SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE

Size: px
Start display at page:

Download "SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE"

Transcription

1 SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE AHMAD BAKHTIAR BIN IBRAHIM A PROJECT PAPER SUBMITTED IN PARTIAL FULFILMENT OF REQUIREMENT BARCHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING FACULTY OF INFORMATION TECHNOLOGY AND QUANTITATIVE SCIENCE MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM APRIL 2006

2 SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE AHMAD BAKHTIAR BIN IBRAHIM This project submitted to the Faculty of Information Technology and Quantitative Science MARA University of Technology In Partial fulfillment of requirement for the BACHELOR OF SCIENCE (Hons) In DATA COMMUNICATION AND NETWORKING Approved By the Examining Committee:. Mr. Mohammad Yusof bin Darus Project Supervisor. Mr. Ali bin Isa Examiner MARA UNVERSITY OF TECHNOLOGY SHAH ALAM APRIL 2006 ii

3 ACKNOWLEDGMENT In the name of Allah S.W.T the Most Merciful and Most Gracious. Praise to Allah the Mighty for showering me a good experience throughout this project paper and for all that has bestowed on me. It is with His superiority the project paper completed. First I would like to express my deepest gratitude and the most sincere appreciation to my supervisors En.Mohammad Yusof bin Darus for his greatest advice and encouragement to complete this thesis project. Her guidance and wise supervision has benefited me greatly. For my beloved parents, Haji Ibrahim bin Mohamed, Hajjah Siti Sara binti Salleh and my siblings, thanks for your loving, caring and supporting that give me strength to learn. Last and certainly not least, I am thankful to my entire friend who has contributed so much on their ideas and helpful suggestion. It means so much for me to complete this thesis project. To all mentioned here, might God bless all of you. Thank you so much. iii

4 TABLES OF CONTENTS CHAPTER PAGE 1. INTRODUCTION 1.1 Background Problem Statement Objectives Project Scope Significances Of Study Organization of This Report 6 2. LITERITURE REVIEW 2.1 Spam Overview Definition of Spam Spamming In Different Media Spam Messaging Spam Forum Spam Online Games Messaging Spam Filtering Methods Ruled Based (Heuristic) Filtering Bayesian Filtering Mail Filtering SpamAssassin How Spammers Operate Server Overview How Does works System 16 iv

5 Simple Mail Transfer Protocol (SMTP) POP3 Server IMAP Server Filtering Understanding of Mail Transfer Agent (MTA), Mail User Agent (MUA) and Mail Delivery Agent (MDA) Mail Transfer Agent Mail Delivery Agent Mail User Agent METHODOLOGY 3.1 Introduction Hardware And Software Requirement Minimum Hardware Requirement Software Requirement Process Phase Information Gathering Planning Installation and configuration SuSE Linux Postfix Mail Transfer Agent (MTA) MailScanner MailWatch SpamAssassin Bayesian Database Testing Analysis 33 v

6 4. FINGINGS AND DISCUSSION 4.1 Components of Server with Spam Filtering Postfix MailScanner MailWatch SpamAssassin Rule Based Filtering Versus Bayesian Filtering Spam Filtering Analysis CONCLUSION AND RECOMMENDATION 5.1 Conclusion Recommendation Implementation of Anti Virus at Server Administrator Maintenance 46 REFERENCES 48 APPENDIX APPENDIX A 49 APPENDIX B 53 APPENDIX C 55 APPENDIX D 60 vi

7 LIST OF TABLES PAGE TABLE 3.1: Hardware Requirement 22 TABLE 3.2: Software Requirement 22 vii

8 LIST OF FIGURE PAGE Figure 1: SMTP and POP3 15 Figure 2: Mail Transfer Agent (MTA) and Mail User Agent (MUA) 20 Figure 3: The YaST Control Center 23 Figure 4: SuSE Linux 10.0 Interface 24 Figure 5: Network Diagram 27 Figure 6: MailScanner configuration files editing 36 Figure 7: MailWatch Interface 40 Figure 8: Today Total Scanning of 41 Figure 9: Detailed of 42 Figure 10: Total Mail Processed By Date 42 Figure 11: Total of Incoming 43 viii

9 LIST OF ABBREVIATIONS Bayesian filtering: Process of using Bayesian statistical methods to classical documents into categories. GTUBE: Generic Test for Unsolicited Bulk . Provides a test by which can verify that the filter is installed correctly and is detecting incoming spam. Heuristic filtering: Rule based (Heuristic) filtering applies a set of rules to each incoming message to detect spam. IMAP: Internet Message Access Protocol. This protocol is method for user to accessing their on mail server. The function is same with POP3. MDA: Mail Delivery Agent. Software that accepts incoming e mail messages and distributes them to recipients' individual mailboxes or forwards back to an SMTP server. MTA: Mail Transfer Agent. A computer program or software agent that is responsible for receiving, routing, and delivering messages from one computer to another. MUA: Mail User Agent. The program that users use to read, write and send s POP3: Post Office Protocol 3. Standard protocol for receiving and it can be client or server. SMTP: Simple Mail Transfer Protocol. A standard protocol for transmission over the Internet. YaST: Yet Another Setup Tool. An operating system setup and configuration tool that is featured in SuSE Linux distribution. ix

10 ABSTRACT Spam is a serious problem that has been increasing plaguing users of the Internet. Programs known as spam filters are employ to assist the user in deciding if an is worth reading or not. This paper is focuses on build the mail server with spam filter and analysis the effectiveness of rule based (Heuristic) and Bayesian filtering method that use in SpamAssassin. The mail server consolidates software which is available in public domain as a powerful and low cost solution for seeking option in fighting spam. The rule based method using set of rules to define the incoming as spam or not and Bayesian method using probability of incoming mail to define that the mail is belong to either spam or legitimate mail category after its require a training period for SpamAssassin. The combination of both methods show that SpamAssassin is a better spam checking. x

11 CHAPTER 1 INTRODUCTION 1.1 PROJECT BACKGROUND Electronic mail ( ) is now considered the easiest and most efficient way to communicate. Internet users can simply type a letter and at the click of a button instantaneously communicate with people all over the world. Despite the obvious advantages of using , its simplicity carries with it spam. The term spam refers to unsolicited, unwanted, and inappropriate bulk . Spam is often referred to as Unsolicited Bulk (UBE), Excessive Multi-Posting (EMP), Unsolicited Commercial (UCE), Unsolicited Automated (UAE), bulk mail or just junk mail. Spammers use many tactics to get address to send spam. Through the internet, spammers can get the from newsgroup posting, webpage or mailing list. Another tactics is using social engineering such as chain letter or purchase address from another spammer. They also used computer programs called robots or spiders to harvest address from websites. The problem with spam is it makes up 30% to 60% of mail traffic and is on the rise. It can make the mail traffic become slow. When spam received and storage in mailbox, the mailbox can cause the problem like shutdown. Sometimes the spam is difficult or impossible to unsubscribe. User also wasting time to managing and deleting and this can give negative effect on productivity. This research present an analysis of spam filters based on server site, including the issues of spam, and study of Linux mail server. In this research, spam filters are discussed on method or algorithms their use to filter spam. 1

12 The meat of this research is the analysis. Our main goal was to provide a effectiveness between the rules based filtering method and the Bayesian filtering that using in SpamAssassin. We wanted to see how this filter worked better and their effectiveness to solve problem with spam. In term of which method is more effective spam filtering, the analysis will do on the deal of tool to filtering spam. We will looking on the condition like is the program effective at keeping Spam in the Spam folder or quarantine area, keeping the Spam out of outbox, allowing only the legitimate mail to enter the inbox and the effectiveness at keeping legitimate mail out of spam or quarantine area. Other study include on simulate the mail server based on open source software using Postfix (MTA) server. 2

13 1.2 PROBLEM STATEMENT Spam is junk mail that is sent to you by someone who has no existing relationship with you. Whether calls it unsolicited commercial (UCE) or unsolicited bulk (UBE) spam is defined by the fact that the recipients did not request the mail or reveal their addresses for the purposes of receiving such mail. Spam creates a variety of problems for consumers, businesses, and Internet Service Provider (ISP).From unwanted pornographic images to overtaxed servers, these problems create differing types and severity. On consumer site, spam can abuse their privacy. Most cases, the spammer knows little or nothing about consumer. Billions of s sent everyday like inviting to meet new friends or buy a part of product that they not interest at all. Spam is also a crime problem for consumer when spam pornographic included. Internet Service Provider (ISP) charged their consumer on spent online, so the process of downloading and reading spam may increase consumer cost. Nowadays, ISP charge a flat rate to their customer and that will not become a big problem. However, many Internet mobile devices charge user depend on hour or minute their surfing internet and this should become the cost problem for users. Spam can impact on business site too. When hit with spam attack, business needs to invest resource to reduce this problem. For example, if the mail has sent from inside of company computer, the company needs to check whether that mail has been infected with virus or spam. That mean a company will increase their technical support cost. Spammer occasionally put the name of a legitimate company in the to give the trust to recipients that is from well known company or is sent with their authorization. When the recipient think the company is sending spam, their reputation and trusted from consumer will fall and suffer. This is the example of spoofing problem. Spam also affect how legitimate business to market their product. Many consumers subscribe to list from well known companies in order to receive special discount 3

14 offer of product. However, these are sometimes defines as spam by spam filtering product or recipient. Filter product that recognize words common in spam, such as sale, order or price sometimes block wanted as spam. This problem can make the difficulties in marketing. Another problem is sexual harassment. This problem can reduce worker productivity. Spam gives troubles to Internet Service Provider (ISP) because it uses large amount of bandwidth, storage space, and increase technical support cost. To dealing with spam, ISP must build the sophisticated program into their system. Other problem at ISP site is server strain. When sending and receiving amount of in short period of time, server may become strain on ISP resources. They have to upgrade their equipment and pay higher bandwidth bill to deal with raise of traffic. Sometimes, spammer using multiple combination of common name at popular domain name to send spam. For example, they might send to or This problem puts huge drain on ISP server and bounce message returned for addresses that never existed. When ISP does not gives the best service, customer will complaints. This could reduce time when help desk or customer service dealing with customer concerns about spam. 1.3 OBJECTIVES These research objectives are: i. To create mail server with spam filtering using open source software. ii. To analysis the effectiveness of spam filtering method (rule based and Bayesian) in SpamAssassin. 4

15 1.4 PROJECT SCOPE The scope for this research included: i. Filtering spam at server site using SpamAssassin for filtering . ii. Create mail server using open source software like SuSE Linux 10.0 for operating system and Postfix for Mail Transfer agent (MTA). iii. iv. Analysis the effectiveness of SpamAssassin to catch spam using rule based and Bayesian filtering method. Build the small Local Area Network (LAN) included 1 or 2 host and mail server 1.5 SIGNIFICANCES OF STUDY This thesis is mainly focusing on developing spam filtering server using open source software and network devices. By using open source software, users can create their own spam filtering to reduce the spam with low cost. Managing and deleting spam or unwanted messages can give negative effect on user productivity. With this spam filtering server, users no need waste their time to delete unwanted message or spam in their mailbox. An additional benefit of this project is that provide valuable information about spam filtering. So the problem like overload on mail traffic, shutdown of mailbox, and waste of disk storage on mail server can be reduce and that will make the network working at high performance. spam. Other advantage is give better understanding to future researchers about 5

16 1.6 ORGANIZATION OF THIS REPORT In this chapter, problem statement of this project is laid out. Project s objectives and project s scopes are also discussed. Finally, the expected significant of this project are mentioned. This project is further strutted as follows: Chapter 2: This chapter will review about literature work. There are discussions about Spam filtering analysis that have been done by others. Also the discussion about the related study of spam and Linux mail server. Chapter 3: This chapter will focus on methodology that used for this project. It is showing the procedures on achieving the objectives of this project. Chapter 4: This chapter will discuss about the finding of this project. An analysis of finding and testing which has been done will be explained in this chapter. Chapter 5: The last chapter of this project, including the conclusion and recommendations for this project. 6

17 CHAPTER 2 LITERATURE REVIEW 2.1 SPAM OVERVIEW In this section, it will discuss the information about spam like the definition of spam, spamming in different media, spam filtering methods and the spam filtering tools that will use for this project Definition of Spam According to Paul Lalor, (2004) spam is refers to unsolicited, unwanted, inappropriate bulk and also often referred to as Unsolicited Bulk (UBE), Excessive Multi-Posting (EMP), Unsolicited Commercial (UCE), Unsolicited Automated (UAE), Spam mail, bulk or just junk mail. Another definition is refer to Mail Abuse Prevention System (MAPS) (2005), electronic message is spam if the recipient's personal identity and context are irrelevant because the message is equally applicable to many other potential recipients and the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for it to be sent and the transmission and reception of the message appears to the recipient to give a disproportionate benefit to the sender. 7

18 2.1.2 Spamming In Different Media Refer to Wikipedia (2005), there are a lot spam among different media such , messaging, forum and online game messaging Spam spam is the most common form of spamming on the internet. It involves sending identical or nearly identical unsolicited messages to a large number of recipients using users that get using spambots. By using spambots, spammers create viruses that will render an unprotected PC a "zombie computer" and the zombie will inform a central unit of its existence, and the central unit will command the "zombie" to send a low volume of spam.another tactics to get address is using social engineering such as chain letter or purchase address from another spammers. There are four types of spam: i. Unsolicited commercial (UCE) is an message that you receive without asking for it marketing a product or service. Also called junk . ii. iii. Unsolicited bulk (UBE) refers to messages that are sent in bulk to thousand of recipients. UBE may be commercial in nature, in which case it is also UCE. But it may be sent for other purposes such as political lobbying or irritation. Make money fast (MMF) messages, often in the form of chain letters or multi-level marketing schemes, are messages that suggest you can get rich by sending money to the top name on a list, removing that name, adding your name to the bottom of the list, and forwarding the message to other people. 8

19 iv. Reputation attacks are messages that appear to be sent from one person or organization, but are actually sent from another. The purpose of the messages isn't to promote a particular service or product, but to make the recipients of the message angry at to sender. The most cruel reputation attacks include the actual addresses, phone numbers, and street addresses of the victim Messaging Spam Messaging spam sometimes called spim, using the instant messaging system such as as AOL Instant Messenger or ICQ to send spam.in messaging spam, spammers need scriptable software and the recipient s usernames.the instant messaging system offer a directory of users, including user information such as age and sex. So spammers are easy to gather information and send unsolicated message to system users Forum Spam Spamming an internet forum is when a user posts something which is doesn t have anything to do with the current subject. It also can define where a person repeatedly posts about a certain subject in a manner that is unwanted by the general population of the forum. Lastly there is also the case where a person posts messages soley for the purpose of increasing his or her ranking on the forum. 9

20 Online Games Messaging Online game usually allow players to chat with each others players on chatrooms.these service is also using by spammers to send spam such as promote for certain websites or online strores to another players Spam Filtering Methods There are many ways to solving the problem of filtering spam. This section describes two methods of filtering spam that are used in this project. The methods are ruled based (Heuristic) and Bayesian filtering Rule Based (Heuristic) Filtering According to Paul Lalor, (2004) Heuristic spam filtering uses feature-matching rule set, gained through experience, to capture spam. Through detailed analysis of incoming based on carefully designed rules, heuristic filtering assigns a numerical value or score to each message (calculated from assigning a particular number to different words contained in the mail). This score is used to determine whether the message is likely to be spam or not, so for example, if the contained obvious spam words (sexy, debt, loan, etc ) they would be assigned a higher score than innocent words. Finally an is classed as spam if it exceeds a certain threshold (value). Through years of learning what spam (and nonspam) mail usually look like, the default set of rules, and as a result the scores assigned by them have become very reliable and effective in detecting what is and what is not spam. An example of the rule could be that all that contains the text order confirmation or the text with red color will defined as spam. 10

21 This method is easily to write but making that works with a set of rules that make sense. The problem with this method is that the rules are written by people looking for the obvious characteristic of spam with advancing technology increasing every day. For example, a message with the subject of "F R E E S E X" is spam, but a ruled based program might ignore it because of the spaces between the letters. Another problem is that the more comprehensive a rules-based program gets, the slower it will run. Refer to Appendix D for example of rule based set Bayesian Filtering According to Wikipedia (2006), Bayesian spam filtering is the process of using Bayesian statistical methods to classify documents into categories. Using well known mathematics, it is possible to generate a spam indicate probability for each word. Bayesian is different from others because that it s learning. To decide that incoming mail is spam or not, the filter needs to know about the mail that user receives. Since the test of the words and frequencies, the solution is keep in table to record how often each words in that mail appears. Spam is kept in separate table and that probabilities can be calculated here. Bayesian rule using this probability: For example, most users encounter the word Viagra in spam , but rarely want it in other . The filter doesn t know these probabilities in advance and must be trained first so it can build them up. In this case, the user must manually indicates whether that 11

22 is spam or not to train the filter. Then, the filter will set the probabilities in spam or legitimate database for all word in training . After training, the word probabilities are used to compute the probability of incoming mail to define that the mail is belong to either spam or legitimate mail category. The that defines as spam will be automatically moved to spam mail folder or deleted absolutely Mail Filtering - SpamAssassin SpamAssassin is a mail filter which attempts to identify spam using a variety of mechanisms including text analysis and Bayesian filtering. SpamAssassin is a mail filter or classifier. It will examine each message accessible to it, and assign a score representing the chance that the mail is spam. SpamAssassin uses a wide range of heuristic tests on mail headers and body text to identify "spam", also known as unsolicited commercial . SpamAssassin also includes a Bayesian learning filter, so it is meaningful training SpamAssassin with your collection of non-spam and spam. This will make it more accurate for checking the incoming mail. SpamAssassin is a mail filter to identify spam and it is an intelligent filter which uses a diverse range of tests to identify spam. These tests are applied to headers and content to classify using advanced statistical methods. In addition, SpamAssassin has a modular architecture that allows other technologies to be quickly wielded against spam and is designed for easy integration into virtually any system. 12

23 Based on comments from many sources, we felt that SpamAssassin was the best rule based filter available at the time we started our project, which is why we chose to use and test it. SpamAssassin uses a point system when analyzing an . Every is scanned for instances of each characteristic from its list. If a characteristic is found, that gains the number of points related with that characteristic. Points can be both negative and positive. For example, if an contains the word GUARANTEED in the subject column, that s score will increase several points. If the final score of an is over a certain threshold, configurable by the user, the gets flagged as being spam. The list of characteristics is general, including specific words to the color of text. It is also configurable by the user. The SpamAssassin creators keep a database of s, the rules, and whether or not those s were spam. It is not necessary to store the contents of the s after the matching rules are calculated, so the actual s are not stored. The SpamAssassin team encourages users to make changing to this database to improve SpamAssassin s accuracy. But our primary worry with SpamAssassin was its static character. Everyone using SpamAssassin has the same settings and a spammer could easily test their new message on the latest version of the filter to verify if it would be blocked or not. There are even services available online to save the designer the maintaining of the latest versions of all spam prevention software. This static character is, however, an advantage in regards to implementing the filter. Since it does not learn, its effectiveness is not based on user input and as a result requires no maintenance. 13

24 2.1.5 How Spammers Operate Unlike junk paper mail, spam costs the sender very little to send; almost all of the costs are paid by the recipient and the carriers, because the spammer does not have to pay for the entire Internet bandwidth tied up in the delivery of the spam. Because they have no incentive to be efficient in their mass ing, spammers usually don't put much effort into verifying addresses. They use automatic programs called bots to scour the Web and Usenet newsgroups, collecting addresses, or buy them in bulk from other companies. One of most common tricks used by spammers is to relay messages through the server of an innocent third party. This tactic doubles the damages: both the receiving system and the innocent relay system are flooded with spam. And for any mail that gets through, often the flood of complaints goes back to the innocent site because it was made to look like the origin of the spam. Many spammers send their spam from a free account from a large ISP such as AOL, Yahoo!, or Hotmail, then abandon the account and open a new one to use for the next assault. Another common trick that spammers use is to forge the headers of messages, making it appear as though the message originated elsewhere. This is called spoofed . There are some pieces of information in the full headers that the spammer cannot forge, but even after technical investigation into the source of the message, most often the resulting information leads to a dead end. 14

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107

A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107 A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

Filtering E-mail for Spam: PC

Filtering E-mail for Spam: PC Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

BARRACUDA. N e t w o r k s SPAM FIREWALL 600 BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine

More information

Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University

Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University Reference : USER 190 Issue date : January 2004 Revised : November 2007 Classification : Staff Originator : Richard Rogers Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

About the Junk E-mail Filter

About the Junk E-mail Filter 1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,

More information

How to Access Your Private Message Center if you need more control

How to Access Your Private Message Center if you need more control How to Access Your Private Message Center if you need more control If and When you log in to your message center for the first time, you will be asked to change your password. It needs to be at least six

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

SPAM UNDERSTANDING & AVOIDING

SPAM UNDERSTANDING & AVOIDING SPAM UNDERSTANDING & AVOIDING Modified: September 28, 2006 SPAM UNDERSTANDING & AVOIDING...5 What is Spam?...6 How to avoid Spam...6 How to view message headers...8 Setting up a spam rule...10 Checking

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

Email Marketing Do s and Don ts A Sprint Mail Whitepaper

Email Marketing Do s and Don ts A Sprint Mail Whitepaper Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

PROOFPOINT - EMAIL SPAM FILTER

PROOFPOINT - EMAIL SPAM FILTER 416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

Enterprise Email Marketing: The 8 Essential Success Factors

Enterprise Email Marketing: The 8 Essential Success Factors Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing

More information

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful

More information

How To Stop Spam From Being A Problem

How To Stop Spam From Being A Problem Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting

More information

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails 2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7

Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7 Table of Contents Introduction:... 3 What is Spam?... 3 How to Bypass Spam Filters... 5 Common Mistakes... 7 How Spam Filters Work... 8 Testing Your Email Campaign... 8 Preventing False Abuse Reports...

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...

More information

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Mail Services Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Enterprise-class mail server High-performance Postfix SMTP services Scalable Cyrus IMAP and

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

Configuring MDaemon for Centralized Spam Blocking and Filtering

Configuring MDaemon for Centralized Spam Blocking and Filtering Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized

More information

OUTLOOK SPAM TUTORIAL

OUTLOOK SPAM TUTORIAL OUTLOOK SPAM TUTORIAL You can find this at http://www.sitedeveloper.ws/tutorials/spam.htm. Look for the yellow highlighting and red text in this article below to know where to add the EXODUSNetwork domain

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

How to use Outlook Express for your e-mail

How to use Outlook Express for your e-mail How to use Outlook Express for your e-mail Outlook Express is a popular e-mail program created by Microsoft. This packet will teach you a little bit about this program. This packet will cover how to receive

More information

Articles Fighting SPAM in Lotus Domino

Articles Fighting SPAM in Lotus Domino Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called

More information

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts EMAIL MARKETING TIPS From Our InfoUSA Email Experts In order to assist you every step of the way while creating an Email Marketing Campaign, our InfoUSA Email Experts have compiled lists of their best

More information

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods: ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

BULLGUARD SPAMFILTER

BULLGUARD SPAMFILTER BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already

More information

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post

More information

How to make sure you receive all emails from the University of Edinburgh

How to make sure you receive all emails from the University of Edinburgh How to make sure you receive all emails from the University of Edinburgh To ensure that any email from The University of Edinburgh - or any address you choose - is not automatically sent to your junk or

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

EFFECTIVE SPAM FILTERING WITH MDAEMON

EFFECTIVE SPAM FILTERING WITH MDAEMON EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received

More information

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information

Basic E- mail Skills. Google s Gmail. www.netliteracy.org

Basic E- mail Skills. Google s Gmail. www.netliteracy.org Email it s convenient, free and easy. Today, it is the most rapidly growing means of communication. This is a basic introduction to email and we use a conversational non- technical style to explain how

More information

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam )

Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam ) Reference : USER 191 Issue date : January 2004 Updated : January 2008 Classification : Staff Authors : Matt Vernon, Richard Rogers Setting up Microsoft Outlook to reject unsolicited email (UCE or Spam

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Anti-SPAM Solutions as a Component of Digital Communications Management

Anti-SPAM Solutions as a Component of Digital Communications Management Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.

NEVER guess an e-mail address. Your mail will nearly always go to the wrong person. 16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal

More information

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....

More information