CSC 379:Week 1, Group 4: Difference between revisions
Jump to navigation
Jump to search
m (→Comparison of Techniques: capitalization/formatting of techniques) |
|||
Line 116: | Line 116: | ||
|- | |- | ||
| style="background:#00ff00;border:1px solid white" width=2px | | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width=2px | | | style="background:#cccccc;border:1px solid white" width=2px | | ||
|} | |} | ||
Line 154: | Line 154: | ||
|- | |- | ||
| style="background:#00ff00;border:1px solid white" width=2px | | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width=2px | | | style="background:#cccccc;border:1px solid white" width=2px | | ||
| style="background:#cccccc;border:1px solid white" width=2px | | | style="background:#cccccc;border:1px solid white" width=2px | | ||
Line 197: | Line 197: | ||
| | | | ||
*Only as good as user or algorithms/heuristics at identifying spam | *Only as good as user or algorithms/heuristics at identifying spam | ||
*Spam emails are stopped, they are simply not read. | |||
| | | | ||
<!-----------------------------------------------------------------------------> | <!-----------------------------------------------------------------------------> | ||
Line 202: | Line 203: | ||
|- | |- | ||
| style="background:#00ff00;border:1px solid white" width=2px | | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
| style="background:# | | style="background:#00ff00;border:1px solid white" width=2px | | ||
|} | |} | ||
|} | |} |
Revision as of 01:43, 7 July 2007
Internal Use Only
Group members: Nick Principe / naprinci@gmail.com / AIM: mahoubaka
- block domains or even top-level domains "known" to be large senders of spam
- Spamhaus Block List
- see faq also
- Spamhaus Block List
- require users to request permission to send you e-mail (eg Earthlink spam blocker)
- Charge for e-mail sent
- opt-in for commercial email
- domain authentication
- bounties
- the "goodmail" approach
- bond with escrow agencies
- client-side filtering
Spam Prevention Techniques
Comparison of Techniques
Technique | Pros | Cons | Our Rating | |||||
---|---|---|---|---|---|---|---|---|
Block domains of "known" spammers |
|
|
| |||||
Require users to request permission to send you e-mail (e.g. Earthlink spam blocker) |
|
|
| |||||
Charge for e-mail sent |
|
|
| |||||
Opt-in for commercial email |
|
|
| |||||
Domain authentication |
|
|
| |||||
Bounties |
|
|
| |||||
The "Goodmail" approach |
|
|
| |||||
Bonds with escrow agencies | pro | con |
| |||||
Client-side filtering | pro |
|
|
Technique Details
Block domains of "known" spammers
- Summary point 1
- Summary point 2
- Link 1