Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying SpamAssassin: A practical guide to integration and configuration
  • Table Of Contents Toc
SpamAssassin: A practical guide to integration and configuration

SpamAssassin: A practical guide to integration and configuration

4 (4)
close
close
SpamAssassin: A practical guide to integration and configuration

SpamAssassin: A practical guide to integration and configuration

4 (4)

Overview of this book

As a busy administrator, you know Spam is a major distraction in todays network. The effects range from inappropriate content arriving in the mailboxes up to contact email addresses placed on a website being deluged with unsolicited mail, causing valid enquiries and sales leads to be lost and wasting employee time. The perception of the problem of spam is as big as the reality. In response to the growing problem of spam, a number of free and commercial applications and services have been developed to help network administrators and email users combat spam. Its up to you to choose and then get the most out of an antispam solution. Free to use, flexible, and effective, SpamAssassin has become the most popular open source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network.
Table of Contents (24 chapters)
close
close
SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
1
Glossary

Chapter 17. Email Clients

SpamAssassin does not remove spam email from the user’s inbox; it only adds additional headers to tag email messages. Another part of the email delivery process performs the sorting. For sites that can use procmail, users or system administrators can filter spam into a folder automatically, as described in Chapter 8.

By moving spam to a different folder, we ensure that users do not view the spam unless they choose to. Their inbox is then free of spam, yet the spam can be browsed if desired. This is an important fallback in case legitimate email is incorrectly categorized as spam.

The email client that the user uses to view and create emails can often be used to filter spam. To do this, it has to be able to selectively move incoming messages to a separate folder depending on the data in particular email headers. Most popular email clients include this ability. This chapter will cover configuring email clients such as Microsoft Outlook, Microsoft Outlook Express, Mozilla...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
SpamAssassin: A practical guide to integration and configuration
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon