Oracle Consulting Oracle Training Oracle Support Development
Home
Catalog
Oracle Books
SQL Server Books
IT Books
Job Interview Books
eBooks
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
image
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
 Phone
 800-766-1884
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books
image
image

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle

STATSPACK Viewer

Privacy Policy

 

   
 

ss

Oracle Tips by Burleson 

Web Stalkers
Chapter 13 - Spam, Spam, Spam, Spam

Using Spam Control Programs

A spam filter that targets and rejects all e-mail from a list of known spammers also suffers from two major flaws.  The first is that the list will never be complete.  Spammers jump between ISPs and make hundreds of almost imperceptible changes to their e-mail addresses, effectively flooding a user’s inbox with messages from the same spammer with a new address.  The second way spammers thwart this type of filter is to actually break into another e-mail server and use that server to send their spam messages.  If the hi-jacked server is identified by the system as a known spammer, it is possible that future legitimate e-mails from this server will not make it through.

In addition to the word list and address filters, there are other methods employed by commercially available anti-spam programs.  These programs use various methods to determine what the user considers spam.  One approach is to use a statistical analysis scheme known as Bayesian Statistics.  The Bayesian approach is powerful because it promotes increasing accuracy based on historical data.

The user of the program identifies messages as spam and instructs the program to delete them.  The program essentially learns what is spam based on this input from the user, and it automatically places subsequent messages with similar characteristics in a special folder.  The user may view the contents of this special folder to ensure no legitimate e-mail has been mistakenly placed there.

Several anti-spam programs are listed below.  Many of these programs use a variety of the approaches described above.  Their inclusion is not an endorsement of accuracy, but merely a starting point for additional research.

  • SpamBayes (spambayes.sourceforge.net)
     

  • SpamInspector (www.giantcompany.com)
     

  • SpamEater (www.hms.com)


The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert
 

http://www.rampant-books.com/book_2004_2_stalkers.htm


Download your Oracle scripts now:

www.oracle-script.com

The definitive Oracle Script collection for every Oracle professional DBA

Linux Oracle commands syntax poster

ION Oracle tuning software

Oracle data dictionary reference poster



Oracle Forum

BC Oracle consulting support training

BC remote Oracle DBA   

 

   

 Copyright © 1996 -2016 by Burleson. All rights reserved.


Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks