How can I choose the best Linux® SPAM filter?

The

Linux® platforms, the outcome of the open source movement, have a wide range of spam filters to choose from. If you want to choose the best Linux® SPAM filter, it is important to know something about how different types work. An aggressive but almost quite accurate way of eliminating spam uses filters with white leaves or verification. For users who find that the white list method is too inflexible, distribution adaptive blacklines are a versatile and widely available solution. More sophisticated anti-spam techniques are used by Bayesian trigram filters or similar algorithms analyzing words as the primary Linux® SPAM filter. They only left the mail from the specified sender to the Customer's Inbox. The popular Linux® spam filter that uses this technique is TDMA. When a user initially configures TDMA, a list of trusted recipients is defined and all the following mail is re -checked this list. If the recipient is not present on this list, the challenge is sent to see if they are sentEl with a legitimate source. The call with the challenge is designed to be responsible only by people, so if a successful answer is received, the e-mail address of the sender is added to the white list.

The problem with the white list technique as a primary Linuxa® filter is that it puts an unnecessary burden on the sender, even if they are legitimate. Distribution adaptive blacklines work on the back of this principle, but in a much more flexible way. In this technique, messages from certain e -mail addresses are known to belong to spammers blocked on the basis of a centralized database. If enough users mark a certain e -mail address as spam, these e -mail addresses are updated to a centralized blacklist. An example of the Linux® spam filter, which uses this method of spam protection, is razor.

both the method of verifying the white list and the method of distribution adaptive blackThe documents analyze the e-mail address and check them against databases to determine whether they are potentially dangerous. Bayes trigram filters are used in some spam filters, such as the popular Linux® spam filter SPAMASSASSIN to analyze the structure of the e -mails themselves. These filters use sophisticated algorithms to check the text of the e -mail and determine whether they show formulas of the sentence and use of words that usually use spammers. By eliminating the need for databases generated by users, this technique allows for much greater adaptability. Linux® SPAM developers implement this method of spam detection in its programs.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?