Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying SpamAssassin: A practical guide to integration and configuration
  • Table Of Contents Toc
SpamAssassin: A practical guide to integration and configuration

SpamAssassin: A practical guide to integration and configuration

4 (4)
close
close
SpamAssassin: A practical guide to integration and configuration

SpamAssassin: A practical guide to integration and configuration

4 (4)

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
close
close
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
1
Glossary

Using SQL


SpamAssassin uses local databases for each user by default in the ~/.spamassassin directory. There are three types of databases: user preferences, the auto-whitelist, and the Bayesian database. SpamAssassin can use an SQL database to store any or all of these details.

When using SpamAssassin in a distributed environment where SpamAssassin may be run from one of many machines, using a single SQL database is an ideal solution. Using a centralized database also assists in centralized backup of the preferences, and gives the administrators the opportunity to modify many accounts easily.

SpamAssassin uses the modularity of Perl that allows the usage of different databases to be used without any changes to the application. SpamAssassin has been tested with MySQL, PostgreSQL, and SQLite. Due to the nature of the Perl database interface, most relational databases that are supported by Perl will work with SpamAssassin. The database driver modules are available on CPAN and have names beginning...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
SpamAssassin: A practical guide to integration and configuration
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon