How To Fight Spam With A Token On A Gmail Account
|
|
|
- Godwin Clarence Newton
- 5 years ago
- Views:
Transcription
1 Enforcing Addresses Privacy using Tokens Roman Schlegel and Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland Abstract. We propose a system which allows users to monitor how their addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the SPAM phenomenon. Our solution does not require changes to the infrastructure, can be set up by the end user on an individual basis and is compatible with any client as long as s are centralized on a server (e.g. an IMAP server). Nevertheless, it requires that people use messaging quite differently. 1 Towards a Fair Competition between Humans and Robots Anyone can send an to a given address (which is just a simple string) at basically no cost. Those strings used to be systematically exchanged until robots collected them automatically in every public electronic discussion forum and used them for spamming. That is why today poor human users have to face armies of well trained robots which are launched by associations of hackers and spammers. This situation is obviously unfair. Current counter-spam solutions are based on one of the following techniques. Deterministic filters using well configured rules. Filters based on artificial intelligence or evolutionary processes (which learn to recognize regular senders). Collaborative filtering, e.g. by polling or Bayesian methods. Charging policies to render sending s less cheap. More interactive protocols to prove that an sender is a real sender. The last two approaches require changes to the current infrastructure. The first one is obviously limited and the second one leads to false positive and false negative alerts. The third one only works in the case where spam is sent to a large number of users within the same community. All approaches are eventually defeated by spammers. On a separate subject, web page addresses URLs are widely exchanged, anyone can access a URL for free, but the HTTP server (a kind of a robot itself) can monitor which (human) client is requesting which URL by using cookies. Indeed, cookies are a privacy threat to legitimate (human) web surfers. So it
2 2 seems that machines have powerful audit tools at their disposal which could be used by humans as well. Actually, cookie-like strings could be a solution to strengthen the privacy of addresses. Indeed, by appending a string (that we actually call a token), we can monitor how addresses spread. Here is a typical scenario. A user Alice would like to receive s from another user Bob, so she gives him her address together with a private token. Incoming s using this token and not coming from Bob s address can simply be ignored. If a spammer manages to intercept the token and spoof s as coming from Bob, Alice can easily deactivate the token. Another case is when Bob abuses his privilege to send s to Alice by sending unsolicited s. Alice can deactivate the token as well. In this paper we present an application called XToken 1 which is a first step towards implementing the solution described above. In Section 3 we explain the various possible tokens. Section 4 tells how an sender should first get a token by using a token distributor. Then Section 5 presents a signature-based alternative which works provided that all users use it. Finally Section 6 proposes an agenda on how to deploy this solution and discusses how spammers may recycle their activities. 2 Previous Works In recent years a lot of different proposals have been made to defeat spam but none of them proved to be a panacea so far. In addition to that not all proposals have yet been implemented on a larger scale. These include for example (nonexhaustive list): Filtering: Well-defined deterministic rules or AI techniques can be used to identify unsolicited s. Domainkeys: This system uses public key cryptography to sign all messages sent from a specific domain. The recipient can verify the signature by looking up the public key using a DNS query. This system does not prevent abuse of the system but it makes tracking easier. Domainkeys was submitted as a draft to the IETF [7]. Greylisting: Another technique which has been introduced recently with some success is greylisting. The destination mail server will reject a message for the first 5 minutes. The originating mail server will retry after about 15 minutes and will succeed the second time. The idea behind this technique is that a spam software will not normally try to deliver a message more than once but will move to the next address after a failed attempt. Greylisting was first proposed in 2003 [8]. Micro-payments: This method tries to address the fact which makes spam possible, namely the problem that the cost of sending millions of messages 1 the application is distributed under the GNU General Public License and can be downloaded from A complete manual is available as part of the distribution.
3 3 is negligible with the current, widespread broadband technology. Micropayments would charge a small fee for every message sent, making it economically infeasible to send spam. Alternatively the price can be paid in terms of computation resources, meaning the sender has to demonstrate that some energy was spent in order to send the [4]. Challenge-response: The so-called challenge-response mechanisms are a technique which has been known for quite some time though not necessarily in relation to spam. Applied to this means that in order to be able to send a message to a recipient, a challenge has to be solved first. Because this normally requires the exchange of three messages (request, challenge, response + ) the concept of pre-challenges has been devised which allows to send messages without requesting a challenge first. The idea is that an already publicly known challenge (which changes periodically) has to be solved to be able to send a message. This reduces the number of required messages between recipient and sender to one like in normal [6]. SPA: A concept proposed by John Ioannidis from AT&T Labs called SPA (Single-Purpose Address) [9] is in fact quite similar to the concept proposed in this paper. The idea behind SPA is to encode a security policy into an address. This policy describes the acceptable use of the address and is enforced by the receiver of the message (because the sender cannot be trusted). For a comparison of SPA and XToken see section 7. Another often mentioned technology in relation to spam is captcha (Completely Automated Public Turing Test to Tell Computer and Humans Apart) [3]. It is not a technology to counter spam per se but nowadays it is often used to prevent bots from accessing certain information or pages. The idea of captchas is that they present a problem which is easy to solve for a human but very difficult for a computer program. Captchas exist in different forms: they can contain a transformed text on a special background, show different images together with a semantic challenge or they can be based on audio. Typical examples are web providers which require the user to solve a captcha when opening a new account to prevent spam bots from using the service. Captchas in themselves do not solve the problem of spam, but they can be used as one part of a wider system as it will be explained below. 3 Fighting Spam using XToken 3.1 The Token Concept XToken uses little pieces of information (so-called tokens) to distinguish legitimate from unsolicited s. Each user has a collection of tokens which he can distribute to his friends and associates. They can include these tokens when sending s and thus mark them as legitimate (referred to as valid hereafter).
4 4 The user can choose whether to create one token per person or send the same token to several people. This is obviously a trade-off: One token per person permits fine-grained control over who can send messages while increasing the time needed for managing the tokens. To give one token to a group of people reduces the management overhead but limits the resolution of control to the whole group. Technically a token is a combination of identifiers which references a token stored on the local computer of the recipient. The length of a token is usually between 6 and 9 bytes although to be able to transmit the token using the system it is encoded in base64 which increases the length to at least 8 bytes. The base64 representation is then enclosed in $ signs and added to a field in the message. Possible fields include the To:, CC: and the subject header. A typical token looks as follows: $DAdb12wD$ The easiest way to use a token received from a friend or associate is by including it in the address stored in the address book. An entry would then look like this: John Doe $DAdb12wD$ <[email protected]> When writing an message and selecting the address from the address book the token will automatically be included in the message. Temporary tokens are best included in the subject line like this: Subject: Re: Your letter $DAdb12wD$ 3.2 Token Types XToken uses various types of tokens, each of which offers additional functionality. At the moment there exist four types but new types can be added easily. SimpleToken: This token can be bound to a specific address. If the token is received in an message it is only valid if the sender address matches the address specified when creating the token. It is also possible to use the token without a bound address, in that case the token is always valid, independent of who uses it. DateToken: As the name implies, this token has a date associated and is considered valid only until the specified date. If the token is used after that date it is considered invalid. CounterToken: This type of token has an associated counter which is initialized to an arbitrary number when creating the token. Each time the token is received in an message the counter is decremented until it reaches zero. Once the counter has reached zero the token is no longer considered to be valid.
5 5 DateCounterToken: The last token is a combination of a DateToken and a CounterToken and contains a date and a counter. The token can be used in two ways: Either it is valid until the specific date or until the counter reaches zero or it can be valid until the specific date and until the counter reaches zero. It is possible to add almost arbitrary functionality by adding new token types. One idea could be to create a token which, if contained in an , causes this to be sent to a mobile phone by text message. XToken already supports for example sorting based on tokens, meaning that an containing a specific token gets automatically moved to a pre-defined IMAP folder. Tokens can be revoked at any time, rendering them invalid immediately. This is useful if a token has been compromised or should no longer be valid for some other reason. The XToken interface provides a dialog to manage the token database. The dialog can be used to create, revoke and delete tokens and to display additional information about existing tokens. 3.3 Using Tokens to Process Incoming s XToken can be configured to treat incoming messages in a multitude of ways depending on whether a message contains a valid token (or a valid signature, see Section 5) or not. The possible actions include: Move Valid Messages: In this mode XToken will move all messages containing a valid token to a defined folder, separating them from unsolicited messages. Move Invalid Messages: When using this mode all invalid messages (i.e. without a valid token) will be moved to a defined folder leaving only legitimate messages in the inbox. Flag Valid Messages: Instead of moving valid or invalid messages this mode leaves all messages in the inbox but flags valid messages with the standard IMAP flag \Flagged. Normally mail applications emphasize flagged messages somehow. Concerning the technical implementation XToken behaves like a normal IMAP client which can be run in parallel with any other IMAP client. It monitors one or several IMAP mailboxes for incoming messages and handles them according to the configuration (see Figure 1). As a consequence XToken need not interact with the user s favorite client: it cleans the mailbox directly on the IMAP server. 4 Token Distributor When using tokens one of the difficulties is the distribution. Clearly it is infeasible to send a token to a person who might potentially send an at some
6 Client Mail 6 IMAPService XToken Server IMAP Fig. 1. XToken monitors one or several IMAP mailboxes in parallel with existing mail clients. time in the future. It is therefore necessary to implement mechanisms which allow a person with a legitimate interest to obtain at least a temporary token. It is important to note that all mechanisms described below introduce an additional hurdle when making first contact with a recipient. Possible mechanisms to distribute tokens include: SMTP-based distributor: If someone wants to send a message he first sends a specially crafted to the recipient. An application (presumably XToken) will intercept the message and automatically generate a response with a onetime token (a token which can be used exactly once). The sender can then include this token in the real message. This method is moderately resistant against spam bots as it requires a valid return address. When using this method it probably makes sense to limit the number of tokens which are generated for a specific address in a given period of time (e.g. 1 token per hour or per day etc.). Web-based distributor: Instead of sending an message the sender has to fill in a web form (e.g. his name and address) and an containing a one-time token will then be sent to the specified address. This mechanism has the same resistance against spam bots as the distributor based on SMTP. A rate-limiting feature would be useful here as well. Web-based distributor with captcha: To eliminate the need of sending messages one could imagine creating a script which directly generates and displays a one-time token but is hidden behind a captcha. Thus only a human can access the script and consequently the token. Unless some mechanism is implemented to prevent the same person from accessing the script again and again an attacker could generate an arbitrary number of tokens although at considerable cost as it would have to be done manually. Combination of SMTP-based distributor and captcha: A captcha is sent by on request and the solution to the captcha is a one-time token. This is basically a normal SMTP-based distributor but with an added layer of security to prevent spam bots from using the distributor. The disadvantage of the two web-based distributors is that a second mechanism has to be implemented which transfers a copy of the generated tokens to the computer of the recipient so that XToken will recognize the generated tokens
7 7 when someone uses them in an . This transfer could be made by but then the messages would have to be authenticated to prevent spammers from injecting invalid tokens. 5 Using Signed s XToken also implements signatures as another mechanism to mark messages as valid (if used consequently signatures completely replace tokens). While signatures need more effort for the initial set-up, once they are configured they require less intervention than tokens. An important prerequisite though is that both sender and recipient use XToken. On the other hand, when using tokens it suffices if the recipient uses XToken. The initial set-up when using signatures is more complicated for the following reason: In order for XToken to be able to intercept and sign outgoing messages they have to pass through XToken. This is achieved by using a local SMTP proxy (see also below). The additional effort required by the user is that he has to reconfigure his mail client so that outgoing s pass through the local proxy. He then also has to configure XToken so it knows to which SMTP server it has to forward the signed s. Although this reconfiguration is not particularly difficult it does require some basic networking knowledge. The idea of using signatures in XToken has some similarities with domainkeys mentioned earlier. The main difference is that domainkeys work on whole domains while XToken signatures work on individual addresses. Furthermore, while domainkeys have to be implemented by the system administrator of a specific domain, XToken signatures can be used by any end-user without being dependent on his ISP. A signature is calculated over several header fields to make it unique for each message. It is made with the private-key of the sender and then added to the message together with the public-key which allows to verify the signature. For performance reasons the body of the message is not signed. While it is true that including the body when signing would increase the robustness of the signature, the current scheme only needs to retrieve the headers from the server (for the signature verification) which is a very efficient operation on an IMAP server. If the body also had to be retrieved this could significantly degrade the performance of the application, especially if a message contains attachments. When a user receives a signed message XToken automatically retrieves the public-key from the message and compares it to a list of locally stored publickeys. If the key is not known the user is asked whether he wants to trust it and the key is then added to the local list. If the user decides to trust the key any subsequent message signed with this key will be considered valid. If used consequently, signatures completely automate the process of sending and receiving legitimate messages. The user only has to intervene when a message with a new public-key is received.
8 Client Mail 8 localhost SMTP Proxy Server SMTP Fig.2. Outgoing messages are signed using a SMTP proxy. The signature algorithm used in XToken is ECDSA (elliptic curve digital signature algorithm) [1, 2] because of the compactness of the keys and the generated signatures, but any other standard signature scheme can be added. Figure 2 illustrates how outgoing messages are signed using an SMTP proxy running on the local computer. 6 A Proposed Deployment Agenda In this section we propose an agenda to change the way a user uses messaging. Eventually, only solicited s will arrive in his/her mailbox, but unexpected s from human beings can still be received at the additional cost of human involvement. 1. The user distributes tokens and uses the flag action (legitimate s get flagged). He/she observes how XToken behaves. 2. As the user begins to trust XToken, invalid messages are moved to quarantine in a specific folder. The user still regularly checks the folder but he/she is no longer distracted by incoming spam. 3. The quarantine folder is less and less regularly checked. s are automatically answered and removed after a while. The reply includes a free one-time token. 4. More and more users adopt XToken or equivalent applications. They are all aware of the new healthy way to use . They are familiar with token distributors and understand they have to get a token first to send an Users now automatically sign headers and tokens are less and less used, except for online services. 6. Invalid messages are automatically answered and removed as soon as they arrive. The answer includes an URL explaining how to reach the user and a link to an online one-time token distributor. At this stage, spammers can continue their activities in the two following ways:
9 9 sniff (valid) headers and use them with different bodies. This attack is quite limited by 1- the number of valid s circulating, 2- the ability to sniff Internet traffic. These attacks can be completely thwarted by signing the full and not just the headers. break one-time token distributors. This can easily be done by humans, but the human requirement is a bottleneck in spamming activities. Let us assume that the distributor is hidden behind a secure captcha. Clearly, the human time of spammers is not enough to get a sufficient number of tokens to make sure that sending spam is still profitable. An alternate way is to use distributed human computation [5]. Assuming, for instance, that spammers create a free pornography web site, they can easily make robots which collect captchas and have a front screen asking the visitor to solve one of the collected captchas for the robot before entering the web site. A way to thwart this attack consists of using captchas and tokens sent by . If it became harder and harder for spammers to get sufficient valid addresses, the front screen would require the address of the visitor. Clearly, this would be dissuasive for the visitor. Should a visitor nevertheless give his address then human victims of spam will at least have humans to blame for it so the issue will be brought back on a fairer ground. 7 Comparison XToken and SPA SPA and XToken share the following features: addresses are augmented by adding additional information Modified addresses are given to friends and associates to enforce an acceptable use policy Addresses can be made to expire Despite these similarities there are some significant differences: SPAs store all additional information in the address itself. XToken only stores an identifier and keeps a local database with the complete information (in the case of tokens). Both methods have advantages and disadvantages. The method how the additional information is stored in an address also differs. XToken is completely independent of the infrastructure while SPAs as described in [9] rely on some specific infrastructure. While the aim of SPAs and XToken is the same they differ in the approach. SPAs, at least partially, require a special infrastructure whereas an explicit goal of XToken was to make it infrastructure-independent so that it is entirely controlled by the end-user. When used with signatures XToken also requires less intervention by the user than SPA. There is no need to create new modified addresses and send them to possible associates. The only effort required by the recipient is to occasionally accept or reject a public key.
10 10 8 Conclusion We proposed a way to limit the spam phenomenon which needs neither any corporate involvement nor any changes to the infrastructure: users can freely install this solution and use it. Our solution requires human users to expend some additional effort for sending an , at least the first time they use the address. A key challenge is to make the token management interface as user-friendly as possible. Depending on whether users will accept this new way of using s, our solution provides an easy way to limit spam at the user level. Hopefully, when most users adopt healthy ways to use s, the activities of spammers will become less and less lucrative and can be eradicated throughout the Internet. We invite people to test the first implementation of this approach and welcome further development. References 1. ANSI X9.62. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard Institute. American Bankers Association Digital Signature Standard (DSS). Federal Information Processing Standards publication # U.S. Department of Commerce, National Institute of Standards and Technology, L. von Ahn, M. Blum, N.J. Hopper, J. Langford. CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology EUROCRYPT 03, Warsaw, Poland, Lecture Notes in Computer Science 2656, pp , Springer-Verlag, C. Dwork, A. Goldberg, M. Naor. On Memory-Bound Functions for Fighting Spam. In Advances in Cryptology CRYPTO 03, Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 2729, pp , Springer-Verlag, C. Gentry, Z. Ramzan, S. Stubblebine. Secure Distributed Human Computation. In Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, Canada, pp , ACM Press, R. Roman, J. Zhou, J. Lopez. Protection against Spam using Pre-Challenges. In Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference (SEC 05), Chiba, Japan, pp , Springer-Verlag, M. Delany (Editor). Domain-based Authentication Using Public-Keys Advertised in the DNS (DomainKeys). IETF Draft, E. Harris. The Next Step in the Spam Control War: Greylisting J. Ioannidis. Fighting Spam by Encapsulating Policy in Addresses, Symposium of Network and Distributed Systems Security (NDSS) 2003, San Diego, California, February 2003
PROTECTION AGAINST SPAM USING PRE- CHALLENGES
PROTECTION AGAINST SPAM USING PRE- CHALLENGES Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613; 2 E.T.S. Ingenieria Informatica,
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Aloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
Protect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
NetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Email Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
DKIM last chance for mail service? TFMC2 01/2006
DKIM last chance for mail service? TFMC2 01/2006 Mail service status More and more spam, fishing, spoofing, virus More and more energy in spam fighting More and more messages lost because : Imperfect automatic
Managing your e-mail accounts
Managing your e-mail accounts Introduction While at Rice University, you will receive an e-mail account that will be used for most of your on-campus correspondence. Other tutorials will tell you how to
If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php
Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
About the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
Guidelines for E-mail Account Management and Effective E-mail Usage
Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government
MailStore Server 5.0 Documentation
MailStore Server 5.0 Documentation 2010 deepinvent Software GmbH 24. May 2011 Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners.
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
How To Protect Your Email From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo
The Case for Email Security secure, premium by Erik Kangas, President, Lux Scientiae Section 1: Introduction to Email Security You may already know that email is insecure; however, it may surprise you
Avira Managed Email Security (AMES) User Guide
Avira Managed Email Security (AMES) User Guide 1 Product information... 3 1.1 Functionality... 3 1.2 Licensing AMES... 3 2 Getting started with AMES... 4 2.1 Adding a new domain to AMES... 4 2.2 Logging
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers
White Paper Bypassing CAPTCHAs by Impersonating CAPTCHA Providers Gursev Singh Kalra, Principal Consultant McAfee Foundstone Professional Services Table of Contents Inside a CAPTCHA Provider Integration
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...
Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Avira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
User Guide. ThreatTrack Security Product Manual
User Guide ThreatTrack Security Product Manual Copyright 2014 ThreatTrack Security, Inc. All Rights Reserved. The legal rights, license, and warranties of the software product described herein are governed
IceWarp Outlook Connector 4 User Guide
IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
How To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Bitmessage: A Peer to Peer Message Authentication and Delivery System
Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren [email protected] www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:
WEBMAIL USER MANUAL Table of content: An introduction to Wlink WebMail Interface guide Read/Delete Email Compose/Send Email Attachment Searching Email Message filter Spam setting Whitelist/Blacklist Email
Anti-spam filtering techniques
Anti-spam filtering techniques Stéphane Bortzmeyer AFNIC (.fr registry) [email protected] ITU, 19 january 2006 1 Anti-spam filtering techniques Background on this work This work started in the french Working
