scholarly journals Detection of spam using email signatures

Author(s):  
E V Sharapova ◽  
R V Sharapov

Currently, unwanted emails are actively sent to the Internet. Millions copies of emails are sent simultaneously to various users. Often e-mails undergo minor modifications to complicate the detection of spam. The paper proposes options for determining the signature of e-mails that allow identify letters with the same content and structure. Content signature of the letter includes the basic phrases in the text of the e-mail with the exception of names, numeric codes, suspicious words that are not included in the dictionary. Structure signatures incorporate the same type of e-mails, such as paragraphs, tables, images. The paper shows the results of using signatures to detect e-mail spam.

Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Author(s):  
Ramesh Palanisamy ◽  
Mohammed Tariq Shaikh ◽  
Senthil Jayapal ◽  
Darla Thomas

Nowadays phishing can be considered one of the simplest and oldest ways to steal important data from users on the internet. And only by collecting a small quantity of data about victim the attacker will be able to produce personalized and plausible e-mail. However, these days more ways that are trying to be found and new technologies are inventive to deal with phishing. In this paper, I will present type, cause, prevention measures and dynamic features for growing phishing attacks.


2013 ◽  
Vol 756-759 ◽  
pp. 1013-1016
Author(s):  
Xiao Yun Zou

With the popularity of the Internet, e-mail with its fast and convenient advantages has gradually developed into one of the important communication tools in people's lives. However, the problem of followed spam is increasingly severe, it is not only the dissemination of harmful information, but also waste of public resources. To solve this problem, the author proposed a mail filtering algorithm based on the feedback correction probability learning. The feedback correction probability training has less feedback learning data and use error-driven training in order to achieve a high classification effect. The experiment also tested the idea.


Author(s):  
Ram D. Gopal ◽  
Arvind K. Tripathi ◽  
Zhiping D. Walter

By any measure, e-mail turns out to be one of most effective and useful features offered by the Internet. However, by providing an unprecedented level of personalized communication opportunities, e-mail has also become a favorite tool for commercial advertising which has led to the problem of unsolicited commercial e-mailing (UCE). Popular press is full of articles outlining that businesses spend billions of dollars every year to combat UCE (also termed as “spam” in literature). This chapter looks at the issues in e-mail advertising via a business model termed as Admediation which facilitates e-mail advertising. Admediary is a trusted third party that facilitates a mutually desirable communication between buyers and sellers via e-mail and operates under “opt-in” mode, which is widely supported by consumer advocacy groups. At the end we summarize the viability of Admediation and its impact on e-mail advertising.


2010 ◽  
pp. 1771-1779
Author(s):  
Karen S. Nantz ◽  
Norman A. Garrett

Education over the Internet is going to be so big it is going to make e-mail usage look like a rounding error. John Chambers, Cisco Systems, New York Times, November 17, 1990 Web-based courses (Mesher, 1999) are defined as those where the entire course is taken on the Internet. In some courses, there may be an initial meeting for orientation. Proctored exams may also be given, either from the source of the Web-based course or off-site at a testing facility. The Internet-based course becomes a virtual classroom with a syllabus, course materials, chat space, discussion list, and e-mail services (Resmer, 1999). Navarro (2000) provides a further definition: a fully interactive, multimedia approach. Current figures indicate that 12% of Internet users in the United States use the Internet to take an online course for credit toward a degree of some kind (Horrigan, 2006). That number is indicative of the rapid proliferation of online courses over the past several years. The Web-enhanced course is a blend with the components of the traditional class while making some course materials available on a Web site, such as course syllabi, assignments, data files, and test reviews. Additional elements of a Web-enhanced course can include online testing, a course listserver, instructor-student e-mail, collaborative activities using RSS feeds and related technologies, and other activities on the Internet. One of the biggest concerns about Web-based courses is that users will become socially isolated. The Pew Internet and America Life Project found that online communities provide a vibrant social community (Horrigan, Rainie, & Fox, 2001). Clearly, students are not concerned or feel that other benefits outweigh the potential drawbacks. According to government research (Waits and Lewis, 2003), during the 2000-2001 academic year alone, an estimated 118,100 different credit courses were offered via distance education (with the bulk of that using Internet-based methods) by 2- and 4-year institutions in the United States. Over 3 million students were registered in these courses. Navarro (2000) suggests that faculty members are far more likely to start by incorporating Internet components into a traditional course rather than directly offering Web-based courses. These Web-enhanced courses might be considered the transition phase to the new paradigm of Internet-based courses. Rich learning environments are being created, with a shift from single tools to the use of multiple online tools, both to enhance traditional courses and to better facilitate online courses (Teles, 2002).


Author(s):  
Toshiyuki Maeda ◽  
Tadayuki Okamoto ◽  
Yae Fukushige ◽  
Takayuki Asada

The authors of this chapter present an e-mail based mobile communication system for interactive lecture support. This system consists of: attendance management subsystem, attendance history management subsystem, short examination management subsystem, questionnaire subsystem, and assignment delivery subsystem. Both students and teachers mainly use only e-mail functions and it can access the server. This system can be used regardless of terminal models only if mails can be sent and received through the Internet. In this chapter, the outline of this system is described, and the functions and effects are discussed.


Sign in / Sign up

Export Citation Format

Share Document