TITLE

Fighting spam: Theory and practice

AUTHOR(S)
Gibbs, Mark
PUB. DATE
February 2004
SOURCE
Network World;2/16/2004, Vol. 21 Issue 7, p90
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Elaborates on the theory and practice of preventing spam. Technical formatting of the required infrastructure; Importance of considering the legal issues associated with spam prevention; Need of charging for e-mail.
ACCESSION #
12265700

 

Related Articles

  • FILTER. Macsai, Dan // Fast Company;Jul/Aug2010, Issue 147, p26 

    The article presents information on the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference to be held in Redmond, Washington on July 13, 2010.

  • A BAD RAP. Seda, Catherine // Entrepreneur;Jun2003, Vol. 31 Issue 6, p83 

    Provides tips and information in fighting back a spammer. Protection against the ordeal by not buying a software that harvests electronic-mail addresses; Avoidance of future confusion by informing the subscriber what will be found in the electronic-mail message; Suggestions not to be attracted...

  • The gated Net community. Tinnirello, Paul // eWeek;10/13/2003, Vol. 20 Issue 41, p46 

    The public streets and highways of the Internet have become like neighborhoods where it is no longer safe to venture. Corporate firewalls, spam filters and other Internet security measures are losing ground to the onslaught that has crippled some organizations' abilities to use the Internet as...

  • Is Google rolling its own 10 Gigabit Ethernet switches?  // Network World;11/26/2007, Vol. 24 Issue 46, p10 

    The article offers news briefs related to the computer industry in the U.S. Google Inc. has introduced its 10 Gigabit Ethernet switches with the aim of interconnecting its servers in their data centers. Mozilla Corp. has introduced Firefox 3.0 web browser which addresses malicious Web sites by...

  • Academic spam invitations are common and irritating, with 2.1 invitations received daily by each investigator.  // Medical Writing;Jun2017, Vol. 26 Issue 2, p64 

    The article reports that Academic spam invitations are common and are irritating with 2.1 invitations received daily by each investigator.

  • Antispam tools multiplying like spam. Fontana, John // Network World;2/17/2003, Vol. 20 Issue 7, p18 

    Reports on the increase in number of antispam technology products. Release of gateway product and upgrades to MailFrontier Inc.'s client software at Demo 2003 conference; Server edition of Sunbelt Software Corp.'s spam filtering software; Announcement of name and product of Q-Spam.

  • BARNEY'S RUBBLE. Barney, Doug // Network World;09/25/2000, Vol. 17 Issue 39, p7 

    Presents computer network-related news items, compiled in the week of September 25, 2000. Alliance of 15 online marketers to control unsolicited electronic mail messages; Electronic commerce shakeout predicted by business consultant Tom Peters.

  • AITP on-line. Oriez, Charlie // Information Executive;Nov/Dec99, Vol. 3 Issue 11/12, p6 

    Presents tips on how to avoid spams or unsolicited e-mail. Includes use of high-level domain; Options for blocking spam at the servers; Places spammers use to harvest e-mail addresses.

  • Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. Luckner, Marcin // Security & Communication Networks;2/20/2019, p1 

    Machine learning techniques are a standard approach in spam detection. Their quality depends on the quality of the learning set, and when the set is out of date, the quality of classification falls rapidly. The most popular public web spam dataset that can be used to train a spam...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics