SPAM WeeSan Lee

Slides:



Advertisements
Similar presentations
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Advertisements

Surrey Public Library Electronic Classrooms Essentials.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Dealing With Spam The kind, not the Food product.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
How secure is your ? Secure Primer Presented by 4Secur .com.
Lesson 7: Working with . 2 Concept 7.1 About is a fast and easy way to communicate to all places on the Internet You must have an .
WeeSan Lee
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Setting up Your New Mail Domain in MS Outlook and Outlook Express By CS Ling (Global Visibility Solution)
How to Send your by Outlook Express By Lee, Meng-chen.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache.
“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Towards Modeling Legitimate and Unsolicited Traffic Using Social Network Properties 1 Towards Modeling Legitimate and Unsolicited Traffic Using.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Unit 9 Communication Services
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
WeeSan Lee
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Technology Update TSAG Meeting 3/11/04. Reminders CENIC (Corporation for Education Network Initiatives in California)  4CNET is being phased out. (our.
Unit 10 Communication Services
A Technical Approach to Minimizing Spam Mallory J. Paine.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Basics.
We’re Your Bookstore… Ready to Serve You 24/7 efollett.com edoption U. T. Bookstore.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
Ms Burnham Programs Words Ending in byte(s) General Computer Knowledge.
The Online Activity Module User Account and Contact Us June 5, 2013.
Anti-Spam Tagging Al Lilianstrom. Spam Tagging The Computing Division is testing a Spam Tagging solution Based on SpamAssassin All incoming mail to the.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
v=anwy2MPT5RE By Levi Nichols.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Online Parking System.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Flowcharts By: Carolina Suarez 10 c.
Internet safety By Suman Nazir
Jeopardy Danger SafteySecret Info Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Applicant sends request for username and password to; Applicant sends request for username and password.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
28th March 2003 SPAM Presenter: Matthew Sullivan.
COX WEBMAIL COX COX CUSTOMER SUPPORT SERVICE NUMBER.
Anti-Spam Managing Spam with Kerio Connect
3.2 Introduction to .
xhbxcvb
Fix Thunderbird Error 5.7.1 Call Toll-free
COMPUTER PRIVACY.
How To Blocks s On Gmail
Backpage aberdeen
ONE® Pages Training Presentation
3.2 Introduction to .
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Presentation transcript:

SPAM WeeSan Lee

Roadmap What is SPAM? Why Spamming? How to avoid SPAM? References

What is SPAM? Spiced ham or luncheon meat? Unsolicited s.

Why Spamming? Cheap  Senders cost almost nothing Effective  0.001% of 1 million = 10 respondents A very tough battle for end users!

How to avoid SPAM? Use a SPAM blocker or anti-spam software Spam tagging  Unsolicited Commercial (UCE) X-Junkmail: UCE  SpamAssassin X-Spam-Flag: YES SMTP Authentication  Need to provide username and password before sending s Stop publishing your address online

How to reduce false positive? False positive  Good s get classified as SPAM UCR webmail  Set UCE score a little higher (HW4) Other webmails  Add known addresses to address book

References Internet Effectively  Ch 1  Ch 4 The Apache SpamAssassin Project  UCR SMTP Authentication  entication/index.html entication/index.html UCR Anti-Spam 