The Spamhaus Project

Results: 129



#Item
81Spam filtering / Anti-spam techniques / CAN-SPAM Act / Email spam / Spam / Email address harvesting / The Spamhaus Project / Mobile phone spam / Spam Reader / Spamming / Internet / Computing

Microsoft Word - DSTI_CP_ICCP_SPAM_2005_10_FIN_ENG[1].doc

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-04 12:08:43
82Anti-spam techniques / Spam / URL shortening / Email spam / Phishing / Email / Comparison of DNS blacklists / The Spamhaus Project / Internet / Spamming / Computing

Design and Evaluation of a Real-Time URL Spam Filtering Service Kurt Thomas* , Chris Grier*† , Justin Ma* , Vern Paxson*† , Dawn Song* {kthomas, grier, jtma, vern, dawnsong}@cs.berkeley.edu * University of California

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2011-03-03 22:54:33
83Crimeware / System software / Blacklist / Computing / Software / Antivirus software / ESET / The Spamhaus Project / Malware

­ Advanced Linux Server Side Threats How they work and what you can do about them

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-10 11:41:15
84Internet standards / Routing / Internet protocols / Domain name system / IP hijacking / Border Gateway Protocol / Resource Public Key Infrastructure / Hijacking / The Spamhaus Project / Network architecture / Internet / Computing

A Forensic Case Study on AS Hijacking: The Attacker’s Perspective Johann Schlamp Georg Carle

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2013-05-09 10:49:30
85Spam filtering / Spamming / Digital Millennium Copyright Act / Internet in the United States / Email spam / Websense / Spam / The Spamhaus Project / David Burt / Internet / Computing / Content-control software

Post-Hearing Comments on Exemption to Prohibition on Circumvention Measures

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2012-05-24 14:26:18
86Anti-spam techniques / Email spam / Spam / Malware / DNSBL / The Spamhaus Project / Zombie / Computer worm / CAN-SPAM Act / Spamming / Internet / Computing

1 Spam Zombies And Inbound Flows To Compromised Customer Systems Joe St Sauver, Ph.D. ([removed]) MAAWG Senior Technical Advisor

Add to Reading List

Source URL: darkwing.uoregon.edu

Language: English - Date: 2005-02-27 20:32:38
87Anti-spam techniques / Email spam / Spam / CAN-SPAM Act / The Spamhaus Project / Open mail relay / Email / Bayesian spam filtering / SpamCop / Spamming / Internet / Computing

doi:[removed]j.jnca[removed]

Add to Reading List

Source URL: linc.ucy.ac.cy

Language: English - Date: 2013-07-16 02:30:56
88Computing / Network architecture / CNAME record / Reverse DNS lookup / The Spamhaus Project / Conficker / Reduced pressure zone device / Botnet / Zone file / Domain name system / Spamming / Internet

Response Policy Zone History, Usage and Research Hugo M. Connery Technical University of Denmark ©

Add to Reading List

Source URL: www.spamhaus.org

Language: English - Date: 2013-06-10 06:20:53
89Cybercrime / The Spamhaus Project / Anti-spam techniques / Botnet / Email spam / Spam / DNSBL / Computer crime / Malware / Spamming / Computing / Internet

Spamhaus BGPf Case Study at Schibsted Media Group Using Spamhaus BGPf in a production environment The Spamhaus Project, Geneva, Switzerland

Add to Reading List

Source URL: www.spamhaus.org

Language: English - Date: 2013-06-09 11:27:24
90The Spamhaus Project / Anti-spam techniques / Email spam / Phishing / Spam / OpenDNS / Botnet / Blacklist / SURBL / Spamming / Internet / Computing

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems Andrew J. Kalafut Craig A. Shue

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-02-11 15:35:28
UPDATE