pictures in the attachment Some spams might arrive with viruses files appearing as compressed files Joe Huang Analysis 46 / 62

47 Statistics Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Count the s containing attachments Table : Top 5 attachment extensions in ham Extension # Occurence jpg 3375 pdf 847 png 523 xls 520 gif 432 Table : Top 5 attachment extensions in spam Extension # Occurence zip 1598 jpg 1032 rar 371 jpeg 292 xlsx 185 Joe Huang Analysis 47 / 62

48 Statistics (cont d) Font size, family and color Inconsistent Hyperlink Random strings Body Existence Attachment Table : Statistics of ham # mail/total Percentage Max. # attachment Avg. # attachment 5309/ % Table : Statistics of spam # mail/total Percentage Max. # attachment Avg. # attachment 4670/ % Joe Huang Analysis 48 / 62

49 Bad X-Mailer Bad X-Mailer URL Address in From Domains in Received Some mail clients write in X-Mailer to promote their brands or to gain popularity This field may contain meaningless names or symbols in spams Figure : X-Mailer field in spam Figure : X-Mailer field in spam Figure : X-Mailer field in ham Joe Huang Analysis 49 / 62

50 Statisitics Bad X-Mailer URL Address in From Domains in Received We consider X-Mailer fields containing mail, microsoft, aol, bat and zimbra as good ones Table : X-Mailer Type # s/total Percentage ham 268/ % spam 1603/ % Joe Huang Analysis 50 / 62

51 URL Bad X-Mailer URL Address in From Domains in Received Spammers hide URLs in messages We study the sources of URLs in bodies Table : Total number of URLs in s Type # URLs ham spam Joe Huang Analysis 51 / 62

52 Bad X-Mailer URL Address in From Domains in Received Top 45 Hostnames for Spam - Part 1 Hostname Frequency clicks.att.com 1581 www208.americanexpress.com www2.bt.com 864 bt.custhelp.com Joe Huang Analysis 52 / 62

53 Bad X-Mailer URL Address in From Domains in Received Top 45 Hostnames for Spam - Part 2 Hostname Frequency shopping.windmill.com.tw 605 schemas.microsoft.com 604 ecom.wireless.att.com 488 hhvim.com 487 twedm203.com medictixk.com Joe Huang Analysis 53 / 62

54 Bad X-Mailer URL Address in From Domains in Received Top 45 Hostnames for Spam - Part 3 Hostname Frequency webs.com 364 bit.ly 289 webtwwebtw.phpforms.net contact.bellsouth.com 191 tw.mall.yahoo.com 185 x.co webs.com 172 herovajob.0catch.com 166 Joe Huang Analysis 54 / 62

55 Bad X-Mailer URL Address in From Domains in Received Top 45 Hostnames for Spam - Part 3 Hostname Frequency redirect.simba.taobao.com 165 0rz.tw askey.com.tw 117 s1.mailhunter.com.tw 102 twitter.com 93 bizcommunity.att.com 93 att.com 93 Joe Huang Analysis 55 / 62

56 Bad X-Mailer URL Address in From Domains in Received Top 45 Hostnames for Spam - Part 4 Hostname Frequency url.cn 86 ecom.wirelessatt.com 85 dwz.cn 80 whatsappcdn.appspot.com microsoft.com 74 schemas.openxmlformats.org 72 e.delta.com 72 goo.gl 65 Joe Huang Analysis 56 / 62

57 Bad X-Mailer URL Address in From Domains in Received Top 12 Hostnames for Ham - Part 1 Hostname Frequency schemas.microsoft.com microsoft.com schemas.openxmlformats.org 236 schema.org Joe Huang Analysis 57 / 62

58 Bad X-Mailer URL Address in From Domains in Received Top 12 Hostnames for Ham - Part 2 Hostname Frequency money.chinatimes.com Joe Huang Analysis 58 / 62

59 Address in From Bad X-Mailer URL Address in From Domains in Received Spammers tend to use anomaly addresses in From field Figure : An illegal address in from Joe Huang Analysis 59 / 62

60 Statistics Bad X-Mailer URL Address in From Domains in Received Top-level domains (TLD)s in the From field Table : Top 10 TLDs in ham TLDs in ham Frequency com 2376 tw 1579 vn 405 net 389 uk 243 cn 207 it 72 org 70 jp 54 eu 37 Table : Top 10 TLDs in spam TLDs in spam Frequency com 5344 tw 1738 ru 975 net 869 edu 629 org 279 ltd 245 uk 196 it 115 us 92 Joe Huang Analysis 60 / 62

61 Domains in Received Bad X-Mailer URL Address in From Domains in Received Received fields keep track of relay information Some invalid host names are contained in received fields Joe Huang Analysis 61 / 62

62 Statistics Bad X-Mailer URL Address in From Domains in Received Top-level domains (TLD)s in the From field Table : Top 10 TLDs in received of ham TLDs Frequency com tw 7142 net 2780 vn 1613 uk 493 cn 462 it 337 localdomain 328 local 278 group 224 Table : Top 10 TLDs in received of spam TLDs Frequency com tw net 2814 ru 1529 org 752 cn 712 edu 641 it 349 su 324 va 291 corp 171 Joe Huang Analysis 62 / 62

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER CONTENT FILTERS 2 Introduction Content- based filters are a key method for many ISPs and corporations to filter incoming email..

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Typical spam characteristics

Typical spam characteristics Typical spam characteristics How to effectively block spam and junk mail By Mike Spykerman CEO Red Earth Software This article discusses how spam messages can be distinguished from legitimate messages

More information

Using CSI s Web Messaging Email System: Imail URL: mail.csi.cuny.edu

Using CSI s Web Messaging Email System: Imail URL: mail.csi.cuny.edu Using CSI s Web Messaging Email System: Imail URL: mail.csi.cuny.edu Preferences: General User Settings Full Name: The name in the box is the name that will appear in the recipients from field. Reply to:

More information

PolyU Staff Email Service. Mailing List Management. User Guide

PolyU Staff Email Service. Mailing List Management. User Guide PolyU Staff Email Service Mailing List Management User Guide Version 2.0 Last Update: 28 August 2015 PolyU Email: www.polyu.edu.hk/email ITS HelpCentre Support: www.polyu.edu.hk/hots ITS HelpCentre Support

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

Composing a New Email Message

Composing a New Email Message Composing and Sending Email Zimbra V 7.2 2012-2013 School Year Composing a New Email Message Cc and Bcc Addresses Using HTML Editor Using Spell Check Adding an Attachment Attachment File Types Supported

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

FireEye Email Threat Prevention Cloud Evaluation

FireEye Email Threat Prevention Cloud Evaluation Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Table of Contents Executive Summary... 1 Introduction... 1 About

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

BULK MAIL CAMPAIGN RULES

BULK MAIL CAMPAIGN RULES BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT

More information

Web Portal User Guide. Version 6.0

Web Portal User Guide. Version 6.0 Web Portal User Guide Version 6.0 2013 Pitney Bowes Software Inc. All rights reserved. This document may contain confidential and proprietary information belonging to Pitney Bowes Inc. and/or its subsidiaries

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

SmartWhois Tutorial Domains and IP Addresses Demystified. Copyright 1996-2004 TamoSoft, Inc. All Rights Reserved.

SmartWhois Tutorial Domains and IP Addresses Demystified. Copyright 1996-2004 TamoSoft, Inc. All Rights Reserved. SmartWhois Tutorial Domains and IP Addresses Demystified Copyright 1996-2004 TamoSoft, Inc. All Rights Reserved. About This Tutorial Domains, IP addresses, host names, sites, and URLs have always been

More information

Image Based Spam: White Paper

Image Based Spam: White Paper The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

Email Marketing Do s and Don ts A Sprint Mail Whitepaper

Email Marketing Do s and Don ts A Sprint Mail Whitepaper Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Email Deliverability. Best Practices for Getting to the Inbox

Email Deliverability. Best Practices for Getting to the Inbox Email Deliverability Best Practices for Getting to the Inbox About Real Magnet Real Magnet develops digital marketing technologies with a focus on Email and Marketing Automation. Its full-featured platform

More information

The Essential Guide to HTML Email Design

The Essential Guide to HTML Email Design The Essential Guide to HTML Email Design Index Introduction... 3 Layout... 4 Best Practice HTML Email Example... 5 Images... 6 CSS (Cascading Style Sheets)... 7 Animation and Scripting... 8 How Spam Filters

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

Filtering Email with Microsoft Outlook

Filtering Email with Microsoft Outlook Filtering Email with Microsoft Outlook Microsoft Outlook is an email client that can retrieve and send email from various types of mail servers. It includes some advanced functionality that allows you

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

The Essential Guide to HTML Email Design

The Essential Guide to HTML Email Design The Essential Guide to HTML Email Design Emailmovers Limited, Pindar House, Thornburgh Road Scarborough, North Yorkshire, YO11 3UY Tel: 0845 226 7181 Fax: 0845 226 7183 Email: enquiries@emailmovers.com

More information

PROOFPOINT - EMAIL SPAM FILTER

PROOFPOINT - EMAIL SPAM FILTER 416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu support@anr.msu.edu PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...

More information

Zoho Campaigns Set-up for Administrators

Zoho Campaigns Set-up for Administrators Zoho Campaigns Set-up for Administrators Zoho Campaigns is a stand-alone application that integrates seamlessly with the CRM Campaigns module in Zoho CRM. Use Zoho Campaigns to build relationships with

More information

Filtering E-mail for Spam: Macintosh

Filtering E-mail for Spam: Macintosh Filtering E-mail for Spam: Macintosh Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What

More information

Microsoft Exchange 2003

Microsoft Exchange 2003 Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Outlook Web Access (OWA or WebMail) Frequently Asked Questions

Outlook Web Access (OWA or WebMail) Frequently Asked Questions Outlook Web Access (OWA or WebMail) Frequently Asked Questions If you are a part-time staff member, adjunct faculty member, or Villanova student, you will access your Villanova email using a program called

More information

Click Home > Junk > Not Junk.

Click Home > Junk > Not Junk. Office 365 (Outlook 2013) Overview of the Junk Email Filter No one likes spam or junk email. The Outlook 2013 Junk Email Filter doesn t stop delivery of junk email messages, but does the next best thing

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

Anti Spamming Techniques

Anti Spamming Techniques Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods

More information

CARA v3.5 Sept 2013 Major new features. Set your users free

CARA v3.5 Sept 2013 Major new features. Set your users free CARA v3.5 Sept 2013 Major new features Set your users free What is CARA CARA is an ergonomically designed, fast, web user interface and business rules engine, currently released for the following platforms:

More information

Securepoint Security Systems

Securepoint Security Systems HowTo: Configuration of the spam filter Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration of the spam filter with the Securepoint Security Manager... 3 2 Spam filter configuration

More information

Policy Patrol 7 Upgrade Guide

Policy Patrol 7 Upgrade Guide Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

STX Beacon User Guide Marke4ng

STX Beacon User Guide Marke4ng STX Beacon User Guide Marke4ng 3 Promotions 4 Marketing Email 9 Marketing Sets: Email Output 9 Marketing Reports 10 Email Activity 11 Marketing: Avoiding SPAM Filters Table of Contents 2 Main Menu: Marketing

More information

escan Anti-Spam White Paper

escan Anti-Spam White Paper escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10 Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk

More information

Thexyz Premium Webmail

Thexyz Premium Webmail Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,

More information

Personal Dashboard User Guide

Personal Dashboard User Guide Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

Quick Start Policy Patrol Spam Filter 9

Quick Start Policy Patrol Spam Filter 9 Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

NSEC3 Hash Breaking. GPU-based. Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis IEEE NCA 2014. <matthaeus.wander@uni-due.

NSEC3 Hash Breaking. GPU-based. Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis IEEE NCA 2014. <matthaeus.wander@uni-due. GPU-based NSEC3 Hash Breaking Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis IEEE NCA 2014 Cambridge, August 22, 2014 NSEC3 FUNDAMENTALS Matthäus Wander

More information

How to create an Email

How to create an Email How to create an Email Don't share mail You can set the mailbox not to be shared individually. The first thing to do after launching the Send mail screen is to select whether to share or not to share the

More information

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel

SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Technical Information www.jovian.ca

Technical Information www.jovian.ca Technical Information www.jovian.ca Europa is a fully integrated Anti Spam & Email Appliance that offers 4 feature rich Services: > Anti Spam / Anti Virus > Email Redundancy > Email Service > Personalized

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR

OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR FIGHTING SPAM WE ALL KNOW HOW BAD SPAM HAS BECOME: TENS,

More information

Fraud and Phishing Scam Response Arrangements in Brazil

Fraud and Phishing Scam Response Arrangements in Brazil Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves mhp@cert.br Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Administration Guide Revision E. Account Management. For SaaS Email and Web Security

Administration Guide Revision E. Account Management. For SaaS Email and Web Security Administration Guide Revision E Account Management COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Filtering E-mail for Spam: PC

Filtering E-mail for Spam: PC Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Public FAQ Version: 25 Stand: 29.02.2016

Public FAQ Version: 25 Stand: 29.02.2016 Public FAQ Version: 25 Stand: 29.02.2016 Here you can find FAQs related to SecurePIM, SecurePIM Enterprise and SecurePIM Government. General /Allgemeines 29.02.2016 2/18 General On which devices and operating

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information

Caldes CM2: Marketing Emails Support Document v1.12

Caldes CM2: Marketing Emails Support Document v1.12 Caldes CM2: Marketing Emails Support Document v1.12 Caldes Enterprise software can be used to send out marketing email. Due to the nature of these being bespoke designs, Caldes make a one off charge to

More information

Email Advertising. Guidelines and Rate Card

Email Advertising. Guidelines and Rate Card Email Advertising Guidelines and Rate Card 2015 EmailCampaign CAAVIC has two types of email campaigns available: 1. Classified Campaign 2. Dedicated Campaign 1. Classified Campaign These ads are sent as

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

Messaging Firewall. W h i t e p a p e r. w w w. c m s c o n n e c t. c o m

Messaging Firewall. W h i t e p a p e r. w w w. c m s c o n n e c t. c o m Messaging Firewall W h i t e p a p e r w w w. c m s c o n n e c t. c o m Introduction Well, there's egg and bacon; egg sausage and bacon; egg and spam; egg bacon and spam; egg bacon sausage and spam;

More information

Searching your Archive in Outlook (Normal)

Searching your Archive in Outlook (Normal) Searching your Archive in Outlook (Normal) 1. View the Archive Add in toolbar. In Outlook 2007, the toolbar displays below the standard Outlook toolbars. In Outlook 2010, select the McAfee tab. 2. In the

More information

Adding ECA Marketing to your safe-senders list

Adding ECA Marketing to your safe-senders list Adding ECA Marketing to your safe-senders list If your email provider is not listed below or your email is managed by your company you will need to contact your system administrator. If you have updates

More information

procmail and SpamAssassin

procmail and SpamAssassin procmail and SpamAssassin UCLA Linux User Group, February 2004 Ben Clifford benc@linux.ucla.edu procmailandspamassassin p.1 Outline Two related themes: procmail Filtering mail SpamAssassin Detecting spam

More information

The Essential Email Marketing Glossary

The Essential Email Marketing Glossary By Ryan P. M. Allis ASP - Application Service Provider. ASP s provide internet based software. Access - Database software. Part of the Microsoft Office Suite. Organizations often store customer data in

More information

Achieve more with less

Achieve more with less Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering

More information

OR Filter 3.2 Manual. Draft. Copyright 2003, Martijn Jongen. All Rights Reserved Version : 0.2 01-11-2003 Ref. nr. : MhJ/2003103101 By : M.

OR Filter 3.2 Manual. Draft. Copyright 2003, Martijn Jongen. All Rights Reserved Version : 0.2 01-11-2003 Ref. nr. : MhJ/2003103101 By : M. ! Copyright 2003, Martijn Jongen. All Rights Reserved 01-11-2003 Ref. nr. : MhJ/2003103101 By : M. Jongen DOCUMENT COVER SHEET Project: Document: Reference number: Manual MhJ/2003103101 Version Date Description

More information

Spam Manager. User Guide

Spam Manager. User Guide Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Managing Junk E-mail Folder in Outlook 2010. This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010.

Managing Junk E-mail Folder in Outlook 2010. This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010. Ready Reference 041013 Introduction Managing Junk E-mail Folder in Outlook 2010 This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010. Manual Filtering of

More information

eprism Email Security Suite

eprism Email Security Suite V8.4 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Logging In From your Web browser, enter the GLOBE URL: https://bms.activemediaonline.net/bms/

Logging In From your Web browser, enter the GLOBE URL: https://bms.activemediaonline.net/bms/ About GLOBE Global Library of Brand Elements GLOBE is a digital asset and content management system. GLOBE serves as the central repository for all brand-related marketing materials. What is an asset?

More information

SMX. Secure email exchange. Powerful and Simple-to-Manage.

SMX. Secure email exchange. Powerful and Simple-to-Manage. Innovative secure email gateway product that has an Anti-Spam with state-of-the-art heuristic analysis, a built-in Antivirus, sophisticated Anti-Phishing and an advanced Data Loss Prevention Secure email

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

On Attacking Statistical Spam Filters

On Attacking Statistical Spam Filters On Attacking Statistical Spam Filters Gregory L. Wittel and S. Felix Wu Department of Computer Science University of California, Davis One Shields Avenue, Davis, CA 95616 USA Paper review by Deepak Chinavle

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

USAGE TIPS IMPROVING THE EFFICIENCY OF THE SPAM FILTER

USAGE TIPS IMPROVING THE EFFICIENCY OF THE SPAM FILTER USAGE TIPS IMPROVING THE EFFICIENCY OF THE SPAM FILTER Introduction For all Business Domain hosting services, Adam Internet provides the ability to add SPAM and VIRUS filtering. You can refer to our Usage

More information

How to Use the KartHost Kloud Mail Service

How to Use the KartHost Kloud Mail Service USING LIVE QUARANTINE SETTING UP YOUR ACCOUNT YOU WILL ONLY BE USING THIS SERVICE IF YOU ARE STILL USING Shared Web Hosting Email. If you are Using KartHost Kloud Mail you will have no need for this service.

More information

Avira Managed Email Security (AMES) User Guide

Avira Managed Email Security (AMES) User Guide Avira Managed Email Security (AMES) User Guide Table of Contents Table of Contents 1. Product information... 4 1.1 Functionality................................................................4 1.2 Licensing

More information

The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security

The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long

More information

Distributor Control Center Private Label/Channel Administrators

Distributor Control Center Private Label/Channel Administrators March 13, 2014 Distributor Control Center Private Label/Channel Administrators Version 2.6.3 Everyone.net Table of Contents Distributor Control Center... 1 1 The Distributor Control Center... 4 1.1 Introduction...

More information

Email Deliverability Best Practices

Email Deliverability Best Practices Email Deliverability Best Practices Prepared by Email Deliverability Services December 2011 Email Deliverability Best Practices Table of Contents Summary... 1 Creative Best Practices... 2 Subject Line

More information

Reading and Writing email in Chinese

Reading and Writing email in Chinese Reading and Writing email in Chinese First of all, make sure your computer is enabled for displaying Chinese. See other documents on Setting Up Chinese IME (Input Method Environment) in Windows for details.

More information

How To Prevent Spam From Being Filtered Out Of Your Email Program

How To Prevent Spam From Being Filtered Out Of Your Email Program Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons

More information

Evaluation of Bayesian Spam Filter and SVM Spam Filter

Evaluation of Bayesian Spam Filter and SVM Spam Filter Evaluation of Bayesian Spam Filter and SVM Spam Filter Ayahiko Niimi, Hirofumi Inomata, Masaki Miyamoto and Osamu Konishi School of Systems Information Science, Future University-Hakodate 116 2 Kamedanakano-cho,

More information