SpamAssassin
Credits
About the Author
About the Reviewers
Introduction
Introducing Spam
Defining Spam
The Costs of Spam
Spam and the Law
Summary
Spam and Anti-Spam Techniques
Spamming Techniques
Anti-Spam Techniques
Spam Filtering Services
Anti-Spam Tools
Open Relays
Email Delivery
Open Relay Tests
MTA Configuration
Protecting Email Addresses
Websites
Usenet
Trojan Software
Mailing Lists and Archives
Registration for Websites
Employees
Business Cards and Promotional Material
How Spammers Verify Email Addresses
Detecting Spam
Content Tests
Header Tests
DNS-Based Blacklists
Statistical Tests
Message Recognition
URL Recognition
Examining Headers
Reporting Spammers
Valid Bulk Email Delivery
Installing SpamAssassin
Building from Source
Using CPAN
Installing by Hand
Resolving Build Failures
Packaged Distributions
Verifying the Installation
Upgrading
Uninstalling
SpamAssassin Components
Configuration Files
Rule Files
Using SpamAssassin
SpamAssassin as a Daemon
SpamAssassin and Procmail
Integrating SpamAssassin into the MTA
Testing and Troubleshooting
Rejecting Spam
Bayesian Filtering
Scoring
Training
Confirming Operation
Filter Training
Disabling Bayesian Filtering
Look and Feel
Headers
Reports
Subject Rewriting
Network Tests
RBLs
SURBLs
Vipul's Razor
Pyzor
DCC
Spamtraps
Rules
Writing Rules
Using Other Rulesets
Improving Filtering
Whitelists and Blacklists
The Auto-Whitelist
Resolving Incorrect Classifications
Character Sets and Languages
Performance
Bottlenecks
Performance Improvement Methodology
Using SQL
Housekeeping and Reporting
Separating Levels of Spam
Detecting When SpamAssassin Fails
Spam and Ham Reports
Building an Anti-Spam Gateway
Choosing a PC Platform
Choosing a Linux Distribution
Configuring Postfix
Installing Amavisd-new
Configuring Amavisd-new
Configuring Postfix to Run Amavisd-new
Configuring External Services
Firewall Configuration
Backups
Testing
Going Live
Email Clients
General Configuration Rules
Microsoft Outlook
Microsoft Outlook Express
Mozilla Thunderbird
Qualcomm Eudora
Choosing Other Spam Tools
Spam Policies
Evaluating Spam Filters
Configuring the Second Filter
Other Techniques
Glossary