SpamAssassin: A practical guide to integration and configuration

In depth guide to implementing antispam solutions using SpamAssassin
Preview in Mapt

SpamAssassin: A practical guide to integration and configuration

Alistair McDonald

In depth guide to implementing antispam solutions using SpamAssassin
Mapt Subscription
FREE
$29.99/m after trial
eBook
$16.80
RRP $23.99
Save 29%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$16.80
$39.99
$29.99 p/m after trial
RRP $23.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


SpamAssassin: A practical guide to integration and configuration Book Cover
SpamAssassin: A practical guide to integration and configuration
$ 23.99
$ 16.80
Serverless Design Patterns and Best Practices Book Cover
Serverless Design Patterns and Best Practices
$ 35.99
$ 25.20
Buy 2 for $34.30
Save $25.68
Add to Cart

Book Details

ISBN 139781904811121
Paperback240 pages

Book Description

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.

Table of Contents

Chapter 1: Introducing Spam
Defining Spam
The Costs of Spam
Spam and the Law
Summary
Chapter 2: Spam and Anti-Spam Techniques
Spamming Techniques
Anti-Spam Techniques
Spam Filtering Services
Anti-Spam Tools
Summary
Chapter 3: Open Relays
Email Delivery
Open Relay Tests
MTA Configuration
Summary
Chapter 4: Protecting Email Addresses
Websites
Usenet
Trojan Software
Mailing Lists and Archives
Registration for Websites
Employees
Business Cards and Promotional Material
How Spammers Verify Email Addresses
Summary
Chapter 5: Detecting Spam
Content Tests
Header Tests
DNS-Based Blacklists
Statistical Tests
Message Recognition
URL Recognition
Examining Headers
Reporting Spammers
Valid Bulk Email Delivery
Summary
Chapter 6: Installing SpamAssassin
Building from Source
Using CPAN
Installing by Hand
Resolving Build Failures
Packaged Distributions
Verifying the Installation
Upgrading
Uninstalling
SpamAssassin Components
Summary
Chapter 7: Configuration Files
Configuration Files
Rule Files
Summary
Chapter 8: Using SpamAssassin
SpamAssassin as a Daemon
SpamAssassin and Procmail
Integrating SpamAssassin into the MTA
Testing and Troubleshooting
Rejecting Spam
Summary
Chapter 9: Bayesian Filtering
Scoring
Training
Confirming Operation
Filter Training
Disabling Bayesian Filtering
Summary
Chapter 10: Look and Feel
Headers
Reports
Subject Rewriting
Summary
Chapter 11: Network Tests
RBLs
SURBLs
Vipul's Razor
Pyzor
DCC
Spamtraps
Summary
Chapter 12: Rules
Writing Rules
Using Other Rulesets
Summary
Chapter 13: Improving Filtering
Whitelists and Blacklists
The Auto-Whitelist
Resolving Incorrect Classifications
Character Sets and Languages
Summary
Chapter 14: Performance
Bottlenecks
Performance Improvement Methodology
Using SQL
Summary
Chapter 15: Housekeeping and Reporting
Separating Levels of Spam
Detecting When SpamAssassin Fails
Spam and Ham Reports
Summary
Chapter 16: Building an Anti-Spam Gateway
Choosing a PC Platform
Choosing a Linux Distribution
Configuring Postfix
Installing Amavisd-new
Configuring Amavisd-new
Configuring Postfix to Run Amavisd-new
Configuring External Services
Firewall Configuration
Backups
Testing
Going Live
Summary
Chapter 17: Email Clients
General Configuration Rules
Microsoft Outlook
Microsoft Outlook Express
Mozilla Thunderbird
Qualcomm Eudora
Summary
Chapter 18: Choosing Other Spam Tools
Spam Policies
Evaluating Spam Filters
Configuring the Second Filter
Other Techniques
Summary

What You Will Learn

This comprehensive and detailed guide answers all your SpamAssassin questions. You will learn about:

  • Spam detection and prevention
  • Installing and running SpamAssassin
  • Using Bayesian Filtering
  • Configuring mail clients
  • Rewriting spam messages
  • Integrating SpamAssassin with external services
  • Blacklisting and whitelisting
  • Increasing Performance
  • Using SpamAssassin as a service
  • Using SpamAssassin with Fetchmail, postfix, sendmail, Exim, Qmail, procmail
  • SpamAssassin rules

 

Authors

Table of Contents

Chapter 1: Introducing Spam
Defining Spam
The Costs of Spam
Spam and the Law
Summary
Chapter 2: Spam and Anti-Spam Techniques
Spamming Techniques
Anti-Spam Techniques
Spam Filtering Services
Anti-Spam Tools
Summary
Chapter 3: Open Relays
Email Delivery
Open Relay Tests
MTA Configuration
Summary
Chapter 4: Protecting Email Addresses
Websites
Usenet
Trojan Software
Mailing Lists and Archives
Registration for Websites
Employees
Business Cards and Promotional Material
How Spammers Verify Email Addresses
Summary
Chapter 5: Detecting Spam
Content Tests
Header Tests
DNS-Based Blacklists
Statistical Tests
Message Recognition
URL Recognition
Examining Headers
Reporting Spammers
Valid Bulk Email Delivery
Summary
Chapter 6: Installing SpamAssassin
Building from Source
Using CPAN
Installing by Hand
Resolving Build Failures
Packaged Distributions
Verifying the Installation
Upgrading
Uninstalling
SpamAssassin Components
Summary
Chapter 7: Configuration Files
Configuration Files
Rule Files
Summary
Chapter 8: Using SpamAssassin
SpamAssassin as a Daemon
SpamAssassin and Procmail
Integrating SpamAssassin into the MTA
Testing and Troubleshooting
Rejecting Spam
Summary
Chapter 9: Bayesian Filtering
Scoring
Training
Confirming Operation
Filter Training
Disabling Bayesian Filtering
Summary
Chapter 10: Look and Feel
Headers
Reports
Subject Rewriting
Summary
Chapter 11: Network Tests
RBLs
SURBLs
Vipul's Razor
Pyzor
DCC
Spamtraps
Summary
Chapter 12: Rules
Writing Rules
Using Other Rulesets
Summary
Chapter 13: Improving Filtering
Whitelists and Blacklists
The Auto-Whitelist
Resolving Incorrect Classifications
Character Sets and Languages
Summary
Chapter 14: Performance
Bottlenecks
Performance Improvement Methodology
Using SQL
Summary
Chapter 15: Housekeeping and Reporting
Separating Levels of Spam
Detecting When SpamAssassin Fails
Spam and Ham Reports
Summary
Chapter 16: Building an Anti-Spam Gateway
Choosing a PC Platform
Choosing a Linux Distribution
Configuring Postfix
Installing Amavisd-new
Configuring Amavisd-new
Configuring Postfix to Run Amavisd-new
Configuring External Services
Firewall Configuration
Backups
Testing
Going Live
Summary
Chapter 17: Email Clients
General Configuration Rules
Microsoft Outlook
Microsoft Outlook Express
Mozilla Thunderbird
Qualcomm Eudora
Summary
Chapter 18: Choosing Other Spam Tools
Spam Policies
Evaluating Spam Filters
Configuring the Second Filter
Other Techniques
Summary

Book Details

ISBN 139781904811121
Paperback240 pages
Read More

Read More Reviews

Recommended for You

ImageMagick Tricks Book Cover
ImageMagick Tricks
$ 20.99
$ 2.10
Openswan: Building and Integrating Virtual Private Networks Book Cover
Openswan: Building and Integrating Virtual Private Networks
$ 35.99
$ 25.20
Building Online Stores with osCommerce: Professional Edition Book Cover
Building Online Stores with osCommerce: Professional Edition
$ 26.99
$ 18.90
Learning Jakarta Struts 1.2: a concise and practical tutorial Book Cover
Learning Jakarta Struts 1.2: a concise and practical tutorial
$ 20.99
$ 14.70
Understanding TCP/IP Book Cover
Understanding TCP/IP
$ 22.99
$ 16.10
AJAX and PHP: Building Responsive Web Applications Book Cover
AJAX and PHP: Building Responsive Web Applications
$ 20.99
$ 14.70