Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Answers to Frequently Asked Questions Email Antispam Techniques and Email Filtering allowing others with dynamic IPs to use your email service. Post 34335 by Neo on Monday 17th of February 2003 01:56:19 PM
Old 02-17-2003
Thanks Norsk!

That is a great tip! Just the kind of great antispam technique this special topic forum needs. I have never heard of 'POP before SMTP'...

My mother (a grandmother and savvy net user) has been on the net (doing email) since 1992 and now says, for her, the Internet is "not fun anymore' because of the mountains of spam she receives.

I think spam is the number one problem on the net today...... recently I was overseas in an Internet kiosk and spent most of my 'on-line' time deleting a thousand junk message that accumlated over a day in airports and planes.....

Thanks! Neo
 

6 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Sql dynamic table / dynamic inserts

I have a file that reads File (X.txt) Contents of record 1: rdrDESTINATION_ADDRESS (String) "91 971502573813" rdrDESTINATION_IMSI (String) "000000000000000" rdrORIGINATING_ADDRESS (String) "d0 movies" rdrORIGINATING_IMSI (String) "000000000000000" rdrTRAFFIC_EVENT_TIME... (0 Replies)
Discussion started by: magedfawzy
0 Replies

2. Shell Programming and Scripting

Dynamic email attachments

Hi all, I am quite new to Unix shell scripting and I am trying to create a common function to send mail that is capable of adding multiple attachments. The script works if there is only one attachment. But when there is more than one, it just won't work. It gives a syntax message "Usage:... (3 Replies)
Discussion started by: dongzky
3 Replies

3. Red Hat

Need help in allowing symmetric cryptography[2]

I have encountered some problems in my school work. Here is the question: The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies

4. Homework & Coursework Questions

Need help in allowing symmetric cryptography[2]

The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. 4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies

5. Cybersecurity

IP Tables not allowing ports

Hi guys, I'm trying to configure iptables to only allow certain ports access. I set the first set of rules to block everything and then subsequently open ports as needed, but everything still seems to be blocked. I have read that the order matters (new to iptables), perhaps this is an issue.... (6 Replies)
Discussion started by: 3therk1ll
6 Replies

6. UNIX for Dummies Questions & Answers

Allowing External Scans

Hello! I run an HP Unix system which I host oracle databases on, as well as oracle based apps used by my company. My IA department needs to scan my files to ensure I am following IA procedures and check for vulnerabilities in scripts etc. The scan is coming from corporate, and they asked for... (2 Replies)
Discussion started by: hpuxguy
2 Replies
RAZOR-AGENTS(5) 					User Contributed Perl Documentation					   RAZOR-AGENTS(5)

NAME
Razor-Agents - Collection of files for checking, reporting, and revoking spam DESCRIPTION
Vipul's Razor is a distributed, collaborative, spam detection, reporting, and filtering network. The primary focus of the system is to identify and remove all email spam from the internet. Visit the website at http://razor.sourceforge.net/. USAGE
First a razorhome directory should be created where log, conf, and cached server information will live. This is done via "-create" option to razor-admin(1). See man page for details. You can immediately check spam using razor-check(1). See man page for details. To report spam, an identity must be registered. This is done via "-register" option to razor-admin(1). After that, razor-report(1) and razor-revoke(1) will work flawlessly. CONFIGURATION
All Razor-Agents share a configuration file. The contents of the configuration file are detailed in the razor-agent.conf(5) manpage. Config file is computed before razorhome, in the following order: -conf=/path/file.conf used if readable, else <home>/.razor/razor-agent.conf used if readable, else /etc/razor/razor-agent.conf used if readable, else all defaults are used. To see configuration defaults, do razor-admin -create -conf=/tmp/razor2-defaults.conf RAZORHOME
All Razor-Agents also share a razorhome directory, where identity, logging, and cached information about servers is stored. Razorhome is computed after configuration file, in the following order. -home=/tmp/razor/ used if readable, else 'razorhome' from configuration file used if readable, else <home>/.razor/ used if readable, else <home>/.razor/ is created. if that fails, no razorhome. NOTE: If there is no razorhome, razor-report and razor-revoke will not work unless you specify -ident=/path/identity razor-check will still work. FILES
Besides those listed at the end with their own manpages, Razor Agents also has the following files. razorhome/identity Usually a symlink to identity file containing user+pass. Used by razor-report(1) and razor-revoke(1). razorhome/razor-agent.log Default log file. To change, edit razor-agent.conf(5). razorhome/servers.*.lst Cached list of Razor Servers. If more than one, they are ordered by closest ping time. razorhome/server.<name>.lst Cached info for <name> server. The "srl" key in this file is compared against the server greeting, and if server's is greater, new cache info is retrieved from the server. EXAMPLES
razor-check -d -debuglevel=9 mbox Checks spam in mbox. prints numbers for those found to be spam. -d logs to stdout, -debuglevel=9 is verbose logging razor-admin -create -home=/home/chad/.razor -d -s Creates razorhome in /home/chad/.razor, log to stdout, does not connect to server (-s simulate). razor-report spam -debuglevel=0 sends spam to server, with no log msgs. AUTHORS
Vipul Ved Prakash, <mail@vipul.net> and Chad Norwood <chad@samo.org> SEE ALSO
razor-agent.conf(5), razor-check(1), razor-admin(1), razor-report(1), razor-revoke(1), razor-whitelist(5) perl v5.14.2 2008-07-21 RAZOR-AGENTS(5)
All times are GMT -4. The time now is 01:49 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy