Home | News | Android

Archive

. . . . . . . . . . . . . . . . . . . . . . .

Anti-Spam Technologies

Tuesday, December 23, 2008

Spammers and hackers are constantly shifting strategies and tactics to get around spam filters. As new tactics evolve, anti-spam vendors must layer their new technology on top of the old. The following are the four major types of anti-spam technologies:

Content filtering
Early solutions relied primarily on word lists, email signatures, and lexical analysis. For instance, “Viagra” is a word that’s often tagged by content filters. To adapt, spammers started spelling it with “1”s instead of “I”s, and added spaces. Later, they began to include HTML graphics instead of putting in text. Recently, spammers began to put their content in embedded PDFs; some email security vendors can filter the content of PDFs as well.

Behavioral analysis
This type of anti-spam technology used Bayesian analysis, statistical analysis and heuristics in order to predict spam. The onus for this type of technology often fell on administrators, who had to do extensive tuning and trial and error before getting satisfactory results. Bayesian filters also increased the likelihood of false positives.

Identity analysis
This looks at the identity of known spammers often referred to as “reputation analysis”. This is a promising technology, but may require email authentication to become more widespread. Also, zombie attacks can get around this type of defense.

Pattern detection
By analyzing patterns of traffic, as much as 80% of traffic can be thrown out as invalid. This reduces the load on email servers and downstream email filters. This type of detection also does not add to the rate of false positives. All these technologies can layer on top of one another to create an effective anti-spam filter. However, organizations need to implement a secure messaging solution that takes the encryption burden of the end users and intelligently does the right thing.



Labels:

Spamming and Dark Traffic

Some anti-spam vendors rely on identity analysisor reputation analysis to block spam coming from certain IP addresses. To get around this, spammers have now implemented zombie attacks or botnets (robot networks), planting spyware or Trojans on unsuspecting machines, which then work as slaves to remote machines, which then carry out a spam campaign.

Instead of one machine sending out tens of thousands of emails from a single IP address, zombie attacks can have a thousand slave PCs and a thousand different IP addresses sending out ten to twenty emails each. Effective email security requires vendors to constantly add adaptive techniques to their anti-spam systems, assuring organizations that even new threats like zombie attacks won’t get through their systems and email security professionals don’t get those angry calls or emails about unwanted messages.

Today’s enterprises expect spam filters to catch at least 95% of spam; the best spam filters catch upwards of 99% of unwanted emails. Even more importantly, however, spam filters should rarely catch a valid, wanted email and throw it out. These “false positives” have caused many arguments between companies when an expected email has been filtered out and never delivered.

Experts recommend that the false positive rate be as close to 0% as possible, since false positives can cost organizations dearly. Spam is not the only threat to email servers. While spam is unwanted and often annoying, a bigger threat to networks today is malicious and invalid email traffic, referred to as Dark Traffic, which can actually damage an email system or a network.

Dark Traffic includes viruses, worms, and Trojan horses that are sometimes attached to otherwise valid-looking emails. The directory harvest attack (dHA) is often a precursor to spam, when a corporate email server is bombarded with thousands or even millions of random name combinations in order to determine valid email addresses.

Email denial of service (doS) attacks, malformed SMTP packets, and invalid recipient addresses are other types of dark Traffic. As mentioned above, spam and dark Traffic can have a huge effect on bandwidth, often representing 70-90% of all inbound email traffic. Stopping spam and dark Traffic is essential to scaling email infrastructure accurately and keeping network performance up.



Labels:

PageRank Vs Alexa

Tuesday, December 16, 2008

Many websites that have long operated, but zero PageRank with high traffic Alexa. To get the Google PageRank is not easy because the measurement using the algorithm to consider "more than 500 million variables and 2 million term" (Google source).

PageRank related with many numbers link your site to other link, where the page always appear on the top search engines and needed the right keywords with relevant contents. PageRank not real traffic like Alexa ranking but PageRank only algorithm how important the page for everyone.

Alexa ranking is real traffic, where to improve alexa ranking can use other services that provide traffic, such as directory website, buy traffic on google adwords or others service. Higher Alexa traffic does not a website the index by google. So, PageRank and Alexa both very important as indicator the website needed lot of user anytime, anywhere and get it as soon as possible. Good luck.

More about PageRank : Wikipedia



Labels:

Choose a Laptop Computer

Tuesday, December 9, 2008

LaptopComputers are a tool that is very important for those who use a computer every day as tools to complete the work done, such as data processing. With the progress of technology, this form of a computer when a smaller, more lightweight (laptop) and can taken you like.

This laptop easy to use and can run many applications such as Like desktop computer. Applications that can run the video, spreedsheet, music, VoIP and so forth. Computer technology is a very rapid development. Many products are offered with prices that vary.

Consideration depending on the price of some of the existing specifications such as processor, big hard drives, RAM, and a computer model, VGA and so forth. To choose a laptop computer you should note the specifications are offered, whether in accordance with the application that you will use.

In choosing a laptop computer also needs to be: Is the laptop computer can be upgraded in the day to improve the performance and the size of the cache memory that serves to accelerate the process of read / write. Before you buy a laptop computer you should find plenty of information so that one does not choose when to buy your dream laptop.



Labels:

Check IP Address

Friday, December 5, 2008

Many gadgets that we can use to display or know the IP address, Hostname, city, region, time and country. One of the gadget can be used is the google gadgets.

Data shown on this gadget is the IP address of the data that you connect with the Internet network and you can also check the IP address of other locations around the world.

If you use a home router to connect to the Internet is usually the IP address will be shown is the address of the router or your proxy and your IP address (the IP public) will always change every login to the network or get a new IP address each session.




Labels:

Blogger Theme By:Google Android .