CSC 379:Week 1, Group 4: Difference between revisions
Jump to navigation
Jump to search
(added example rating system code) |
(→Internal Use Only: Modified the example rating system code) |
||
Line 28: | Line 28: | ||
[http://www.spamlaws.com/articles/usf.pdf huge paper on this subject] | [http://www.spamlaws.com/articles/usf.pdf huge paper on this subject] | ||
{| border="1" cellpadding=" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|+'''Example rating system''' | |+'''Example rating system''' | ||
|- | |- | ||
| style="background:#00ff00;border:1px solid white" | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width= | | style="background:#cccccc;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width= | | style="background:#cccccc;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width= | | style="background:#cccccc;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width= | | style="background:#cccccc;border:1px solid white" width=2px | | ||
|} | |} | ||
Revision as of 01:05, 7 July 2007
Internal Use Only
Group members: Nick Principe / naprinci@gmail.com / AIM: mahoubaka
- block domains or even top-level domains "known" to be large senders of spam
- Spamhaus Block List
- see faq also
- Spamhaus Block List
- require users to request permission to send you e-mail (eg Earthlink spam blocker)
- Charge for e-mail sent
- opt-in for commercial email
- domain authentication
- bounties
- the "goodmail" approach
- bond with escrow agencies
- client-side filtering
Spam Prevention Techniques
Comparison of Techniques
Technique Name | Pros | Cons | Our Rating |
---|---|---|---|
Block domains of "known" spammers |
|
|
x stars! |
require users to request permission to send you e-mail (eg Earthlink spam blocker) |
|
|
4 |
Charge for e-mail sent |
|
|
4 |
opt-in for commercial email |
|
|
4 |
domain authentication |
|
|
4 |
bounties |
|
|
4 |
The "goodmail" approach |
|
|
4 |
Bonds with escrow agencies | pro | con | 4 |
client-side filtering | pro |
|
4 |
Technique Details
Block domains of "known" spammers
- Summary point 1
- Summary point 2
- Link 1