Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Spam Filters

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An event sink, sometimes called a listener, is a piece of coding that defines how a server or computer is to handle given events. Event sinks are often used in spam filters to trigger actions in response to the receipt of an e-mail message with defined characteristics or certain types of attachments. The destination of data handled by such a program is also sometimes called an event sink. An event  … 
Definition continues below.
Spam Filters White Papers (View All Report Types)
 
McAfee Endpoint Protection Suite
sponsored by Intel Security
WHITE PAPER: This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

2010: Cybercrime Coming of Age
sponsored by ESET
WHITE PAPER: In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.
Posted: 02 Feb 2010 | Published: 01 Jan 2010

ESET

McAfee Security Journal
sponsored by Intel Security
WHITE PAPER: This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Network Security Report: The State of Network Security in Schools
sponsored by Threat Track Security
WHITE PAPER: Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation
 
 
SPAM FILTERS DEFINITION (continued): …  sink directs messages with certain characteristics away from the user's inbox. Such messages may be sent to a quarantine folder or be rejected outright. Each time a message is directed away from the inbox, the program may notify the sender and/or the intended recipient, depending on how the program is written.Among other things, you can use an event sink to specify that:Attachments will download to certain drives or foldersAttachments will be ignored or blockedMessages that would cause an excess of stored data will be rejectedMessages with suspicious characteristics will be quarantined or rejectedNetwork … 
Spam Filters definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement