Anti-spam techniques

Results: 2695



#Item
171Computing / Email spam / Spam / Anti-spam techniques / Email marketing / Internet / Spamming / Email

Acceptable Use Policy As providers of communications services, Bluebird Network, LLC and its affiliates (collectively, "Bluebird") offer their customers and users the means to acquire and disseminate information utilizin

Add to Reading List

Source URL: bluebirdnetwork.com

Language: English - Date: 2014-02-19 15:39:40
172Spamming / Web 2.0 / Cross-platform software / Webmail / Email spam / Domain name / Gmail / Spam / Anti-spam techniques / Internet / Computing / Email

SISERONE for everything online Terms and Conditions How we work: We (Siserone Ltd) try to avoid "the small print" to as great an extent as we can. Our basic attitude is that we aim to treat all our customers in an open,

Add to Reading List

Source URL: www.siserone.co.uk

Language: English - Date: 2013-08-06 05:32:28
173Computing / Email / Computer-mediated communication / Anti-spam techniques / Email spam / Spam / Bayesian spam filtering / Honeypot / Email filtering / Spamming / Spam filtering / Internet

Spam Miner: A Platform for Detecting and Characterizing Spam Campaigns ∗ Pedro H. Calais Guerra

Add to Reading List

Source URL: honeytarg.cert.br

Language: English - Date: 2011-03-04 18:53:06
174Social information processing / Computing / Internet / Electronic mailing list / Password / Mailing list / Anti-spam techniques / Email address harvesting / Email / Spamming / Computer-mediated communication

Welcome to WISPA! Below is a set of instructions that will help you navigate through our new WISPA Association Management System (AMS). Should you have any additional questions please contact the staff ator

Add to Reading List

Source URL: www.wispa.org

Language: English - Date: 2015-04-15 12:38:56
175Computer-mediated communication / Spam / Mail / Bounce address / Message transfer agent / Voice-mail / Anti-spam techniques / Email / Computing / Internet

THE CHRONICLE of Higher Education July 20, 2010 E-Mail: the Third Shift

Add to Reading List

Source URL: www.law.berkeley.edu

Language: English - Date: 2015-04-13 19:08:49
176Computing / Email / Anti-spam techniques / Email spam / Spam / Mobile phone spam / Email authentication / CAN-SPAM Act / Whitelist / Spamming / Spam filtering / Internet

A Multifaceted Approach to Spam Reduction Barry Leiba, IBM Thomas J Watson Research Center, Hawthorne, NY Nathaniel Borenstein, IBM Lotus Division, Office of the CTO, Cambridge, MA {barryleiba, nborenst}@us.ibm.com 1

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:22
177Opera Software / Web browsers / Password / Phishing / Anti-spam techniques / World Wide Web / Opera / Website / Internet fraud / Software / Computing / Spamming

Client-side defense against web-based identity theft Neil Chou Robert Ledesma Yuka Teraguchi John C. Mitchell Computer Science Department, Stanford University, Stanford CA 94305 {neilchou, led242, yukat, jcm}@stanford.ed

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:48
178Computer-mediated communication / Anti-spam techniques / Content filtering / Email spam / Email filtering / Spam / Content-control software / Internet censorship in Australia / Spam Reader / Spam filtering / Internet / Computing

Internet Filtering and Censorship Proposals Summary notes from the talk by Siva Sivasubramanian at UNSW Introduction: I am not going to discuss censorship, its merits or demerits. That is outside the scope of my talks an

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:22:00
179Internet / Software / Bayesian spam filtering / Anti-spam techniques / Email spam / Spam / Email filtering / Whitelist / Bayesian poisoning / Spam filtering / Spamming / Computing

SpamGuru: An Enterprise Anti-Spam Filtering System Richard Segal, Jason Crawford, Jeff Kephart, Barry Leiba IBM Thomas J. Watson Research Center {rsegal, ccjason, kephart, barryleiba}@us.ibm.com Abstract. Spam-reduction

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:23
180Internet / Unified threat management / Layer 2 Tunneling Protocol / Virtual private network / Proxy server / Point-to-Point Tunneling Protocol / Anti-spam techniques / Check Point / Comparison of firewalls / Computer network security / Computing / Network architecture

GB-2500 Gigabit Firewall UTM Appliance The GB-2500 Firewall UTM Appliance is a powerful and robust UTM appliance designed for businesses with extensive network demands. Powerful Gigabit Unified Threat Management Performa

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2014-10-21 12:09:09
UPDATE