CSC 379:Week 1, Group 4: Difference between revisions
Jump to navigation
Jump to search
(→Comparison of Techniques: Changed cellspacing and cellpadding for table to improve appearance) |
(→Comparison of Techniques: Tried to improve readability of table code with comment hyphen-bars.) |
||
Line 47: | Line 47: | ||
! Our Rating | ! Our Rating | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|Block domains of "known" spammers | |Block domains of "known" spammers | ||
| | | | ||
Line 55: | Line 56: | ||
*Lots of spam still gets through (put in percent from sbl/sbl-faq) | *Lots of spam still gets through (put in percent from sbl/sbl-faq) | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 64: | Line 66: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|require users to request permission to send you e-mail (eg Earthlink spam blocker) | |require users to request permission to send you e-mail (eg Earthlink spam blocker) | ||
| | | | ||
Line 73: | Line 76: | ||
*Impossible to implement correctly | *Impossible to implement correctly | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 82: | Line 86: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|Charge for e-mail sent | |Charge for e-mail sent | ||
| | | | ||
Line 89: | Line 94: | ||
*Where does the money go? | *Where does the money go? | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 98: | Line 104: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|opt-in for commercial email | |opt-in for commercial email | ||
| | | | ||
Line 105: | Line 112: | ||
*There are many fraudulent emails in which the opt-out link sends you to an unwanted web page. | *There are many fraudulent emails in which the opt-out link sends you to an unwanted web page. | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 114: | Line 122: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|domain authentication | |domain authentication | ||
| | | | ||
Line 123: | Line 132: | ||
*Hard for independents/individuals to set up their own mail server | *Hard for independents/individuals to set up their own mail server | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 132: | Line 142: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|bounties | |bounties | ||
| | | | ||
Line 139: | Line 150: | ||
*Costs government (tax-payers) money | *Costs government (tax-payers) money | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 148: | Line 160: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|The "goodmail" approach | |The "goodmail" approach | ||
| | | | ||
Line 154: | Line 167: | ||
*Companies can bypass the spam filter by paying money | *Companies can bypass the spam filter by paying money | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 163: | Line 177: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|Bonds with escrow agencies | |Bonds with escrow agencies | ||
|pro | |pro | ||
|con | |con | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- | ||
Line 176: | Line 192: | ||
|} | |} | ||
|-valign="top" | |-valign="top" | ||
<!-----------------------------------------------------------------------------> | |||
|client-side filtering | |client-side filtering | ||
|pro | |pro | ||
Line 181: | Line 198: | ||
*Only as good as user or algorithms/heuristics at identifying spam | *Only as good as user or algorithms/heuristics at identifying spam | ||
| | | | ||
<!-----------------------------------------------------------------------------> | |||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | {| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | ||
|- | |- |
Revision as of 01:17, 7 July 2007
Internal Use Only
Group members: Nick Principe / naprinci@gmail.com / AIM: mahoubaka
- block domains or even top-level domains "known" to be large senders of spam
- Spamhaus Block List
- see faq also
- Spamhaus Block List
- require users to request permission to send you e-mail (eg Earthlink spam blocker)
- Charge for e-mail sent
- opt-in for commercial email
- domain authentication
- bounties
- the "goodmail" approach
- bond with escrow agencies
- client-side filtering
Spam Prevention Techniques
Comparison of Techniques
Technique Name | Pros | Cons | Our Rating | |||||
---|---|---|---|---|---|---|---|---|
Block domains of "known" spammers |
|
|
| |||||
require users to request permission to send you e-mail (eg Earthlink spam blocker) |
|
|
| |||||
Charge for e-mail sent |
|
|
| |||||
opt-in for commercial email |
|
|
| |||||
domain authentication |
|
|
| |||||
bounties |
|
|
| |||||
The "goodmail" approach |
|
|
| |||||
Bonds with escrow agencies | pro | con |
| |||||
client-side filtering | pro |
|
|
Technique Details
Block domains of "known" spammers
- Summary point 1
- Summary point 2
- Link 1