Solved

spamassassin, bayes ham and spam

Posted on 2004-08-27
1
923 Views
Last Modified: 2012-06-21
I am a little bit lazy and looking for a "well/all ready trained" bayes filter for SA.

If the noting like this I need an howto:
Create a cyrus mailbox where I can forward spam
Create a cyrus mailbox where I can forward ham
Use sa-learn to read from this mailboxes to train the bayes.

p.s.: I allready now hot to configure curys and to create mailboxes .-) My problem is to use sa-learn.
0
Comment
Question by:Oliver_Dornauf
1 Comment
 
LVL 2

Accepted Solution

by:
fluffdune earned 125 total points
ID: 11938421
To ease up your mind I can recommend ftp://spamarchive.org/pub/archives/submit/ where there are a lot of collected spam. Use it with "sa-learn --showdots --spam --mbox" to learn it.

I haven't worked with cyrus but in Qmail we just create an alias .qmail-file containing the command I want to run.

/Fluff
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
fsstat very high only on nfs client side rhel 10 102
E-mail settings for Fail2ban 7 130
How to get IPA working with samba on RHEL 6? 1 90
Vmware tools installation in ubuntu 14.04 11 100
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now