- Web Server
- Control Panels
- Site Map/RSS Feeds
DSPAM WebUI with Virtual Users on Debian Sid
This howto is based on DSPAM With Embedded ClamAV Integrated Into Postfix With Virtual Users And Domains. To be able to use the DSPAM WebUI, and to let users take care of their own spam and train DSPAM themselves, you will have to install dspam-webfrontend.
DSPAM With Embedded ClamAV Integrated Into Postfix With Virtual Users And Domains
This document describes how to integrate DSPAM with embedded ClamAV into a mail server based on Postfix featuring virtual users and domains, i.e. users and domains that are in a MySQL database. It rests upon parts of the howto Virtual Users And Domains With Postfix, Courier And MySQL (Debian Etch) from Falko Timme.
Email Classification (Incl. Spam Classification) With POPFile On Ubuntu Feisty Fawn
This article shows how you can install and use POPFile to classify incoming emails on an Ubuntu Feisty Fawn desktop. It is a POP3 proxy that fetches your mails from your mail server, classifies them and passes them on to your email client. Of course, POPFile must be trained to properly classify emails.
Filtering PDF-/XLS-/Image-Spam With ClamAV (And ISPConfig) On Debian/Ubuntu
There is currently a lot of spam where the spam "information" is attached as .pdf or .xls files, sometime also hidden inside a .zip file. While these spam mails are not easy to catch with e.g. SpamAssassin or a Bayes filter, the ClamAV virus scanner can catch them easily when it is fed with the correct signatures as ClamAV is built to scan mail attachments.
How to Avoid Being Blacklisted
A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
Postfix Monitoring With Mailgraph And pflogsumm On Debian Etch
This article describes how you can monitor your Postfix mailserver with the tools Mailgraph and pflogsumm. Mailgraph creates daily, weekly, monthly, and yearly graphs of sent, received, bounced, and rejected emails and also of spam and viruses, if SpamAssassin and ClamAV are integrated into Postfix (e.g. using amavisd-new). These graphs can be accessed with a browser, whereas pflogsumm ("Postfix Log Entry Summarizer") can be used to send reports of Postfix activity per email.
Setting Up Postfix As A Backup MX
In this tutorial I will show how you can set up a Postfix mailserver as a backup mail exchanger for a domain so that it accepts mails for this domain in case the primary mail exchanger is down or unreachable, and passes the mails on to the primary MX once that one is up again.
Retrieving Emails From Remote Servers With getmail (Debian Etch)
Getmail is a program for retrieving emails from remote servers; it is very similar to fetchmail, but more flexible. For example, it can be configured to deliver mails directly to a Maildir or mbox mailbox without the need for an MTA such as Postfix, but of course it can also pipe the mails through an MTA if you want. Getmail can use so called filters such as SpamAssassin and ClamAV to scan the mails, and you can even tell getmail to delete mails on the original server only after a certain number of days.
Converting All Your MS Outlook PST Files To Maildir Format
One of the challenges you may face when converting an office from Microsoft Windows to Linux is that many people archive their e-mail in PST files. There are PST tools available, but most of them are commercial, since the PST file format is closed and protected by Microsoft. There are several non-commercial methods to achieve roughly the same goal, and in this tutorial we use IMAP (more specifically, courier-imap) to convert all our e-mails from PST to the Maildir format. The advantage of this approach is that you also lay the foundation for a new mail system, with all your old e-mails already imported the day you switch over.
Introduction to Antispam Practices
Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.