Detecting spam using social networking concepts Honours Project COMP4905 Carleton University Terrence Chiu
|
|
|
- Charlotte Goodman
- 10 years ago
- Views:
Transcription
1 Detecting spam using social networking concepts Honours Project COMP4905 Carleton University Terrence Chiu Supervised by Dr. Tony White School of Computer Science Summer 2007
2 Abstract This paper deals with and spam filtering using the concepts of social networks. Based on the paper Leveraging Social Networks to Fight Spam [ Boykin, P. Oscar, Roychowdhury, Vwani P., 2005] we use the distinct properties associated with Social Networks such as clustering effect to determine if an is spam or not. Throughout this project we will look at why the clustering effect is helpful and the disadvantages to using this method on spam filtering. 2
3 Acknowledgments I would like to thank Dr. Tony White for the idea and support of this project. Also thanks to Microsoft for putting up tutorials and examples on how to make an Outlook Plug-in. 3
4 Table of Contents 1. Introduction Background Information Spam Spam Filters Social Networking Spam filter using Social Networking Concepts Project Design Client and Server Building the Social Network Results Disadvantages Conclusion...19 References...20 Appendix A: CD-Rom Contents...21 Appendix B: Test Cases...22 Appendix C: Deployment Instructions
5 List of Figures Figure 2.1 Sample Social Network...9 Figure 3.1 Tracing Trust.10 Figure 3.2 Depiction of a Social Network. 11 Figure 3.3 Spammer vs Legitimate User...12 Figure 3.4 Spam, No clustering Coefficient Figure 3.5 Clustering Coefficient Greater than Figure 4.1 Client and Server Project Design. 16 5
6 1. Introduction is becoming a very popular communication tool in the world today. Most people use it everyday to communicate with friends, family and co-workers. Others use it to make money through advertisements or cause damage to computers by sending viruses. This is known as spamming. Spamming is done by sending mass amounts of unsolicited s to random people everyday. Today, an average of 90 billion spam s is sent out everyday. Over the years the amount of spam has increased dramatically mainly due to the fact that spam costs little to no money at all to send. Users are becoming increasingly frustrated in having to go through all their s everyday, just to get to the legitimate ones. So companies have been building programs since the beginning to counter spam, programs known as spam filters that filter out any unwanted s. Current spam filters rely on filtering out specific addresses or keywords. In this paper we will look at a way to filter out spam that is based solely on trust and it involves the concepts of social networking. Social networks are networks of intertwined relationships between different people. Social networks are becoming more and more popular in society today especially on the World Wide Web. Some examples of popular social networking sites include Facebook.com or myspace.com. Through these sites people can add friends or families to their list, and their friends and families can be added to their list and so on, creating a network of relationships. 6
7 2. Background Information is a system developed in the 1960s as a way of sending and receiving electronic messages over a computer network. An is comprised of two parts, a header and a body. The header of an consists of many fields that are used to describe the such as the s subject, date of the , etc. Some of the following fields in the header that we are interested in are: From: address of the sender of the message To: the destination address of the message CC: cc stands for carbon copy; any s in this field receives a copy of the being sent The body of an contains the main message itself that is to be sent which can contain text, images, links, different types of files etc. 2.2 Spam Since the inception of , users have been using as a way to send unsolicited . This process is known as spamming, which is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. [Wikipedia.org]. Spamming is a low cost operation that can be used to send out viruses, commit fraud, or advertise products. Since spamming is an inexpensive operation generally millions of spam mail is sent out a day and can be a very big annoyance and cost the economy billions of dollars a year. 7
8 2.3 Spam Filters In an attempt to combat spam, companies have created spam filters to filter out any unwanted s. Current spam filtering techniques include searching for specific keywords in the messages or blocking known addresses using a blacklist. These types of filter usually filters out a lot of the s but the lists of keywords or blacklisted s need to be constantly updated. This becomes a big disadvantage to filtering spam since users can easily create a new and continue sending out spam or they purposely misspell words that are usually filtered out. Using the concepts of social networking we can build a spam filter that needs little maintaining and updating. 2.4 Social Networking Thanks to spam, users have become less trusting of . With social networking we can bring back the trust. Social Networking is a term used to describe a social structure comprised of relationships between different groups of people or individuals. When people interact with another person they form a relationship with them, with this relationship comes a certain level of trust. As the person forms more and more relationships with others, their social network grows. Those people can introduce people from their own social networks expanding others social networks and vice versa. For example we have a person A, who is friends with B and C and A introduces B to C, we will get a small little social network as shown below. 8
9 Figure 2.1 Sample Social Network Social networks are known as small-world networks. A network is called a small-world if it has the following traits: [Ebel, Davidsen and Bornholdt, 2002] 1. Clustering 2. A small average shortest path between two nodes scaling logarithmically with network size Clustering is a property in social networks as seen in figure 2.1 where A is linked to B and C, then there is a good chance C is linked to B. The second trait is important when building a spam filter, because it states, that every node in a small world network are not neighbors of another but can be reached through others. This trait is useful when defining trust. 9
10 3. Spam filter using Social Networking Concepts Using the concepts of social networking, we can show that an effective spam filter can be built. This spam filter will be filtering out spam based on if we can trust the sender or not, so before we start building the spam filter we need to define what trust is. 3.1 Defining Trust When defining trust, we take a look at how trust is incorporated in the real world. In the real world, people have relationship with family members and friends, and with this relationship there is a certain level of trust. People we do not know we do not trust, but their level of trust goes up if they are associated with someone you know. This gives trust in the social networking world a transitive property. If we go back to the definition of small world networks we can show that a person we do not know personally can still be trusted through the characteristic that the person can be traced back to someone we know. As shown below, if A trusts B and has never met C, and C is a trusted friend of B, chances are good that A can trust C. Figure 3.1 Tracing Trust When we define trust in our social networking spam filter, we need to not look at how well the user can trusts a person but how well other people can trust him. When we look at a social network visually we see a picture a bunch of nodes connected together by 10
11 links, but in reality a social network as a whole is a bunch of small little social networks that can be connected together Figure 3.2 Depiction of a Social Network In figure 3.2 we have 3 small-world networks, and in each group, every node does not have a relationship with every other node but most nodes can be reached by traversing other nodes. If an user from Group 3 were to an user from Group 1, we can say that the user in Group 3 can be trusted mainly because other users in Group 3 can trust him. This is possible because when a spammer sends out spam, he usually uses a list consisting of random people that he does not know. Since the list of people the spammer uses is random, the probability that the more than one person in the list knows another person is relatively low as seen in figure
12 Figure 3.3 Spammer vs Legitimate User As seen in the legitimate user s case, when he sends out an , there is a better chance that people in his list know each other, which is given by the properties of small-world network. Now with trust defined, this leads us to the clustering coefficient. 3.2 Clustering Coefficient A Social Network s most distinctive property is the tendency to cluster. [Boykin and Roychowdhury, 2005] The tendency to cluster means that if there is a node A in a graph that has a relationship to node B and node B has a relationship with Node C then there is a good probability that node A has a relationship with node C. Using this distinctive property we can determine whether a specific person belongs to a social network or not, therefore we can determine if the is trusted or spam. 12
13 To determine if the specific in question is spam or not, we calculate its clustering coefficient. To do this we focus on the node and its graph that it is connected to. The in question is treated as a node in a graph, and each node has a degree of k, that is each node has k neighbors. If the node has a degree of less than 2, than it can be assumed that the is spam. The reason we can assume this is because a node with degree of less than 2 does not belong to any social network yet and therefore has no one that can vouch for him as a trustworthy user. This is a very big disadvantage since a user can be legitimate and still be considered spam if the user is just entering the network. If a node has a degree greater than 2, then each of the k neighbors has a potential of being connected to each other. In our social network we are using a directed graph, where a link from user A to user B is different from a link from user B to user A. The reason behind a directed graph versus a undirected graph is due to trust. Trust lacks the associative property, that is a person can trust someone but that person doesn t have to feel the same way about the other. Therefore the maximum number of possible connections in an directed graph is k(k-1). In a undirected graph the maximum number of possible connections is k(k-1)/2 since a link from A to B is the same as a link from B to A. With this information we can now define the clustering coefficient as [wikipedia.org, 2007] Equation 1 Clustering coefficient The clustering coefficient is shown as a ratio between the amount of actual links {e jk } to the amount of possible links k(k-1).. With the clustering coefficient, we can now 13
14 distinguish between spam and non-spam s. In a social network if the sender s neighbors has no nodes that are connected together, then he is can not be in any social network. Figure 3.4 Spam, No clustering Coefficient Figure 3.4 shows us that sender A is trying to send s to B and C. A has two neighbors giving it a possible of two connections between each and since the actual number of links is 0, we get clustering coefficient of 0. Therefore if A sends an out to B and C, it will be detected as spam. Figure 3.5 Clustering Coefficient Greater than 0. Figure 3.5 tells us that sender A is part of a social network and is therefore trusted as legitimate . So if A tries to send an to C, we will check the amount of 14
15 neighbors he has which is 3 giving us a possible number of 6 connections with an actual amount of 2 connections. We then get a clustering coefficient of 1/3. From the above examples we can conclude that a clustering coefficient of 0 tells us that the received is spam, where as a clustering coefficient greater than 0 tells us that the received is not spam. 15
16 4. Project Design 4.1 Client and Server The spam filter built here is a plug-in developed in C# for Microsoft Outlook. In order for the plug-in to check if an incoming is spam, the social network has to be connected through other users as well. This means the social networking data needs to be kept on and updated by a central server program. The client (Plug-in) will update the server whenever a is sent out or received, and since the server holds all the social network data, it will determine if the is spam or not. Figure 4.1 Client and Server Project Design 4.2 Building the Social Network In order to detect spam using social networking concepts we have to first build it. Social network is built first by using the s in the contact list, and adding relationships to each and every contact. Subsequent addresses will then be added on later using the fields found in the header whenever the user composes an and sends it out. This 16
17 can be done because by initializing conversation with the other person we are showing a level of trust with that person. So s in the To and CC field will be added as relationships to the user. 17
18 5. Results Using the clustering coefficient we were able to show that any that comes from a user that does not belong in a social network is concluded to be spam. Like all spam filters though, this method of filtering has its disadvantages. 5.1 Disadvantages The first disadvantage as mention earlier is the inability to distinguish between spam or if the user is just entering the social network. If the user is legitimate and has a degree of one or less, meaning he has one or no neighbors in his network, the user will be treated as spam. This method works mainly because the probability that a spammer s social network will cluster is 0. Although this is the case, there can be some instances where the spammer might possibly send out an to two people who happen to be friends. If this were the case then all of a sudden the spammer s social network is clustering. Another disadvantage to this is that a spammer can easily fake a social network by creating one with fellow spammers, thus forming a spammer s social network. Since they form a social network entity by themselves, any s from them will be treated as real. 18
19 6. Conclusion Social networks are becoming increasingly popular in technology today. They range from a variety of uses, from interacting on the internet through sites such as facebook.com or myspace.com, or they can be built as a trust system. Social networks are a good way of using the trust system to filter spam, but it is not as effective as it should be due to its disadvantages. Using social networking concepts to build a spam filter, it is best to build the filter on top of already existing spam filters, that way it can be used as the last line of defense. Possible future work not discussed in this paper entails using these concepts to help build system that develops blacklists of s addresses of known spammer, given that the social network is big enough, it can become quite effective. 19
20 References 1. Boykin, P. Oscar, Roychowdhury, Vwani P. (2005) Leveraging Social Networks to Fight Spam, IEEE Computer Society. 2. Ebel, Holger, Davidson, Jorn, Bornholdt, Stefan. (2003) Dynamics of Social Networks, Wiley Periodicals Inc. 3. Wikipedia.org (2007) Wikipedia, Wikipedia Foundations 20
21 Appendix A: CD-Rom Contents Spam Filter: written in C# for Outlook 2003 Server: Written in Java Honours Project.pdf : Electronic Report 21
22 Appendix B: Test Cases Test Case 1: Receiving New Input Output Expected Result New Mail From: is passed into check for cluster Actual Result is passed into check for cluster Result Pass Test Case 2: Clustering Coefficient Input Output Expected Result 2a User is spam Algorithm returns true; meaning spam 2b User is not Spam Algorithm returns false; meaning legit Actual Result Algorithm returns true; meaning spam Algorithm returns false; meaning legit Result Pass Pass Test Case 3: Outgoing Mail Input Outgoing Mail: From: To: Output Expected Result Add as a neighbor to [email protected] Actual Result Add [email protected] as a neighbor to [email protected] Result Pass 22
23 Appendix C: Deployment Instructions The following software is required to run 1).NET Framework 2.0 2) Microsoft Office 2003 SP1 (or later) w/outlook 3) Microsoft Office 2003 Primary Interop Assemblies (O2003PIA.exe) 4) Visual Studio Tools for Office Runtime (vstor.exe) Java Runtime 1.5 To run the server goto Server\bin edit run.bat so that JDK Home points to your java home directory and execute run.bat 5) Setting the CAS Policy You need to set the CAS Policies in order for the plugin to run. In Windows XP goto 1. Control Panel 2. Administrative Tools 3. Microsoft.Net Framework 4. My Computer 5. Runtime Security Policy 6. User 7. Code Group 8. Click on All Group and add New 9. Name the Code Group 10. Set Condition All Code 11. Full Trust is on Install the Spam Filter located in \Spam Filter\Spam FilterSetup\Debug\setup.exe When you open outlook, the spam filter should be running, Under tools! spam filter! you need to set the ip of the server, default is localhost 23
SpamTitan Outlook Addin v1.1 Installation Instructions
SpamTitan Outlook Addin v1.1 Installation Instructions Introduction What does this Addin Do? Allows reporting of SPAM and HAM messages to the SpamTitan appliance, this in turn will allow the Bayesian appliance
Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University
Reference : USER 190 Issue date : January 2004 Revised : November 2007 Classification : Staff Originator : Richard Rogers Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam )
Reference : USER 191 Issue date : January 2004 Updated : January 2008 Classification : Staff Authors : Matt Vernon, Richard Rogers Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
Adjust Webmail Spam Settings
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
How to use Outlook Express for your e-mail
How to use Outlook Express for your e-mail Outlook Express is a popular e-mail program created by Microsoft. This packet will teach you a little bit about this program. This packet will cover how to receive
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Adaptive Filtering of SPAM
Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present
Spam Management Service Users Guide
Spam Management Service Users Guide We bring business & technology TOGETHER! Beringer Associates, Inc. 1591 Hylton Road Pennsauken, NJ 08110 Phone: 800.796.4854 or 856.910.7771 Fax: 800.917.2056 or 856.910.7888
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
OUTLOOK SPAM TUTORIAL
OUTLOOK SPAM TUTORIAL You can find this at http://www.sitedeveloper.ws/tutorials/spam.htm. Look for the yellow highlighting and red text in this article below to know where to add the EXODUSNetwork domain
SpamTitan Outlook Addin V2.0
SpamTitan Outlook Addin V2.0 The SpamTitan Outlook Addin v2.0 allows users to do a varity of spam filtering management from the outlook client, including Report Spam and Ham messages to the SpamTitan Bayesian
Filtering E-mail for Spam: PC
Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!
Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam
Barracuda Spam Firewall Users Guide How to Download, Review and Manage Spam By: Terence Peak July, 2007 1 Contents Reviewing Barracuda Messages... 3 Managing the Barracuda Quarantine Interface... 4 Preferences...4
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Tarek Hassan (B.Sc. Computer Science, Egypt) This thesis is presented for the degree of Master of Computer Science Murdoch University,
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)
Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users) System Requirements: Windows XP, Vista or 7 Outlook 2007 or 2010 32 bit Editions 1GB of RAM Microsoft.NET Framework
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Microsoft Exchange 2003
Microsoft Exchange 2003 Configuration Guide Microsoft Exchange 2003 Configuration Guide Page 1 Table of Contents Introduction... 2 Document and naming conventions... 2 Outbound email protection... 3 SMTP
Anti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.
16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal
Webmail Friends & Exceptions Guide
Webmail Friends & Exceptions Guide Add email addresses to the Exceptions List and the Friends List in your Webmail account to ensure you receive email messages from family, friends, and other important
How To Prevent Spam From Being Filtered Out Of Your Email Program
Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution
A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot
Chapter 6: ScanMail emanager
Chapter 6: ScanMail emanager Chapter 6: ScanMail emanager Chapter Objectives After completing this chapter, you should be able to achieve the following objectives: Describe the purpose of ScanMail emanager
Page 1 of 5. How to unblock automatic picture downloads in e-mail messages you receive
Page 1 of 5 How to unblock automatic picture downloads in e-mail messages you receive Page 2 of 5 Block or unblock automatic picture downloads in e-mail messages To help protect you from junk e-mail senders,
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.
Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction
Administrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Apps4Rent Hosted Exchange Spam Management Interface Guide.
Spam Management Interface Guide. Apps4Rent Hosted Exchange Spam Management Interface Guide. NOTE: This document contains functionalities and procedures which are mainly used to manage your spam settings
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Managing your Quarantine Inbox This chapter describes how you can check your quarantined messages, classify messages as spam and not spam, and modify your user preferences
SPAM UNDERSTANDING & AVOIDING
SPAM UNDERSTANDING & AVOIDING Modified: September 28, 2006 SPAM UNDERSTANDING & AVOIDING...5 What is Spam?...6 How to avoid Spam...6 How to view message headers...8 Setting up a spam rule...10 Checking
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Fighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
The Unified Spam-Blocking System
The Unified Spam-Blocking System Enterprise User Guide September, 2003 Version 2.00 Copyright DigiPortal Software Inc, 2002-2003, All rights reserved Note: Any companies, services or people, other than
PCVITA Express Migrator for SharePoint(Exchange Public Folder) 2011. Table of Contents
Table of Contents Chapter-1 ------------------------------------------------------------- Page No (2) What is Express Migrator for Exchange Public Folder to SharePoint? Migration Supported The Prominent
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
BULK MAIL CAMPAIGN RULES
BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%
Policy Patrol 7 Upgrade Guide
Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Quick Start Policy Patrol Mail Security 9
Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
Intellicus Cluster and Load Balancing (Windows) Version: 7.3
Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
Email Marketing. Send beautiful email campaigns, track the results and manage your subscribers. For further information, call 01202 232839 or email
Email Marketing Send beautiful email campaigns, track the results and manage your subscribers. For further information, call 01202 232839 or email [email protected] Copyright 2004-2012 Europa Studio.
Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server
Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies [email protected] www.intellicus.com Copyright 2014 Intellicus Technologies This
Plesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
How to make sure you receive all emails from the University of Edinburgh
How to make sure you receive all emails from the University of Edinburgh To ensure that any email from The University of Edinburgh - or any address you choose - is not automatically sent to your junk or
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Outlook Add-in Deployment Guide
Outlook Add-in Deployment Guide Sophos TOC 3 Contents Introduction...4 Prerequisites...4 Installation...4 Downloading the Outlook Add-in...5 Installing the Add-in on a Single Workstation...5 Installing
IMF Tune Opens Exchange to Any Anti-Spam Filter
Page 1 of 8 IMF Tune Opens Exchange to Any Anti-Spam Filter September 23, 2005 10 th July 2007 Update Include updates for configuration steps in IMF Tune v3.0. IMF Tune enables any anti-spam filter to
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post
BARRACUDA. N e t w o r k s SPAM FIREWALL 600
BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine
TRUSTWAVE SEG SPAMCENSOR EXPLAINED
.trust TRUSTWAVE SEG SPAMCENSOR EXPLAINED wave.com Updated October 9, 2007 Table of Contents About This Document 2 1 SpamCensor Defined 3 2 How Does SpamCensor Work? 3 3 How Are the Rules Made and Scored?
