Still have a problem? Ask for help at our discussion forum.


Advanced Search

 »  Home  »  Security  »  How to use Spam filters
How to use Spam filters
Published  06/19/2011 | Security | Rating:
How to use Spam filters
Spam filtering is one way to reduce the impact of the problem on the individual user (though it does nothing to reduce the effect of the network traffic generated by spam). In its simplest form, a spam filter is a mechanism for classifying a message as either spam or not spam. There are many techniques for classifying a message. It can be examined for “spam-markers” such as common spam subjects, known spammer addresses, known mail forwarding machines, or simply common spam phrases. The header and/or the body can be examined for these markers. Another method is to classify all messages not from known addresses as spam. Another is to compare with messages that others have received, and find common spam messages. A popular spam filter is SpamAssassin. It’s an extensible email filter that is used to identify spam. Once identified, you can optionally tag it as spam for later filtering. It also provides a command line tool to perform filtering, a client-server system for larger volumes and Mail::SpamAssassin, a set of Perl modules allowing SpamAssassin to be used in a wide variety of email system. It’s also become much easier to blacklist and whitelist messages than before. SpamAssassin also comes equipped with Bayesian filters that can identify spam and non-spam (called “ham”) based on certain keywords or “tokens” that appear frequently in spam messages. The more spam (and ham) you filter, the better it gets at detecting spam. If you can’t use a filter, what then? The most common solution is to have multiple email addresses. One approach is to select one to be your “private” guarded email address - much like an unlisted phone number - that you never use in situations where the email address would be harvested for spam mailing lists. The other approach is to generate “throw-away” email addresses that you use only for a limited time (say when registering a product), and can safely ignore thereafter. And of course both approaches can be used at the same time.
How would you rate the quality of this article?
1 2 3 4 5
Poor Excellent

Enter the security code shown below:

Add comment

Popular Articles
  1. List of IrfanView Shortcuts
  2. When replying to a message in Outlook, a copy goes into the Inbox
  3. Precautions to take while using internet in Cyber Cafes
  4. List of uTorrent Shortcuts
  5. BIOS Beep Codes for AMIBIOS (American Megatrends Inc.) and Award BIOS
No popular articles found.