SpamAssassin: A practical guide to integration and configuration
Alistair McDonald更新时间:2021-04-29 19:21:16
最新章节:Index封面
书名页
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
What This Book Covers
What You Need for Using This Book
Conventions
Reader Feedback
Customer Support
Downloading the Example Code for the Book
Errata
Questions
Chapter 1. Introducing Spam
Defining Spam
The Costs of Spam
Spam and the Law
Summary
Chapter 2. Spam and Anti-Spam Techniques
Spamming Techniques
Anti-Spam Techniques
Spam Filtering Services
Anti-Spam Tools
Summary
Chapter 3. Open Relays
Email Delivery
Open Relay Tests
MTA Configuration
Summary
Chapter 4. Protecting Email Addresses
Websites
Usenet
Trojan Software
Mailing Lists and Archives
Registration for Websites
Employees
Business Cards and Promotional Material
How Spammers Verify Email Addresses
Summary
Chapter 5. Detecting Spam
Content Tests
Header Tests
DNS-Based Blacklists
Statistical Tests
Message Recognition
URL Recognition
Examining Headers
Reporting Spammers
Valid Bulk Email Delivery
Summary
Chapter 6. Installing SpamAssassin
Building from Source
Using CPAN
Installing by Hand
Resolving Build Failures
Packaged Distributions
Verifying the Installation
Upgrading
Uninstalling
SpamAssassin Components
Summary
Chapter 7. Configuration Files
Configuration Files
Rule Files
Summary
Chapter 8. Using SpamAssassin
SpamAssassin as a Daemon
SpamAssassin and Procmail
Integrating SpamAssassin into the MTA
Testing and Troubleshooting
Rejecting Spam
Summary
Chapter 9. Bayesian Filtering
Scoring
Training
Confirming Operation
Filter Training
Disabling Bayesian Filtering
Summary
Chapter 10. Look and Feel
Headers
Reports
Subject Rewriting
Summary
Chapter 11. Network Tests
RBLs
SURBLs
Vipul's Razor
Pyzor
DCC
Spamtraps
Summary
Chapter 12. Rules
Writing Rules
Using Other Rulesets
Summary
Chapter 13. Improving Filtering
Whitelists and Blacklists
The Auto-Whitelist
Resolving Incorrect Classifications
Character Sets and Languages
Summary
Chapter 14. Performance
Bottlenecks
Performance Improvement Methodology
Using SQL
Summary
Chapter 15. Housekeeping and Reporting
Separating Levels of Spam
Detecting When SpamAssassin Fails
Spam and Ham Reports
Summary
Chapter 16. Building an Anti-Spam Gateway
Choosing a PC Platform
Choosing a Linux Distribution
Configuring Postfix
Installing Amavisd-new
Configuring Amavisd-new
Configuring Postfix to Run Amavisd-new
Configuring External Services
Firewall Configuration
Backups
Testing
Going Live
Summary
Chapter 17. Email Clients
General Configuration Rules
Microsoft Outlook
Microsoft Outlook Express
Mozilla Thunderbird
Qualcomm Eudora
Summary
Chapter 18. Choosing Other Spam Tools
Spam Policies
Evaluating Spam Filters
Configuring the Second Filter
Other Techniques
Summary
Appendix A. Glossary
Index
更新时间:2021-04-29 19:21:16