Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Spam Filters

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An event sink, sometimes called a listener, is a piece of coding that defines how a server or computer is to handle given events. Event sinks are often used in spam filters to trigger actions in response to the receipt of an e-mail message with defined characteristics or certain types of attachments. The destination of data handled by such a program is also sometimes called an event sink. An event  … 
Definition continues below.
Spam FiltersReports
 
Guarding Against Next-Gen Spam/ Phishing Attacks
sponsored by Symantec Hosted Services
WEBCAST: This Webcast examines state-of-the-art defenses in email attacks and looks specifically at the technological and management requirements facing these new threats.
Posted: 15 Apr 2007 | Premiered: Apr 17, 2007, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

Kaspersky Lab

Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST: Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)

Microsoft

McAfee Threats Report: Third Quarter 2010
sponsored by McAfee, Inc.
ANALYST REPORT: This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

McAfee, Inc.

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Sunbelt Software

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Putting Anti-spam Solutions to the Test . . . Before You Buy
sponsored by MailFrontier
WHITE PAPER: This whitepaper will help you take the anxiety out of testing anti-spam solutions. By following our five-step plan, you can test anti-spam solutions quickly and easily. Most important, you will get results you can trust.
Posted: 10 Aug 2004 | Published: 01 Aug 2004

MailFrontier

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.
 
 
SPAM FILTERS DEFINITION (continued): …  sink directs messages with certain characteristics away from the user's inbox. Such messages may be sent to a quarantine folder or be rejected outright. Each time a message is directed away from the inbox, the program may notify the sender and/or the intended recipient, depending on how the program is written.Among other things, you can use an event sink to specify that:Attachments will download to certain drives or foldersAttachments will be ignored or blockedMessages that would cause an excess of stored data will be rejectedMessages with suspicious characteristics will be quarantined or rejectedNetwork … 
Spam Filters definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement