ESET SMART SECURITY 4 - QUICK START GUIDE FOR MICROSOFT WINDOWS 7-VISTA-XP-2000-2003-2008 Guía de usuario Pagina 123

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 124
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 122
123
6.3.4 Recognizing spam scams
Generally, there are a few indicators which can help you identify spam (unsolicited emails) in your mailbox. If a message
fulfills at least some of the following criteria, it is most likely a spam message.
Sender address does not belong to someone on your contact list.
You are offered a large sum of money, but you have to provide a small sum first.
You are asked to enter, under various pretenses (data verification, Financial operations), some of your personal data
bank account numbers, usernames and passwords, etc.
It is written in a foreign language.
You are asked to buy a product you are not interested in. If you decide to purchase anyway, please verify that the
message sender is a reliable vendor (consult the original product manufacturer).
Some of the words are misspelled in an attempt to trick your spam filter. For example “vaigra” instead of “viagra”, etc.
6.3.4.1 Rules
In the context of Antispam solutions and email clients, rules are tools for manipulating email functions. They consist of
two logical parts:
1. Condition (e.g., an incoming message from a certain address)
2. Action (e.g., deletion of the message, moving it to a specified folder)
The number and combination of rules varies with the Antispam solution. These rules serve as measures against spam
(unsolicited email). Typical examples:
1. Condition: An incoming email message contains some of the words typically seen in spam messages
2. Action: Delete the message
1. Condition: An incoming email message contains an attachment with an .exe extension
2. Action: Delete the attachment and deliver the message to the mailbox
1. Condition: An incoming email message arrives from your employer
2. Action: Move the message to the “Work” folder
We recommend that you use a combination of rules in Antispam programs in order to facilitate administration and to
more effectively filter spam.
6.3.4.2 Whitelist
In general, a whitelist is a list of items or persons who are accepted, or have been granted permission. The term “email
whitelist“ defines a list of contacts from whom the user wishes to receive messages. Such whitelists are based on
keywords searched for in email addresses, domain names, or IP addresses.
If a whitelist works in “exclusivity mode“, then messages from any other address, domain, or IP address will not be
received. If a whitelist is not exclusive, such messages will not be deleted, but filtered in some other way.
A whitelist is based on the opposite principle to that of a blacklist. Whitelists are relatively easy to maintain, more so
than blacklists. We recommend that you use both the Whitelist and Blacklist to filter spam more effectively.
6.3.4.3 Blacklist
Generally, a blacklist is a list of unaccepted or forbidden items or persons. In the virtual world, it is a technique enabling
acceptance of messages from all users not present on such a list.
There are two types of blacklist: Those created by users within their Antispam application, and professional, regularly
updated blacklists which are created by specialized institutions and can be found on the Internet.
It is essential to use blacklists to successfully block spam, but they are difficult to maintain, since new items to be
blocked appear every day. We recommended you use both a whitelist and a blacklist to most effectively filter spam.
Vista de pagina 122
1 2 ... 118 119 120 121 122 123 124

Comentarios a estos manuales

Sin comentarios