The Spamhaus Project

Results: 129



#Item
31Interdev Interactive Web Design and Development http://www.inerdev.com ACCEPTABLE USE POLICY PROHIBITED CONTENT AND ACTIVITIES

Interdev Interactive Web Design and Development http://www.inerdev.com ACCEPTABLE USE POLICY PROHIBITED CONTENT AND ACTIVITIES

Add to Reading List

Source URL: inerdev.com

Language: English - Date: 2014-08-09 19:41:49
32Understanding the Domain Registration Behavior of Spammers Shuang Hao Matthew Thomas

Understanding the Domain Registration Behavior of Spammers Shuang Hao Matthew Thomas

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2013-08-21 22:19:01
33On the Potential of Proactive Domain Blacklisting Mark Felegyhazi Christian Kreibich  Vern Paxson

On the Potential of Proactive Domain Blacklisting Mark Felegyhazi Christian Kreibich Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-04-19 15:26:58
34Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+ , Ivan Osipkov+ Microsoft Research, Silicon Valley + Microsoft Corporation

Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+ , Ivan Osipkov+ Microsoft Research, Silicon Valley + Microsoft Corporation

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-10-21 14:44:49
35A Case Study at DTU Environment  DNS: Response Policy Zone Copyright, Hugo Connery, October 2012 Attribution-ShareAlike CC BY-SA http://creativecommons.org/licenses/by-sa/3.0/

A Case Study at DTU Environment DNS: Response Policy Zone Copyright, Hugo Connery, October 2012 Attribution-ShareAlike CC BY-SA http://creativecommons.org/licenses/by-sa/3.0/

Add to Reading List

Source URL: dnsrpz.info

Language: English - Date: 2013-06-12 17:26:40
36DNS Response Policy Zones History, Overview, Usage and Research Hugo M. Connery Technical University of Denmark  ©

DNS Response Policy Zones History, Overview, Usage and Research Hugo M. Connery Technical University of Denmark ©

Add to Reading List

Source URL: dnsrpz.info

Language: English - Date: 2013-06-15 14:23:38
37Can Laws Block Spam? An analysis of the effect of international spam legislation www.vircom.com © 2004 Vircom, Inc. All rights reserved.

Can Laws Block Spam? An analysis of the effect of international spam legislation www.vircom.com © 2004 Vircom, Inc. All rights reserved.

Add to Reading List

Source URL: www.spamhelp.org

Language: English - Date: 2005-06-25 04:33:15
38HEAnet RBL Mirror Service Overview. The amount of unsolicited and unwanted email (also known as

HEAnet RBL Mirror Service Overview. The amount of unsolicited and unwanted email (also known as "Spam") being sent across the Internet today is a huge problem for both individuals and the institutions which are charged w

Add to Reading List

Source URL: heanet.ie

Language: English - Date: 2014-10-23 10:06:49
39Spam, Real World Numbers and the Value of IP Reputation Lists Spam has reached the point where more than 95% of all email received at email servers is unwanted, and over 90% of all connections to mail servers are from at

Spam, Real World Numbers and the Value of IP Reputation Lists Spam has reached the point where more than 95% of all email received at email servers is unwanted, and over 90% of all connections to mail servers are from at

Add to Reading List

Source URL: www.spamrats.com

Language: English - Date: 2008-05-21 12:22:08
40How URL Spam Filtering Beats Bayesian/Heuristics Hands Down

How URL Spam Filtering Beats Bayesian/Heuristics Hands Down

Add to Reading List

Source URL: www.spamstopshere.com

Language: English - Date: 2015-01-12 13:44:46