About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 40. Chapters: Anti-spam techniques, Proofpoint, Inc., Feedback loop, Barracuda Networks, Blue Frog, Challenge-response spam filtering, Adblock Plus, ReCAPTCHA, Anne P. Mitchell, Tarpit, Memory bound function, Daniel Balsam, Callback verification, Brian Krebs, Spamgourmet, Sendio, Ad filtering, Open Relay Behavior-modification System, SMTP proxy, TrashMail, Boxbe, Mailinator, Content filtering, Postini, MAAWG, Cost-based anti-spam systems, Roaring Penguin Software, SpamBayes, Stockade, Project Honey Pot, Red Condor, Policyd-weight, MailChannels, Microsoft Forefront Online Protection for Exchange, Sam Spade, Okopipi, SHRED, CAUCE, Dave the Resurrector, Context filtering, Cleanfeed, Hexamail Guard, Timothy Walton, GTUBE, Microsoft Exchange Hosted Services, Conference on Email and Anti-Spam, Anti-spam appliances, Domain Assurance Council, PureMessage, CleanMail Antispam, Mule, Chung Kwei, Cooperative database. Excerpt: To prevent e-mail spam (aka unsolicited bulk email), both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate e-mail vs. not rejecting all spam, and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by e-mail administrators, those that can be automated by e-mail senders and those employed by researchers and law enforcement officials. People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than having desired e-mail ("ham") blocked (false positives). Trying to balance ...