Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
26-02-2011, 10:55 AM
Post: #1
Plan For No Spam
Plan For No Spam
Definition

Unwanted and irrelevant mass mailings, commonly known as spam are becoming a serious nuisance that if left unchecked may soon be regarded as a Denial of Service Attack against the email infrastructure of the Internet itself. The term spam is derived from a Monty python sketch set in a cafeteria in which the principal protagonists have difficulty making them heard about a group of Vikings singing. "SPAM" in honor of the meat product manufactured by Hormel.
IDEAL SPAM CONTROL SYSTEM PROPERTIES
" An ideal spam control would have the following properties
" Eliminate all unwanted mails
" Eliminate no wanted mails
" Require no user input on the part of either the sender or the receiver.
" Be compatible with all uses of mail.
" Be compatible with all email infrastructure configurations.
" Be scalable, that is remain effective if 90% of internet users adopt it.
" Resist attempts to evade it.
" Create no new problems.
No perfect spam control solution has been found so far. Filtering approaches are compatible with a broad range of email uses and infrastructure but no filter perfectly identifies even a fraction of unwanted emails without eliminating at least some wanted emails. Further more the more widely a filter is used the greater the incentive becomes for the spam senders to test against it to ensure that their spam gets through.
TOWARDS SOLUTIONS
There are many types of spam and it is likely therefore that any realistic program to eliminate spam will have to address the problem in multiple ways. In particular we should not reject a mechanism out of hand simply because it fails to deal with a particular type of spam sender .For example it is highly unlikely that spam senders engaged in organized crime will respect Opt-Out lists or Legislative approaches. We should not however, we conclude from the fact that a mechanism fails in certain circumstances that it fails completely in all circumstances.
The only mechanisms that rule out of hand are those based on vigilante actions that attempt to gain compliance by coercion.
BEST PRACTICES
The traditional response of the internet to problem uses administrators of deployed protocols is to specify some form of 'Best Practices'. Spam is an attack on the Internet community. The short survey and prosecutions by the FTC and others show that the spam senders are in many cases outright criminals, how then can best practices help? One area in which best practices can provide concrete benefit is in ensuring that the vast majority of Internet users who are acting in good faith do not inadvertently make the problem worse by poorly chosen or poorly coordinated mitigation strategies. Many of the problems being caused by irresponsible blacklists could be addressed through common agreement on best practices for blacklists setting out criteria for issues such as notice to the listed parties, appeals processes and the acceptability of 'collateral damage'. Best practices can also provide backing for legislative approaches. An appropriate statement by an authoritative body can help a court to decide that a particular form of behavior is unacceptable, even if such statements do not have the endorsement of a legislative body they can quickly acquire the force of law when the worst malefactors are being dealt with.
23-04-2011, 10:27 AM
Post: #2
RE: Plan For No Spam

.ppt  A Plan For No Spam.ppt (Size: 306 KB / Downloads: 164)
Introduction
Unwanted and irrelevant mass mailings, commonly known as spam are becoming a serious nuisance that if left unchecked may soon be regarded as a Denial of Service Attack against the email infrastructure of the Internet itself.
The term spam is derived from a Monty python sketch set in a cafeteria in which the principal protagonists have difficulty making them heard about a group of Vikings singing. "SPAM" in honor of the meat product manufactured by Hormel
Ideal Spam Control System Properties
Acceptable Use policies

Pull Vs Push
One of the major problems caused by spam is positive identification as spam of legitimate emails
This is a particular problem with commercial mailing lists and newsletter messages requested by the recipient which frequently carry advertising and make use of content that is likely to be flagged by content inspection filters as spam
One possible solution to this problem would be to add some form of authentication mechanism that communicated the recipient's consent to the mail infrastructure
Another option would be to distribute this form of content using the pull model of the Web [HTTP] and NNTP [NNTP] rather than the push model of the email
Opt-Out and Do-Not-Spam lists
Accountability
Content Inspection
Authentication
Cryptographic SSL
Legislation And Litigation
Prosecutions and Litigation under Existing Legislation
Protocol changes to facilitate spam measures
Authentication Mechanisms
Mailing List Management
Mechanisms identifying messages sent through a mailing list and the means by which the subscription can be cancelled.
Mechanism that allows a mail server to determine that an email user solicited a message from a particular mailing list or other bulk sender
Authenticated subscription management mechanism
Mechanism for communicating the authenticated mailing list subscription mechanisms to email clients.
Mechanisms for identifying automatically generated messages that should not be replied to under any circumstances.
Means of determining that an email client confirms to a consistent means of implementing the above
Comprehensive Email Management
Denial Of Service Black List
Denial Of Service attack typically targets a single site or a small group of sites.
It is likely therefore that in most cases the source of information for the denial of service blacklist would be information collected at the site itself.
Spam Sender Blacklist
It is recommended that spam blacklists be used as one input to the content filtering decision making process than to provide an accept/deny decisions.
In particular end users should not be deprived of wanted email messages because they are send from a source address that has been listed to create ‘collateral damage’ as a means of establishing leverage to cause an ISP to change policy.
In most cases neither the sender nor the receiver has direct influence over these policies and the annoyance caused to the use of these tactic is almost certain to be greater than that caused by the spam itself
Authorized Sender Whitelist
The authorized sender white lists will typically be based on information configured locally from lists of known customers, suppliers and partners.
In cases where robust authentication techniques such as digital certificates are used, it may prove adequate to list exceptions to the white lists.
The use of feedback from end users is highly recommended to assist in the maintenance of the black lists and white lists and in the configuration of the content inspection processor.
This feedback may employ Bayesian inference, least squares minimization etc
Conclusion
Do not send lists, protected using one-way encryption provide an objective definition of a spam message.
Legislative initiatives provide a means of increasing the costs of the spam senders and reducing the profitability of their enterprise.
Content inspection provides a means of identifying undesirable messages that can be deployed with immediate advantage to the user
Authentication provides a means of identifying desirable messages that allows the problem of false positives associated with content inspection to be reduced and with widespread deployment offers the possibility of a comprehensive solution
Authentication policy provides a means of knowing that a message that does not meet the Authentication policy specified by the domain name owner has been forged and should be discarded as spam
Callback loop authentication is acceptable as a last resort when a message has been identified as likely spam. it use as a first line of defense is not acceptable.
Protocol improvements provide support for the content inspection and authentication mechanisms and should be pursued aggressively.
Spam is a security problem.
It is the lack of authentication and authorization in the email system that allows sit to be abused for any purpose spam is a community problem and it is the internet community as a whole that must find, implement and deploy solutions
Rating Plan For No Spam Options
Share Plan For No Spam To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : spam on seminar topic, monty python seminar technology, plan for no spamming, seminar topic on problem for no spam, a plan for no spam seminar topic, a plan for no spam ppt download, seminar about plan for nospam, seminar report on a plan for no spam ppt, computer science seminar topics a plane for no spam, technical project a plan for no spam introduction, a plan for no spam report, no spam, a plan for no spam full seminar report abstract, download seminar project of plan for no spam, seminar on plan for no spam, plan for no spam, a plan for no spam pdf, a plan for no spam, a plan for no spam seminar report, a plan for no spam abstract, a plan for no spam ppt,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Spam Assassin : Seminar Report and PPT seminar projects maker 0 106 09-06-2014 04:45 PM
Last Post: seminar projects maker
  Plan 9 Operating System : Seminar Report and PPT study tips 0 98 09-06-2014 03:21 PM
Last Post: study tips
  A Plan For No Spam : Seminar Report and PPT seminar projects maker 0 95 07-06-2014 02:32 PM
Last Post: seminar projects maker
  Combating Link Spam : Seminar Report and PPT study tips 0 82 07-06-2014 11:19 AM
Last Post: study tips
  A Multiobjective Evolutionary Algorithm for Spam E-mail Filtering pdf seminar projects maker 0 168 16-01-2014 12:54 PM
Last Post: seminar projects maker
  PLAN 9 Operating system computer science crazy 2 1,322 14-01-2014 11:20 AM
Last Post: seminar projects maker
  Test Plan Definition, Types, Template, and Guidelines: study tips 0 318 21-08-2013 02:37 PM
Last Post: study tips
  Generalization-Based Mining of Plan Databases by Divide-and-Conquer study tips 0 368 13-05-2013 04:27 PM
Last Post: study tips
  A SEMINAR REPORT ON Plan For No Spam study tips 0 339 16-04-2013 01:17 PM
Last Post: study tips
  Determining the Sample Plan ppt study tips 0 324 25-02-2013 11:18 AM
Last Post: study tips
This Page May Contain What is Plan For No Spam And Latest Information/News About Plan For No Spam,If Not ...Use Search to get more info about Plan For No Spam Or Ask Here

Options: