Wednesday, August 31, 2005

Word of the Day: spam cocktail

WhatIs.com: Word of the Day
September 01, 2005
___________________________________

ISSUE SPONSORED BY: SearchTechTarget: A treasure site of IT knowledge

......................................................................
IN THIS ISSUE

-- Word of the Day: spam cocktail
-- Today's Tech News
-- Brain Food
-- Additions and Updates

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

SearchTechTarget: A treasure site of IT knowledge

Whatis.com is just one of 25 TechTarget Web sites that can give you
instant power and search results about your latest IT question.
Imagine a great wealth of knowledge and experience in the form of
fast search, hot topics, the latest news, ITKnowledge Exchange,
Webcasts and white papers spilling out of a single well-organized
site. Take a minute and explore the power of the portfolio behind
Whatis.com.
http://searchtechtarget.techtarget.com/?track=NL-34&ad=526852

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

TODAY'S WORD: spam cocktail

A spam cocktail (or anti-spam cocktail) is the use of several
different technologies in combination to successfully identify and
minimize spam. The use of multiple mechanisms increases the accuracy
of spam identification and reduces the number of false positives.

A spam cocktail puts each e-mail message through a series of tests
that provides a numeric score showing how likely the message is to be
spam. Scores are computed and the message is assigned a probability
rating. For example, it may be determined that a message has 85%
probability that it is spam. E-mail administrators can create rules
that govern how the messages are handled based on their scores; the
highest scores may be deleted, medium scores may quarantined, and
lower scores may be delivered but marked with a spam warning.

A spam cocktail commonly includes several of the following
identification methods, which may be weighted differently for message
scoring:

* Machine learning: Implementing sophisticated computer algorithms
that improve over time to analyze the subject line and contents of a
message and predict the probability that it is spam based on past
results. The Bayesian filter is a type of machine learning.

* Blacklisting: Subscribing to a blacklist or blackhole list of known
spammers and blocking messages from those sources

* Content filtering: Using programs that look for specific words or
criteria in the subject line of body of a message

* Spam signatures: Using programs that compare the patterns in new
messages to patterns of known spam

* Heuristics: Using heuristic programs that look for known sources,
words or phrases, and transmission or content patterns

* Reverse DNS lookup: Checking whether the IP address matches the
domain name from which a message is coming.

SEE OUR COMPLETE DEFINITION, WITH HYPERLINKS:
http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci1120253,00.html?track=NL-34&ad=526852

RELATED CONTENT:

SearchSecurity.com offers advice for creating an antispam cocktail in
their "Best spam detection and filtering techniques."
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1116643,00.html?track=NL-34&ad=526852

HowStuffWorks explains how filters help stop spam.
http://computer.howstuffworks.com/spam4.htm

Find white papers, products and vendors related to spam cocktail.
http://www.bitpipe.com/data/search?track=NL-34&ad=526852&cp=bpres&cr=bpres&qg=VENDOR&qt=spam+cocktail&src=wis

TODAY'S TECH NEWS
......................................................................

TIA-942: COOKIE CUTTER OR COST CUTTER? | SearchDataCenter.com
The Telecommunications Industry Association recently published a
standard that attempts to address almost every design consideration
in the data center. Is it a one-size-fits-all approach to data
management or a way for IT managers to reel in costs in data center
deployment?
http://searchdatacenter.techtarget.com/originalContent/0,289142,sid80_gci1120625,00.html?track=NL-34&ad=526852

DOES EMC'S ILM STRATEGY REALLY SOLVE COMPLEXITY? | SearchStorage.com
EMC is pushing ILM hard -- but what is the company really selling?
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci1120700,00.html?track=NL-34&ad=526852

CISSP VS. CCISP CREATING CONFUSION FOR CERTIFICATION HOLDERS |
SearchSecurity.com
Its creator says the newer certification aims to complement, not
compete with, the better known CISSP. Others aren't convinced the
distinction is clear.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1120382,00.html?track=NL-34&ad=526852

MORE TECH NEWS
Catch up on all the latest IT news!
http://searchtechtarget.techtarget.com/gateway/news?track=NL-34&ad=526852


BRAIN FOOD
......................................................................

SECRET WORD OF THE DAY
This is an imaginary creature that causes trouble in devices and
systems of all kinds. (Hint: Never feed a Mogwai after midnight!)
What is it?

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid9_gci802852,00.html?track=NL-34&ad=526852&offer=dq

TODAY'S TRIVIA QUESTION
The Electronic Controlled Acoustic Shadow System is the first device
capable of blocking out a specified noise while leaving everything
else audible. What is it called?
a. the audio blocker
b. the noise modifier
c. the silence machine

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid39_gci906859,00.html?track=NL-34&ad=526852&offer=dq

IT ALPHABET SOUP
An LOB application is one of the set of critical computer
applications that are vital to running an enterprise. What does LOB
stand for?
a. licensed object-based
b. Linux outsourcing block
c. line-of-business

Answer
http://Searchenterpriselinux.techtarget.com/sDefinition/0,,sid39_gci214562,00.html?track=NL-34&ad=526852&offer=dq

LEARNING CENTER: PLACING SYSTEMS IN A FIREWALL TOPOLOGY |
SearchSecurity.com
After deciding which firewall topology -- bastion host, screened
subnet or multi-homed firewall -- best suits your IT infrastructure,
you need to determine where to place your systems. This tip offers
suggestions for system placement based on access to and from the
Internet, and security needs.
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci1120187,00.html?track=NL-34&ad=526852

ADDITIONS AND UPDATES
......................................................................

clean room
http://whatis.techtarget.com/definition/0,289893,sid9_gci1117411,00.html?track=NL-34&ad=526852

Quagga
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117556,00.html?track=NL-34&ad=526852

ICE (In Case of Emergency)
http://whatis.techtarget.com/definition/0,289893,sid9_gci1118419,00.html?track=NL-34&ad=526852

insider threat
http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci1117699,00.html?track=NL-34&ad=526852

Nagios
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117704,00.html?track=NL-34&ad=526852

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:lthing@techtarget.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by WhatIs.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Word of the Day":

Go to unsubscribe: http://WhatIs.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=526852&track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494