AntiSpam

4K

Solutions

5

Articles & Videos

6K

Contributors

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.

Related Topics

  1. Exchange
  2. Email Servers
  3. Anti-Virus Apps
  4. Email Protocols
  5. Anti-Spyware
  6. Email Software
  7. Email Clients
  8. Outlook
  9. Security
  10. Linux
Refine results

Like millions of others, I wake up to view many spam messages on my devices. I dislike it immensely. Is there a string or are there strings of words and phrases that I can use without trying to come …

512 views
Free Tool: Port Scanner
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

ScamAlert
An introduction to the wonderful sport of Scam Baiting. Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
351 views

Dear Experts

We used act-on marketing tool to send email campaigns approx 4000 contacts as of not 77 opened and 45 bounced, but few who have opened they had received the mail in spam, these list is…

529 views

I was told that Malware bytes works with Norton and wouldn't be a redundant package to install on my pc.
I'm looking for second, third and fourth opinions.

753 views

Hi, we are deploying our own Exchange Mail server but do not have budget for Email security devices, such as Dell Sonicwall or Barracuda. How can anyone please suggest the best AV software (license) …

1381 views

Dear Experts

We have email accounts of the prospects, customers who purchased and who did not purchase,  over the years this has become huge list and is available in sales force automation software…

276 views

I started receiving the  same  response  from various email addresses

"SMTP error from remote mail server after end of data: 550 5.7.1 Rejected by CYREN-40-Customers Valid spam filter"

When I …

628 views

Implement SPF check on my Trend Micro IMSVA but a spam mail come through with status "Neutral". Is it possible to tune the config.ini file to block this type of email ?


Received-SPF: Neutral …

2115 views

I have configured my spf on the gateway. Is there any tool that can spoof my company domain such that I can stimulate a spoof email to my mail server and see whehter the gateway can block it or not.

357 views

How to configure DMARC / SPF and DKIM on my Exchange 2010 such that it can check the incoming email address of our company domain is delivered only dedicated IP address (ie, our antispam gateway).

398 views
How Do You Stack Up Against Your Peers?
How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for McAfee Endpoint Security 10.

Many thanks in advance.

245 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Trend Micro Office Scan 11.0.

Many thanks in advance.

258 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Symantec Endpoint Protection 14.0.

Many thanks in advance.

245 views

Any idea where the SMTP log file  is located in my IMSVA (Trend Micro InterScan Messaging Security Virtual Appliance) ? I need to backup the log file daily.

Thx

576 views

Hello Experts,

I am in a position where I need to make an email address visible on a website. Naturally, I’d much prefer not to have it harvested by spammers, or at least significantly reduce that …

14107 views

Hello All,

I have a problem that has been plaguing me for week now. I keep getting black listed. I have sniffers in all the key locations and have been running them for weeks and found nothing. …

14137 views

Hallo to all,

I am having this very irritating issue while installing Kaspersky Security for Exchange Server. I have successfully managed to install MS SQL 2012 Express Edition. But everytime I try…

482 views

Ok... I need some help clarifying details in an email header. Some one I know has been fished/whaled (which ever it is). I want to know how it was done.
A genuine email was sent from …

470 views

We have a customer who is on a local ISP's email & when they clicked on a "spoofed"
email, their inbox got erased.

This customer is not using our MTA (MS Exchange) : they simply tag onto their …

386 views
Announcing the Most Valuable Experts of 2016
Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Is there a way I can create a user that would have the right to manage the built-in anti-spam but not any other part of Exchange?  This would apply to all versions of Exchange.

436 views

Dear Experts

my domain is listed in spamhaus DBL , we have taken all measures for not sending promotional emails to the non-opted contacts and made  several requests to the spamhaus to remove  our …

3135 views

One of my clients has their email hosted by site5. One of their clients mail is being bounced back, as junk mailfor being on a spamhaus blacklist. I have checked by IP address & by domain name at …

26129 views

I am the designated admin for multiple MailChimp accounts.  Recently noticed one of our subscription links for a production site, seems to have one of my development domain names within the URL.

275 views

This is one of the most sophisticated attacks out there.

They went into one of my forms and grabbed the POST URL.  (e.g. postform.php).

In the past ten minutes I've been hit with over 3500 post…

781 views

Hi

One of our large customer, needs to change their Anti virus product from our recommended manufacturer to Microsoft Endpoint Protection as it is free for them.

As we have no experience with …

2106 views
Show more content
201506-LO-Top-001

AntiSpam

4K

Solutions

5

Articles & Videos

6K

Contributors

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.

Related Topics

  1. Exchange
  2. Email Servers
  3. Anti-Virus Apps
  4. Email Protocols
  5. Anti-Spyware
  6. Email Software