Solido Spam Filter Technology
|
|
|
- Giles Norris
- 10 years ago
- Views:
Transcription
1 Solido Spam Filter Technology Written August 2008 by Kasper J. Jeppesen, Software Developer at Solido Systems Solido Spam Filter Technology (SSFT) is a stand alone filter that can be integrated into a wide variety of services. It delivers unparalleled filtering quality and throughput performance on any Java capable UNIX platform. This document will introduce the reader to some of the technologies that make up SSFT. For further details you can request an NDA version of this document that is more in depth regarding the actual filters and their implementations. Introduction SSFT aims specifically at classifying pure spam mails unsolicited bulk mail with the purpose of selling a product. Thus, we do not train our filter to detect viruses, phishing attempts or valid bulk ing lists. Instead, we suggest that SSFT be used in combination with an anti- virus product such as ClamAv 1 to provide a full filtering solution. SSFT is currently in use at several larger Danish organizations that filter for a wide range of international customers. We also employ the technology ourselves in our sister company, Armada Hosting. This gives us daily, real-world experience that we believe is needed to truly understand the challenges posed by running a large scale service. The rest of this document is divided into sections which describe the actual filter, training and maintenance of the filter, integration with SMTP 2 services, real world performance benchmarks, a small note on installation and administration, and information about sales and licensing. 1 Clam AV is a free open source anti virus product available at clamav.net 2 SMTP - Simple Mail Transfer Protocol is the commonly used standard to transfer between servers Solido Systems Spam Filter Technology 1/6
2 Filtering When evaluating wether or not an is spam, the things you can examine can be divided into two categories: context and content. Context covers the metadata related to the delivery of the , e.g., the time of delivery and the IP address of the delivering server. Content covers the actual contents of the . IP black lists such as Spamhaus 3 can be used to evaluate the context of the by looking up the sending serverʼs IP. Filtering technologies such as Bayesian text classification evaluate the content of the . The first part of the filtering process in SSFT is the initiation of the context filters such as DNS lists. These are typically dependent on third party resources, i.e., their execution time can vary wildly depending on the current load on those resources. We start these requests as a background process whose results can be polled when the rest of our filters have completed their work. In instances where some of the resources are responding very slowly, their results can be discarded while still maintaining a high spam detection rate and a high mail throughput. Besides using standard DNS lists such as Spamhaus, we also employ our own non-binary IP reputation list. This list is continuously updated from all of our current spamfilter installations, based on results from our content based filters. It is also possible to add your own, third party DNS lists to the SSFT filtering process as long as they adhere to the same informal standard such as that used by Spamhaus. Before any of the SSFT content filters begin their work, the is preprocessed to ensure that different content filters don't end up performing the same work on the raw mail data. This preprocessing includes a general attempt to parse the mime format of the mail, decode any attached images and separate the actual text content from html tags. Finally, all raw text parts are run through our custom high performing Hidden Markov Model based deobfuscation filter which detects and corrects obfuscation attempts. The result of this final preprocessing filter is not only a clean input for the rest of our text based filters, but also a filter in it's own right, which will affect the final result if it detects any clear obfuscation attempts in the processed data. The primary text filtering in SSFT is done by a stack of three different text filters. A naive bayesian filters and two logistic regression filters. Due to the disjointness of the false positives set of each individual filter, the combined classification will have a much lower misclassification rate than the individual filters would on their own. Although a big part of spam today is being completely custom generated for each sent out, there are still big waves now and then that are similar enough that they can be caught quickly and effectively by a text based finger print filter. For this purpose, we fingerprint the text contents of s using a very fault tolerant and proprietary transformation algorithm. The final part of the SSFT filtering process is to examine any images that were attached to the . The image filters currently in use fall into three separate groups: fingerprint, OCR 4 and heuristic. 3 Spamhaus is a set of public anti spam DNS lists available at 4 OCR - Optical Character Recognition, different techniques used to recognize written/printed text Solido Systems Spam Filter Technology 2/6
3 Fingerprint filters attempt to detect features in images that allow them to recognize the same group of images even when they are being dynamically created with big variances. We currently have several custom fingerprint algorithms in use that are each able to withstand different types of variance in the inspected images with almost no false positives. The OCR filters in SSFT use different techniques to do full or partial OCR in order to recognize messages written in the images. These filters are able to deal with both changing fonts and sizes as well as "bouncing" letters inorder to detect messages written purely in images. The final image filter group are heuristic filters that look for specific features of images. These are not in general use but instead represent more of a toolbox approach which allows us to quickly add a new feature detection filter that can detect images we are otherwise unable to detect. They can be thought of as a custom per-image type fingerprint filter system. Once all filters have completed their evaluation of the , the final result is calculated by using a small logistical regression filter that is trained along with each dataset. This ensures that the result of each filter is only trusted to the point of its actual performance. Negative changes in filter performance after training on a new set of s will automatically be regulated before it can have an effect on the actual filter results. Training Unlike many other spam filters, daily updates to SSFT contain both code and data. This allows us to push new code out to all installations without the need for any local maintenance work. Having the ability to push out new code within moments of leaving our test center allows us to fight back fast and efficiently when encountering new types of spam. Updates to the filter are pushed automatically from our servers to your local installation. The updates are hot swappable, ensuring that the daily updates never interrupt the mail flow. All training for SSFT updates is done several times daily at Solido Systems. It is possible, but not necessary, for users to contribute to our datasets. This contribution can happen both as reports of misclassified mails as well as as automatic statistics about the types of s being received from different IP addresses. Integration SSFT runs as a standalone daemon which communicates with clients over TCP/IP connections. Several well defined protocols are available for custom integration directly with the daemon. However, there are also several ready to use integration options included in the package: http, milter 5, spamassasin 6 replacement and spamassasin plugin. The fastest and most direct way to create a new custom integration with the filter is through a simple text-based protocol. Connections to this service can be held persistently and using this 5 Milter is a mail filter plugin architecture. See for more information 6 SpamAssassin is a commonly used open source anti spam filter available at spamassassin.apache.org Solido Systems Spam Filter Technology 3/6
4 interface, a mail can be filtered either by streaming the mail data through the connected socket or by sending the path to a local file that contains the raw mail. The http integration option is provided through a full http interface in the filter effectively making the filter an easy to use web service. You simply send the to the filter as a post request and get the result in the content body returned. This makes it possible to use standard libraries and tools such as curl to quickly integrate the service into almost any environment. For those customers who are already running spamassasin, we have developed both a full set of spamassasin drop in replacement scripts as well as a single rule that can be used to embed SSFT in an existing spamassasin setup. This makes it very easy and risk-free to test out SSFT in your current environment. Performance SSFT has been highly optimized to provide maximum throughput on multicore hardware running multiple spam filtering processes in parallel. Each mail may take anywhere from 2-100ms to filter depending on the number of filters necessary and the performance of external third-party services such as DNS lists. However, as long as the filter is fed enough s in parallel, the overall throughput will always stay very high. There will always be a tradeoff between the quality of the filtering and the speed at which it can be done. While the Solido filtering technology in general performs well enough to allow you to use the full set of filtering technologies available, it can sometimes be beneficial to turn down the quality a bit to gain performance. This can be done on the fly even while the filter is running. The following performance results for SSFT were the result of running load tests in our own production environment. We have developed a record-playback solution using our SMTP proxy which allows us to record real world mail flow and play it back under controlled circumstances in a repeatable way. The following graph shows the results of stress testing on a quad core 7 Dell PowerEdge 1950 III using s recorded in June, 2008 during peak hours at Armada Hosting. The horizontal axis show the number s being filtered concurrently while the vertical shows the result as the number of s filtered per minute. 40,000 30,000 20,000 10, Quad Core Xeon E Ghz, 2 x 15k 73gb SAS drives, Perc 6I controller, 4gb 667mhz fb RAM Solido Systems Spam Filter Technology 4/6
5 In order to allow the Java engine to "warm up" i.e., JIT compile classes, cache DNS requests, etc the test was done in two phases. The first phase consisted of restarting the filter and running the first 10,000 messages through without measuring. The second phase consisted of starting the measurements. We believe this approach best simulates a sustained running environment. The best results just over 33,000 messages per minute were consistently achieved by running 256 filtering processes in parallel. Running with 1,4 and 16 threads as available in our home, small business and enterprise licenses resulted in about 200, 1000 and 4000 messages per minute. Be aware that the high end performance numbers are very dependent on a high performing DNS server setup in close network proximity to your SSFT installation. It is also important to note that these numbers only represent the actual spam filtering throughput. To achieve these performance levels, the SMTP service that access SSFT must be able to handle these high numbers of parallel operations as well. Installation and Administration SSFT requires a solid Java 1.6 environment. We test and run it under Redhat and MacOS X, but it should run under most UNIX environments. The installation is self contained in a single jar file which will store all files under /usr/local/solido/. Once installed, all configuration is handled by editing a simple text based configuration file and restarting the service. It is generally not necessary to do any post install configuration, however. When the filter is running, it is also possible to telnet into a simple console interface that allows you to see the status of filters and s which are currently being processed as well as basic statistical information. The spamfilter logs its work to a simple text based log file which can be auto rotated daily, weekly or monthly. Solido Systems Spam Filter Technology 5/6
6 Contact Information For more information regarding sales or to request further information, contact us at: Solido Systems att: Christer Hasse Troejborgvej Aarhus N Denmark tlf: [email protected] Solido Systems Spam Filter Technology 6/6
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Toolbox 4.3. System Requirements
Toolbox 4.3 February 2015 Contents Introduction... 2 Requirements for Toolbox 4.3... 3 Toolbox Applications... 3 Installing on Multiple Computers... 3 Concurrent Loading, Importing, Processing... 4 Client...
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
MAGENTO HOSTING Progressive Server Performance Improvements
MAGENTO HOSTING Progressive Server Performance Improvements Simple Helix, LLC 4092 Memorial Parkway Ste 202 Huntsville, AL 35802 [email protected] 1.866.963.0424 www.simplehelix.com 2 Table of Contents
S y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
ECE Mail System Overview. Pablo J. Rebollo ECE Network Operations Center
ECE Mail System Overview Pablo J. Rebollo ECE Network Operations Center Agenda Overview of ECE mail system How mail system works SPAM!!! ECE mail system statistics and examples Problems References Mail
Image Based Spam: White Paper
The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because
The Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
ELIXIR LOAD BALANCER 2
ELIXIR LOAD BALANCER 2 Overview Elixir Load Balancer for Elixir Repertoire Server 7.2.2 or greater provides software solution for load balancing of Elixir Repertoire Servers. As a pure Java based software
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers
JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers Dave Jaffe, PhD, Dell Inc. Michael Yuan, PhD, JBoss / RedHat June 14th, 2006 JBoss Inc. 2006 About us Dave Jaffe Works for Dell
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Features of The Grinder 3
Table of contents 1 Capabilities of The Grinder...2 2 Open Source... 2 3 Standards... 2 4 The Grinder Architecture... 3 5 Console...3 6 Statistics, Reports, Charts...4 7 Script... 4 8 The Grinder Plug-ins...
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Vendors Tested: McAfee Sophos Symantec Trend Micro Executive Summary Indusface was commissioned by Trend Micro Inc.
TRUSTWAVE SEG SPAMCENSOR EXPLAINED
.trust TRUSTWAVE SEG SPAMCENSOR EXPLAINED wave.com Updated October 9, 2007 Table of Contents About This Document 2 1 SpamCensor Defined 3 2 How Does SpamCensor Work? 3 3 How Are the Rules Made and Scored?
Web. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
A Modular Email Architecture Using Open Source Components
A Modular Email Architecture Using Open Source Components Presented to MVMRUG April 22, 2005 Scott Courtney Sine Nomine Associates Functional Goals SMTP inbound and outbound mail POP3 and IMAP4 mailbox
E-mail Filter. SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
E-mail Filter SurfControl E-mail Filter 5.0 for SMTP Getting Started Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company CONTENTS CONTENTS INTRODUCTION About This Document...2 Product
Tableau Server Scalability Explained
Tableau Server Scalability Explained Author: Neelesh Kamkolkar Tableau Software July 2013 p2 Executive Summary In March 2013, we ran scalability tests to understand the scalability of Tableau 8.0. We wanted
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
IronPort X1000 Email Security System
I r o n P o r t A p p l i a n c e s T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000 Email Security System O v
NetIQ Access Manager 4.1
White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Architecture Guide. SDL Campaign Manager 4.0.0
Architecture Guide SDL Campaign Manager 4.0.0 Version Management Version history Version Date Author Distribution 1.0 22 August 2014 Pete Trevitt & Lisa Watts Release Related Documents Name Campaign Manager
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
MailEnable Scalability White Paper Version 1.2
MailEnable Scalability White Paper Version 1.2 Table of Contents 1 Overview...2 2 Core architecture...3 2.1 Configuration repository...3 2.2 Storage repository...3 2.3 Connectors...3 2.3.1 SMTP Connector...3
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
Document Capture and Distribution
Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
Hardware Recommendations
Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at
System Requirements Table of contents
Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5
Archival Data Format Requirements
Archival Data Format Requirements July 2004 The Royal Library, Copenhagen, Denmark The State and University Library, Århus, Denmark Main author: Steen S. Christensen The Royal Library Postbox 2149 1016
Thexyz Premium Webmail
Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,
Tableau Server 7.0 scalability
Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different
POWER ALL GLOBAL FILE SYSTEM (PGFS)
POWER ALL GLOBAL FILE SYSTEM (PGFS) Defining next generation of global storage grid Power All Networks Ltd. Technical Whitepaper April 2008, version 1.01 Table of Content 1. Introduction.. 3 2. Paradigm
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Spam Track Wednesday 1 March, 2006 APRICOT Perth, Australia James Carpinter & Ray Hunt Dept. of Computer Science and Software
Spamfilter Relay Mailserver
Spamfilter Relay Mailserver Mark McSweeney CentraLUG, February 1, 2010 Overview Scope Little bit about me Why I built the spamfilter Deployment environment Spamfilter details Tuning and maintainance Other
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses
Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from
Network Management and Monitoring
Alberto Escudero Pascual [email protected] 1 Goals We need to know what we want, to be able to know what we need Are Monitoring and Network Management the same thing? Do not follow tools, follow methods! 2 Table
Novell Open Workgroup Suite
Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.
AgencyPortal v5.1 Performance Test Summary Table of Contents
AgencyPortal v5.1 Performance Test Summary Table of Contents 1. Testing Approach 2 2. Server Profiles 3 3. Software Profiles 3 4. Server Benchmark Summary 4 4.1 Account Template 4 4.1.1 Response Time 4
Agility Database Scalability Testing
Agility Database Scalability Testing V1.6 November 11, 2012 Prepared by on behalf of Table of Contents 1 Introduction... 4 1.1 Brief... 4 2 Scope... 5 3 Test Approach... 6 4 Test environment setup... 7
AVG Email Server Edition
AVG Email Server Edition User Manual Document revision 2015.11 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
PLESK 7 NEW FEATURES HOW-TO RESOURCES
PLESK 7 NEW FEATURES HOW-TO RESOURCES Copyright (C) 1999-2004 SWsoft, Inc. All rights reserved. Distribution of this work or derivative of this work in any form is prohibited unless prior written permission
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
VBAK Agent 64-bit for Windows Version 5.61.2248 Release Notes 30 th March 2007
VBAK Agent 64-bit for Windows Version 5.61.2248 Release Notes 30 th March 2007 1 OVERVIEW This document contains release notes for the new release of the Windows Agent 64-bit. This document contains release
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201 Course Overview Through this 2-day instructor-led classroom or online virtual training, participants
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Large-Scale Test Mining
Large-Scale Test Mining SIAM Conference on Data Mining Text Mining 2010 Alan Ratner Northrop Grumman Information Systems NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Aim Identify topic and language/script/coding
VERITAS Cluster Server Traffic Director Option. Product Overview
VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1
AppDynamics Lite Performance Benchmark. For KonaKart E-commerce Server (Tomcat/JSP/Struts)
AppDynamics Lite Performance Benchmark For KonaKart E-commerce Server (Tomcat/JSP/Struts) At AppDynamics, we constantly run a lot of performance overhead tests and benchmarks with all kinds of Java/J2EE
How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power
Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document
Effective Open-Source Spam Filtering
Effective Open-Source Spam Filtering For Enterprise Chris Lewis Thomas Choi October 2008 Agenda Introduction Background Something New - Rationale The Open-Source Project Basic Requirements Components IntegrationI
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
SERENA SOFTWARE Authors: Bill Weingarz, Pete Dohner, Kartik Raghavan, Amitav Chakravartty
SERENA SOFTWARE Scaling for the Enterprise Authors: Bill Weingarz, Pete Dohner, Kartik Raghavan, Amitav Chakravartty 2012-05-07 Table of Contents Who Should Read This Paper?... 3 Introduction... 3 Architecture...
quality hosting solution. we manage your hosting. so that you can manage your business.
quality hosting solution. we manage your hosting. so that you can manage your business. Orisma Technology Co., Ltd. 1104/2 Pattanakarn Rd. Suanluang, Suanluang Bangkok 10250, Thailand Tel. 66 2187 2591-3
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
Cisco IronPort Email Security Plug-in 7.3 Administrator Guide
Cisco IronPort Email Security Plug-in 7.3 Administrator Guide May 01, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
PATROL Internet Server Manager Technical Brief
PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server
Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage
White Paper Scaling Objectivity Database Performance with Panasas Scale-Out NAS Storage A Benchmark Report August 211 Background Objectivity/DB uses a powerful distributed processing architecture to manage
alternative solutions, including: STRONG SECURITY for managing these security concerns. PLATFORM CHOICE LOW TOTAL COST OF OWNERSHIP
9.0 Welcome to FirstClass 9.0, the latest and most powerful version of the one of the industry s leading solutions for communication, collaboration, content management, and online networking. This document
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
