Solved

Setup SpamAssassin with RH 9.0/Postfix-500 Pts

Posted on 2004-04-19
6
320 Views
Last Modified: 2013-12-15
Hello,

I have Rh 9.0 and have Postfix working perfectly..What i would like to do is implement a Spam filtering program to segregate out the junk email..Can anyone give me the work through for setting up Spam Assassian??

I would like a start to finish Doc and to potentially ask some questions on topics including in the Doc..Which is why i posted 500 PTS..
0
Comment
Question by:Johnysteaks
  • 2
6 Comments
 
LVL 10

Accepted Solution

by:
Mercantilum earned 168 total points
ID: 10862344
I'm sure you read this http://www.mirror.ac.uk/sites/spamassassin.taint.org/spamassassin.org/doc.html

Do you have some questions about this?
0
 
LVL 10

Expert Comment

by:Mercantilum
ID: 10862355
Step to step procedure, easy to read, here :

http://traxel.com/doc/spamassassin-setup.html
0
 
LVL 17

Assisted Solution

by:owensleftfoot
owensleftfoot earned 166 total points
ID: 10864207
Have a look at http://www.mailscanner.info/ Mailscanner is easy to setup, can scan your incoming (and outgoing) mail for viruses (using free anti-virus scanners for linux - look at the docs), filters spam in its own right and also integrates with spamassasin - the mailscanner docs will even give you instructions on how to set up spamassasin. It will also bring the dead back to life.

Ok so the last bit was exaggerated - the rest is true :)
0
 
LVL 44

Assisted Solution

by:Karl Heinz Kremer
Karl Heinz Kremer earned 166 total points
ID: 10873711
Are you running Procmail? If so, setting up Spamassassin is a two step process: Install the software, then add the Procmail rules that are part of the installation to your .procmailrc file.
If you are not yet running Procmail, set it up. It's one of the more useful packages that come with your Linux system.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Fine Tune your automatic Updates for Ubuntu / Debian
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now