on 5/26/04 3:49 PM, Kami Razvan wrote:
http://internetweek.com/e-business/showArticle.jhtml?articleID=21100229
Time to add new filters..
I believe a minweighttofail type command in a filter would catch these
easily. In the following example, if 4 or more filter lines matched the
contents of
Has the link to the manual changed?
http://www.declude.com/junkmail/manual.htm no longer works.
Larry Craddock
---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]
---
This E-mail came from the Declude.JunkMail mailing list. To
unsubscribe, just send an E-mail
Has the link to the manual changed?
http://www.declude.com/junkmail/manual.htm no longer works.
I just checked, and it worked for me (with a redirect to the articles
URL, but I still use the URL you listed).
-Scott
---
Declude JunkMail: The
The link in your email worked for me although the final destination was:
http://www.declude.com/Articles.asp?ID=116
jeff
- Original Message -
From: Larry Craddock [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, May 27, 2004 7:44 AM
Subject: [Declude.JunkMail] Junkmail manual
Thanks ... it started working for me too even though I had tried it several
times before asking. Who knows; sometimes cache is the devil :)
Larry
- Original Message -
From: Jeff Pereira [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, May 27, 2004 6:40 AM
Subject: Re:
I think I need a little more detail on the spamdomains test. Here's the
entire explanation from the manual:
[This test will catch E-mail that is not coming from a mailserver that it
should be coming from. This test will only work if you set up a file listing
domains that you wish to be
But I'm sure I've seen discussion someplace with reference to lines
containing more than just a domain name in the spamdomains.txt file ... or
is that all that's needed besides enabling the test?
That's a new feature, that allows you to have an alias (for lack of a
better word) that can be
SKIPIFWEIGHT60
MINWEIGHTTOFAIL 4 100
BODY 1 CONTAINS attention investors
This looks very good and very usefull for me!
Markus
---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]
---
This E-mail came from the Declude.JunkMail mailing
Thanks for the replies.
Below are lines from the SMTP log. The new gateway customer is the
@lsps.org. They use GroupWise. I can see a message coming in from
xxx-solutions.com. It then is received by IMail...spooled
The next part of the log is where I need help. Why is the Imail server
Samantha, part of the answer that you're looking for is that when your
misd.net server is connecting to their server to deliver the mail, you're
not connecting to Trend Micro, the company, you're connecting to their
mail server, which has a Trend Micro product in front of their other mail
host,
I don't want to connect to Trend (whether on the box or not). I want to
connect directly to their GroupWise SMTP (64.88.9.99). How do I get
around the Trend SMTP and connect directly to the GroupWise SMTP.
In other words, I don't want the mail to pass through Trend at all. Is
the setting on
I believe you need to add the IP address of the GW server to your hosts file for
resolution.
You are pulling out an MX record somewhere that is saying send to the Trend server. At
least that's how I get to my GW server.
hosts:
192.0.0.1 domain.com
Scott Fisher
Director of IT
Farm Progress
I'm wanting to give AntiSpam customers the ability to 'tweek' their spam
settings by giving them FTP access to the $default$.JunkMail.txt file.
I'm hoping they'll also be able to manage their WHITELISTING (because not
everyone wants the same WHITELIST)
How could this be done?
-Brent
I believe you need to add the IP address of the GW server to your hosts
file for resolution. You are pulling out an MX record somewhere that is
saying send to the Trend server. At least that's how I get to my GW
server.
I did - In the \\..\\winnt\system32\drivers\etc I changed the hosts file
to
At 10:08 AM 5/27/2004, Bridges, Samantha wrote:
I believe you need to add the IP address of the GW server to your hosts
file for resolution. You are pulling out an MX record somewhere that is
saying send to the Trend server. At least that's how I get to my GW
server.
I did - In the
Do the per-domain setup..
1. Create a folder for each domain or domains that you want this per-domain
whitelisting for, within the X:\iMail\Declude folder. E.g. example.com (I
did all of our domains that we host just because the default
$default$.junkmail file was getting huge with all the
James Nelson wrote:
I'll try implementing these here in the next day or so after read up
on the documentation for them. Care to explain what the size.vbs file
is?
There's a lengthy discussion in the archives about that external test.
Note that this requires a more recent interim release in
2 thoughts.
Are you positive they gave you the correct IP address of the GroupWise server. They
may be accustomed to handing out the IP address of the Trend server.
Their firewall could be redirecting all port 25 traffic to the trend micro machine.
Scott Fisher
Director of IT
Farm Progress
Brent Brashear wrote:
I'm wanting to give AntiSpam customers the ability to 'tweek' their spam
settings by giving them FTP access to the $default$.JunkMail.txt file.
I'm hoping they'll also be able to manage their WHITELISTING (because not
everyone wants the same WHITELIST)
How could this be done?
Scott,
I'm finding this difficult to test and thought that I would ask it
instead. I've found some heavy obfuscation in some Nigerian stuff that
has be scratching my head about how to filter it. One such messages
contains the following:
THE OWNER OF THIS ACCOUNT LATE MR.DENNIS BR=
OWN ,HE
I'm finding this difficult to test and thought that I would ask it
instead. I've found some heavy obfuscation in some Nigerian stuff that
has be scratching my head about how to filter it. One such messages
contains the following:
THE OWNER OF THIS ACCOUNT LATE MR.DENNIS BR=
OWN ,HE DIED
Thanks.
. I'm sure it goes without saying that MIME decoding would be a nice
addition whenever that pops to the top of your to-do list. This one
message was clearly obfuscated using that technique, and the sender was
careful to find a free mail provider that would send quoted-printable
Matt wrote:
James Nelson wrote:
I'll try implementing these here in the next day or so after read up
on the documentation for them. Care to explain what the size.vbs file
is?
There's a lengthy discussion in the archives about that external test.
Note that this requires a more recent interim
So a line example.com would require that any E-mail address from
@example.com must have a reverse DNS entry containing example.com.
However, if legitimate @example.com E-mail can also be sent from
@example.net, then you could have a line example.com example.net.
Scott, any thoughts
Using the dnsbl type of test and a custom zone, you could extend this
through DNS. For instance:
MPBL-SPAMDOMAINS dnsbl %REVDNS%.%RHSBL%.spamdomains.example.com
127.0.0.2 4 0
In your custom zone, you could construct records like so:
*.aol.com.aol.comA
127.0.0.1
TXT ( "Good
Using the dnsbl type of test and a custom zone, you could extend this
through DNS. For instance:
MPBL-SPAMDOMAINS dnsbl%REVDNS%.%RHSBL%.spamdomains.example.com
127.0.0.240
Interesting idea, Matt. Still way too much management compared to
SPF-compatible
I've been planing on trying this for about a week now, and I'm still
not convinced that it will work. From my standpoint though, this
represents a good way to remove a tad bit more processing and maintain
a system to be shared on multiple servers without having to update text
files.
This idea
Thanks everyone. Now that I understand how to use
the test, does anyone have a spamdomains.txt file that includes the entries for
the domains most commonly used that they could share?
Larry Craddock
- Original Message -
From: Larry Craddock [EMAIL PROTECTED]
Thanks everyone. Now that I understand how to use the test, does anyone
have a spamdomains.txt file that includes the entries for the domains
most commonly used that they could share?
Check the archives, Larry. I have posted
29 matches
Mail list logo