Solved

Setup SpamAssassin with RH 9.0/Postfix-500 Pts

Posted on 2004-04-19
6
317 Views
Last Modified: 2013-12-15
Hello,

I have Rh 9.0 and have Postfix working perfectly..What i would like to do is implement a Spam filtering program to segregate out the junk email..Can anyone give me the work through for setting up Spam Assassian??

I would like a start to finish Doc and to potentially ask some questions on topics including in the Doc..Which is why i posted 500 PTS..
0
Comment
Question by:Johnysteaks
  • 2
6 Comments
 
LVL 10

Accepted Solution

by:
Mercantilum earned 168 total points
Comment Utility
I'm sure you read this http://www.mirror.ac.uk/sites/spamassassin.taint.org/spamassassin.org/doc.html

Do you have some questions about this?
0
 
LVL 10

Expert Comment

by:Mercantilum
Comment Utility
Step to step procedure, easy to read, here :

http://traxel.com/doc/spamassassin-setup.html
0
 
LVL 17

Assisted Solution

by:owensleftfoot
owensleftfoot earned 166 total points
Comment Utility
Have a look at http://www.mailscanner.info/ Mailscanner is easy to setup, can scan your incoming (and outgoing) mail for viruses (using free anti-virus scanners for linux - look at the docs), filters spam in its own right and also integrates with spamassasin - the mailscanner docs will even give you instructions on how to set up spamassasin. It will also bring the dead back to life.

Ok so the last bit was exaggerated - the rest is true :)
0
 
LVL 44

Assisted Solution

by:Karl Heinz Kremer
Karl Heinz Kremer earned 166 total points
Comment Utility
Are you running Procmail? If so, setting up Spamassassin is a two step process: Install the software, then add the Procmail rules that are part of the installation to your .procmailrc file.
If you are not yet running Procmail, set it up. It's one of the more useful packages that come with your Linux system.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now