AntiSpam

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.

Share tech news, updates, or what's on your mind.

Sign up to Post

Mailwasher Pro
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Excellent, I think a lot of users get stuck on the email settings parts and what they mean, so this guide makes that a lot clearer.
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comments Nick and I'm glad you approve. I'm writing these articles so that people can learn to use the power of this tool and enjoy it's functionality just as I have been for so many years.

Regards, Andrew
0
Introducing the "443 Security Simplified" Podcast
LVL 1
Introducing the "443 Security Simplified" Podcast

This new podcast puts you inside the minds of leading white-hat hackers and security researchers. Hosts Marc Laliberte and Corey Nachreiner turn complex security concepts into easily understood and actionable insights on the latest cyber security headlines and trends.

Mailwasher Pro
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Thanks again Andrew, you write so well!
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Thank you very much for the kind compliment Nick!

If you would be so kind as to endorse the article by clicking the thumbs up at the bottom of the article, (to the left of the word comment) I'd very much appreciate it :)

Part-4 of the series is almost written and will be published soon!

Best regards,

Andrew
0
Mailwasher Pro
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
1

Expert Comment

by:Nick Bolton
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.
0
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.

Thanks for the kind comment Nick and once again, welcome to Experts Exchange! Watch out for Part-3, being written now and will soon be published.

Best...

Andrew Leniart
0
Mailwasher Pro
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
1

Expert Comment

by:Nick Bolton
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!
1
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!

Hi Nick and welcome to Experts Exchange! Thank you for your kind comment and also for endorsing the article with a thumbs up. That means a lot to me so much appreciated.
0
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense Magazine.
1
Phishing emails are a popular malware delivery vehicle for attack. While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to come from a trusted source. Ready to learn more?
1
ScamAlert
An introduction to the wonderful sport of Scam Baiting. Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
21

Expert Comment

by:Tom Crawford
Comment Utility
Thank you Andrew, hope to put  to good use and enjoyment.
Tom.
0
LVL 19

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for the comments and endorsements Andrew and Tom, very much appreciated and help me out.  I'm glad you both got some value of the article.

Regards,
Andrew
0
Email Encryption

Encryption for Business



Encryption ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. The information passed between companies and clients needs to be encrypted as the contents are mostly confidential. Any business owner should know that the primary attack method to compromise sensitive company data is through email. Email is the chink in every organisation's armor and hackers will target that vulnerability. Encryption is necessary for companies as cyber criminals prey on emails that include attachments with private data, links, bank details and any other forms of crucial information.

With email encryption, a company can protect its sensitive information from cyber criminals by only allowing certain users access to the emails you send. Consider this, if you are away on vacation and want to send a pictured postcard to a friend, would the contents of your postcard include highly confidential information, for instance, bank details or the home alarm code? Of course not. Just like a picture postcard, a non-encrypted email can be exposed for all to see.

Businesses use email encryption to have more control and protection over sensitive information that they may share over email. The NSA and AT&T’s Spying Pact is a perfect example of…
0
Ransomware
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
4
LVL 42

Expert Comment

by:Mahesh
Comment Utility
Hi
If you could please post / incorporate some examples as well how Ransomware encrypt our data and further ask for payments to decrypt data..it will be really helpful.
Unless we come to know what exactly it can target, we would not realize its impact and importance
Article looks well and can give good start

Mahesh.
0
Operating system developers such as Microsoft and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a firewall. Is this built in protection enough to keep threats at bay?
 
Many people do not realize modern day virus threats come in many forms. The viruses themselves haven't changed much, but the methods by which they infect computers are constantly evolving. Virus developers spend most of their time discovering new ways to infect computers with viruses rather than developing new types of viruses.
 

So what is a computer virus?

computerVirus-TrueIT.jpgA virus is essentially a self replicating file stored on a computer system that was not authorized by the user to be there. The behavior of the file may have varying characteristics. It may be used to collect, destroy or manipulate user data without their consent.
 
Fairly often the news discusses some new hacking attempt on a major computer system. Hackers can often break into these systems by planting viruses on machines that are connected to them. These viruses can collect data or give them access to files necessary to get deeper into the systems.
 

Are these threats real?


Companies such as Kaspersky, Norton and McAfee regularly publish virus infections as they are discovered. Norton actually has a threat security…
3
LVL 1

Author Comment

by:Tom Price
Comment Utility
Hello there Jim,

I've tried uploading the article before with links and 1 of the editors did not approved it...should i put back the links?

I will add some headers and ad an image.

Please let me know when the article was approved and "went live" ok?

Many thanks!
Tom.
0

Expert Comment

by:Jame Griffin
Comment Utility
Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.
0
Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a professional (Like us!) to do it for you.  We are not responsible for anything that happens to your computer by following or not following these directions.  This information is for educational purposes only.  Your mileage may vary.

Now that that is out of the way – where to start?  The first step is knowing what to look for.  A lot of software updates install what I call “JunkWare” with their standard updates, because they get some sort of financial incentive for doing so.  Java Updates are a classic example, shown here circled in red:

Taskbar Pic
When you click on it, and go to install the update, it generally tries to sneak a toolbar in to the installation, usually the Ask! toolbar.  In my case, it’s trying to install McAfee Security Scan:

Security Scan
Just uncheck it and choose next.  What happens though, is that the average home user has 2 or 3 years worth of these “free” applications on their computer.  Typically what we see are lots of extra toolbars, animated cursors, free coupon printers, and free computer tuneup and virus scanning applications.  What YOU see are lots of popups, ads for things, and clutter all over your web browser, and extreme slowness.

But there’s good news!  We’re …
4
LVL 31

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Great article.  I like all your suggestions and use most of them already.  I would include running Tigzy's Roguekiller, not rebooting then running MBAM.
0

AntiSpam

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.