Title: Security Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> Windows Job Opportunities!
![]()
IN THIS ISSUE:
>
Microsoft joins forces to create antispam specifications
>
Software flaw finders can be a reckless breed
>
Interesting times in your e-mail inbox
>
Throwing eggs at spammers
>
Are you up to the challenge?
![Headlines]()
![]()
Microsoft joins forces to create antispam specifications
[Tom Lancaster]
On May 25, Microsoft agreed to merge its own Caller ID antispam initiative with another such effort called Sender Policy Framework (SPF). The combination of these efforts could result in a decisive victory in the battle against spam. Both efforts strive to prevent spammers from spoofing "from" addresses. Find out how these efforts will impact spam prevention in this article.
![]() |
![]() |
| |
![]() |
|
![]() |
Windows Job Opportunities!
Gain immediate access to thousands of Windows job listings at the SearchWin2000.com Career Center powered by Dice. Make your job search easier with our Career Center resources.
Sign up today!
|
| |
|
![]() |
![]() |
Software flaw finders can be a reckless breed
[Margie Semilof]
Independent security researchers are posting their discoveries of software vulnerabilities in public forums before alerting affected software vendors. This article describes this issue, which is now attracting the interest of Windows administrators, who are facing a steady stream of vulnerabilities and subsequent patches to fix them.
Interesting times in your e-mail inbox
[Tom Lancaster]
While simple checks, such as specific subject lines, payload text or attachment names, will help to keep unwanted e-mail out of your inbox, it is not always enough to stop spam from entering your inbox. This tip discusses the significance of recent mass mailing viruses and provides links where you can find out more about how the viruses can affect you.
Throwing eggs at spammers
[Garry Kranz]
This article describes the many security problems associated with spam. In addition to consuming server space and network bandwidth, it also poses a great security threat because spam can carry worms and viruses.
![]()
FEATURED TOPIC:
Are you up to the challenge?
So, you think you're quite the expert on Windows technology, eh? Prove it -- take our challenging Know-IT-All quizzes and see how you measure up!
BEST WEB LINKS:
Antivirus
These Best Web Links can help you make the most of your antivirus software, and they offer additional ways to protect yourself from viruses, worms and Trojan horses.
WHITE PAPER:
Major techniques for classifying spam
This white paper covers the most effective methods for capturing spam on both transport and content levels. It also specifically covers the following content-level methods of identifying spam: fingerprint analysis, lexical analysis, artificial intelligence, statistical analysis and heuristics.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Active Directory Tip |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|