Blocking Spam and Spyware For DummiesJohn Wiley & Sons, 2005-03-25 - 380 psl. Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential. Discover how to * Understand how spammers get addresses * Calculate the cost of spam and spyware * Re-engineer your business processes * Select spam and spyware filters * Manage implementation and maintenance |
Turinys
Introduction | 1 |
Part I Understanding the Problem | 9 |
Part II Justifying and Selecting Spam and Spyware Filters | 69 |
Part III Deploying Your Chosen Solution | 133 |
Part IV Maintaining Your Defenses | 207 |
Part V The Part of Tens | 267 |
349 | |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
administrators anti-spam anti-spam solutions anti-spyware antivirus software appliance Bayesian filtering blacklist blocking spam browser browser helper object calls changes Chapter clients configuration cost defense delete document Dummies e-mail addresses e-mail messages employees enterprise environment example fake text false positives firewall hardware headers helpdesk implementation inbound installation Internet keep key logger look mail server malicious code malware Microsoft MX record organization patches percent phishing problem quarantine relay REMEMBER requirements rollout scanning sender sendmail SMTP someone spam and spyware spam e-mail spam filter spam messages spam solution spam-blocking solution spam-filtering spammers specific spyware blockers spyware filter spyware-blocking sure task testing things tion trial understand updates user’s users vendor virus viruses VRFY whitelist Windows workstations