User talk:Antispam Standards

ESP (Eliminate Spam at Protocol level)
A antispam should have ESP technology to build an unbreakable, fool-proof privacy layer around your mailbox.

Directory Harvest Prevention
This feature tracks email spammers with invalid emails and count them automatically and it stops the response for that particular IP address immediately.

Email Traffic Control (Rate limit)
A antispam must have this feature which not only controls email traffic but also limits the Maximum number of simultaneous sessions allowed from each unique IP and Senders email id.

Virus Protection
An antivirus product should have a antivirus engine which should detect viruses, worms and Trojans, including Microsoft Office macro viruses, mobile malware, and other threats. built-in support for various archive formats, including Zip, RAR, Tar, Gzip, Bzip2, OLE2,Cabinet, CHM, BinHex, SIS and others.

Content Analysis
This special feature will declare an email as a spam on the bases of score, phrase and special links.

SPF: Senders Policy Framework
A antispam must have SPF which has inbuilt e-mail authentication protocol that verifies the origin of the e-mail and prevents forged mail from entering an organization.

SMTP Auth: Authenticate before SMTP
SMTP-AUTH extends SMTP to include an authentication step through which the client (Outlook / thunderbird) effectively logs in to the mail server during the process of sending mail. Servers which support SMTP-AUTH can usually be configured to require clients to use this extension, ensuring the true identity of the sender is known.

Reverse DNS, MX /A record check
A antispam should be capable to check whether the sender domain has a valid DNS record having A or MX entry, and in case it does not have, it should be blocked. This setting may be configured by administrator and can be applied for the entire domain configured on the server.

Challenge Response
With this unique feature senders can validate themselves with a couple of clicks and keystrokes. This works transparently to the recipient, and cannot be performed by spam engines.

JMail Accounts
The JMail sub-system is another unique, revolutionary and thoughtful feature of ESP. It allows custom JMail accounts to be created as programmable extensions to your mail account, and rules to be assigned to each such account. You can then invite trusted senders into your mailbox without compromising your privacy. Even if a trusted sender’s computer is hacked, or address book data (including your JMail id) is stolen, the JMail account is not accessible to anyone else without your permission. And the JMail accounts can be configured by you in a variety of ways to support common usage scenarios – newsletter subscription and online shopping are just two examples.

September 2008
Welcome to Wikipedia. Although everyone is welcome to contribute constructively to the encyclopedia, one or more of the external links you added do not comply with our guidelines for external links and have been removed. Wikipedia is not a collection of links; nor should it be used for advertising or promotion. Since Wikipedia uses nofollow tags, external links do not alter search engine rankings. If you feel the link should be added to the article, please discuss it on the before reinserting it. Please take a look at the welcome page to learn more about contributing to this encyclopedia. Versa geek  12:57, 2 September 2008 (UTC)

Sophisticated Spam
What will they think of next?

We're all familiar with e-mail spam offering prescription drugs, cut-rate software and herbal potions.

But spammers are becoming increasingly sophisticated in delivering ploys intended to dupe people into divulging personal information. Some of their most recent innovations are traps for people who might be seeking help with drug or alcohol addiction.

Some recent report, says that unsolicited e-mails offering information about alcohol or drug rehabilitation services could very well be spam.

Appearing new this summer was e-mail with the subject lines "Get help today with Drug Rehab Info" or "Overcome Alcoholism Today" illustrated with photographs of people who seem depressed, a report says.

According to a report It's one of their more sinister attacks, and if you open it, it will bring you to a sign-up page asking for your name, address and e-mail information. It's the first step in trying to get credit card information.

In an attempt to spread Trojan viruses, which can delete files or turn your computer into a spam-spewing zombie or snatch your e-mail addresses, spammers resort to both old and new ploys.

Some new spam tapped into consumer concerns over the mortgage crisis, high fuel prices and interest in current events. Some spammers disguised their missives as news alerts from legitimate news organizations.

In a particularly insidious example, spammers sent a message proclaiming the start of World War III. The e-mail contained what appeared to be a video link showing a mushroom cloud from a nuclear explosion. When recipients tried to play the video, they got a computer virus instead, the report said.

Spammers are taking advantage of social issues. They're reaching out and sending things that would catch people's eyes. The purpose of spam has changed over the last decade. It originally started out as people flexing their intellectual or programming abilities. Now it's migrated into more money-making schemes. Some emails promising nonstop online gambling fun and free products.

It is advisable that, don’t open any links or attachments in e-mail unless you know the sender. And even if it appears as if you're getting an e-mail form a bank or some other familiar institution, do not click on embedded links. Always use your own links you have stored.

Spam Nuisance


Spam has become much more than a major nuisance and a valuable waste of hard drive or server space; it can also severely affect employee productivity. For example, employees now spend more trying to filter legitimate email messages from the ever-increasing unwanted junk mail that floods their in-box. During this time-consuming and unproductive task, one or two important email messages often end up in the recycle bin. This can cause even greater frustration and lost time, not to mention a possible loss of sales and clients.

Spam also slows Internet access. A steady flow of spam can take up a large majority of a company’s bandwidth. This can hamper productivity, especially for anyone who must conduct online research or send email messages to clients on a regular basis. Even worse, spam messages may contain harmful viruses, Trojans or scripts that can cause even more damage and wasted time.

Some companies become so inundated with spam messages that they find it difficult to use their email system. Users may receive dozens or even more junk mail messages every single hour. According to recent surveys, approximately one out of every five email messages received is spam. An average employee will spend approximately 5 seconds to delete each unwanted message.

This may not seem like a large amount, but you must factor in the number of employees within your organization. If your company employs 30,000 people, each person ends up wasting valuable time and resources deleting spam. You can just imagine how much time and money in lost productivity is wasted per year!

Another scenario is becoming more common. One of your employees may accidentally open a spam message that contains a malicious script. This can cause the user’s computer to dial a 900-number or access a harmful website. This problem can grow out of control so quickly that every employee in your company may be required to obtain a new email address. Every client must be informed of the new contact information. This can wreak havoc on a small company with limited resources.

Make sure you purchase secure anti-spam protection for your company and verify that every employee’s computer uses it. You should also ensure your company server is well protected. This can reduce the amount of lost hours and money wasted each week due to spam.

Image copyright problem with Image:Spams4.png
Thanks for uploading Image:Spams4.png. The image has been identified as not specifying the copyright status of the image, which is required by Wikipedia's policy on images. If you don't indicate the copyright status of the image on the image's description page, using an appropriate copyright tag, it may be deleted some time in the next seven days. If you have uploaded other images, please verify that you have provided copyright information for them as well.

For more information on using images, see the following pages:
 * Image use policy
 * Image copyright tags

This is an automated notice by OrphanBot. For assistance on the image use policy, see Media copyright questions. 06:54, 24 September 2008 (UTC)