Ask any administrator who is responsible for ensuring a company's email infrastructure is as spam free as possible what they’re job is like, and they will answer that it is like fighting an ongoing battle.
Just like in a regular battle, you can expect some collateral damage. Collateral damage in an anti-spam solution context is when legitimate emails end up classified as spam, thus never reaching their intended recipient. This means that any server anti-spam solution you employ has to be tweaked to only stop real spam. This is achieved by applying the right technologies and the right settings.
However, no amount of technology and tweaking will give you 100% accuracy. Therefore, you will almost certainly end up with some legitimate mails being erroneously classified as spam. In the event this happens, you need to ensure you have a system in place to allow administrators or users to quickly and safely check for legitimate emails that have been misclassified and action them.
There are several technologies that can be useful in detecting actual spam emails, as well as keeping the rate of false positives to a minimum.
Here is a list of some of the most effective features to help you to decide which ones are most important for you:
- Whitelisting: Whitelisting allows you to provide your anti-spam solution with either a list of emails or domains. Any email that matches those criteria will never be marked as spam. Some advanced server anti-spam solutions will automatically whitelist the email addresses of recipients you send email to.
- Databases: Some solutions maintain databases that they regularly update which contain finger print data and other information that can be used by the anti-spam solutions to detect spam.
- Greylisting: This system will reject any email from a new source with a temporary error. Many spam mailing systems do not follow email standards and will not try to resend the email again, as legitimate email servers will.
- SPF (Sender policy framework): This system depends on an email’s source domain to list the email servers that are authorized to send on its behalf. This can be very helpful, especially when combating phishing emails that generally try to spoof legitimate domains to create a false sense of security. When an email for a domain is received from an unauthorized source, it is marked as spam.
- DNSBL (DNS blocklist): This is a system maintained by various third parties that use the DNS system as a database of sorts. Different providers provide different functionality, but essentially they all will allow the solution to query the database and check if the IP address which an email originates from has ever been caught sending spam.
- Bayesian: Bayesian is a technology where a statistical analysis is run on an email to determine if it is spam or not based on its content. This technology requires training with spam and legitimate emails to keep it up to date with the latest spam trends. This training can either be performed by the vendor, or even by your organization itself.
- Quarantine System: A quarantine system is a kind of vault in which spam is kept when caught. This can then by reviewed by either administrators, or in some solutions you can also allow review by the recipients themselves. The email can then be marked as legitimate if it was wrongly classified.
These are some of the most popular advanced technologies that can be used to detect spam. Choosing which one, or which combination, to deploy can help ensure your server anti-spam solution is an effective tool for the constant battle against spam.
Basic Computer Security Tutorial
The purpose of this tutorial is to provide basic security practices and information to help readers secure their computers against viruses, worms, trojans, spyware, adware, and hackers. It will provide information about security practices and how to implement them along with many tips that will help readers understand how to operate their computer more securely and safely.
Security Measures
If you do not at least have a personal firewall and anti-virus protection then you should not connect your computer to the internet. Not following these basic requirements is a perfect formula for getting trojans, viruses, worms, and backdoors which can ruin your system causing you to need to reformat your hard drive and re-install your operating system.
Summary of Security Requirements and Recommendations
This page summarizes reasonable security requirements and recommendations which all computer users which access the internet should take to protect themselves and the internet community in general. Subsequent pages will discuss the details of why these precautions should be taken and how to implement them.
Security Requirements
- Every computer that connects to the internet in any form MUST have a personal firewall.
- Every computer must have virus protection and it must be kept current.
- Only open e-mail attachments when you are sure the sender is really who it appears to be.
- Only browse the internet with a safe browser or change your browser settings to make it more secure.
- Operate at least one anti-spyware/anti-adware program on your system.
- Be very careful about downloading and installing programs from the internet, especially free ones.
- Keep your e-mail address confidential and NEVER post an email address in an unsecured web page on the internet. This practice reduces spam and chance of getting virus or scam emails. Use a different email address to give to those you are not sure you can trust. Be aware of how retailers may use your e-mail. Some retailers that are very well known have been known to sell email addresses.
- Be wary of malicious hyperlinks. Malicious hyperlinks are web links that look like they will take you to a particular site such as ebay.com but in reality they will take you to another site. Manually type the address of the site you want to go to rather than clicking on the link in an e-mail.
Security Recommendations
- Educate yourself about internet threats and how computers work.
- Encrypt any sensitive data that you store on your computer.
As the security field changes and computer intruders become more aggressive, it is becoming increasingly necessary for all computer users to have at least a basic understanding of the operation of computers. For example, they should know what a file is, that it requires a certain amount of space to store, and that there are different file types associated with specific applications that access them. For more help in this area, the Computer Technology Documentation Project Basic Computer Section is worthwhile reading.