Articles by alinap

  • Install a Mail Server with Antivirus and Antispam in 15 Minutes

    Author: alinapTags: Comments: 3

    Install a Mail Server with Antivirus and Antispam in 15 Minutes This article illustrates a situation where you need to set up your own mail server (be it your home mail server, or a small office one). It actually shows that, if using an integrated service mail server, anyone can do the job, all in a matter of minutes. AXIGEN Mail Server, the solution chosen for this example, can send and receive e-mails securely via "mydomain.com" and is able to retrieve them in a WebMail interface - this means that it includes all mail services needed for a fully functional mail server (SMTP, IMAP, POP3, WebMail, WebAdmin).

  • Integrating the AXIGEN Messaging Solution with Amavis

    Author: alinapTags: Comments: 0

    Integrating the AXIGEN Messaging Solution with Amavis This document describes the steps required to perform an integration of the AXIGEN Mail Server with Amavis, in order to insure antivirus protection and functionality. Amavis is a generic interface used to connect a mail server to a number of antivirus products.Through Amavis, AXIGEN users have access to twelve different Antivirus applications: Kaspersky, BitDefender, Sophos, F-Prot, DrWeb, Symantec, F-Secure, Avast, eTrust, Norman, Panda and McAfee. At this time, the AXIGEN Messaging Solution integration with Amavis has been sucessfully tested for BitDefender and for Kaspersky Kav4Mailserver.

  • Integrating SquirrelMail with AXIGEN

    Author: alinapTags: Comments: 0

    Integrating SquirrelMail with AXIGENThis document aims to explain how to install and configure SquirrelMail on a machine to act as a webmail interface for AXIGEN. It also focuses on what would be the best choice as a webmail interface in different scenarios.

  • How to Configure OpenLDAP for the AXIGEN Mail Server

    Author: alinapTags: Comments: 0

    How to Configure OpenLDAP for the AXIGEN Mail Server LDAP stands for Lightweight Directory Access Protocol. This protocol is used to access a directory listing. It is being implemented in Web browsers and e-mail programs to enable lookup queries (searches for certain types of information). When compared to other querying architectures such as SQL databases, lookup speed is the major advantage of using LDAP. In large companies, a huge number of requests are made and storing the information in a database becomes a very resource consuming approach. The basic principle behind LDAP is the optimization toward many record reads and few additions or modifications. From an administrator's point of view, LDAP is fairly easy to use as long as the concepts behind the system are understood. It is not the most user-friendly application to use, but the benefits it provides are worth the extra effort.

  • How to Avoid Being Blacklisted

    Author: alinapTags: , , Comments: 2

    How to Avoid Being Blacklisted A blacklist usually refers to a list of e-mail or IP addresses known to send spam e-mails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming e-mails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.

  • Introduction to Antispam Practices

    Author: alinapTags: , Comments: 1

    Introduction to Antispam Practices Competitive Antispam products, proper legislation, efforts towards a better user education, it has all been tried in order to stop spam. However, unsolicited emails keep consuming the space and time of all email users. Moreover, spam messages can be the cause of serious virus and spyware outbreaks, while others “phish” for sensitive information like bank accounts and passwords.

  • SIEVE Language for Mail Filtering Quick Guide

    Author: alinapTags: Comments: 3

    SIEVE Language for Mail Filtering Quick Guide SIEVE is a language created and used for mail filtering that broadens the filtering options generally provided by mail servers or Antispam/Antivirus applications. They work basically by comparing different keys using different comparators and comparison methods, against headers of a mail message. Based on the result of the comparison, you can apply different actions to the corresponding mail message, i.e. reject, discard, redirect, etc.

  • How to Build an Effective Mail Server Defense

    Author: alinapTags: , , , Comments: 2

    How to Build an Effective Mail Server Defense When speaking of mail server-related security, one tends to limit the issue to message applied security measures, and even more to Antivirus and Antispam protection. This is however only one stage in the more complex process of securing your server. This article aims at identifying and explaining all security layers, highly important when choosing a certain mail server and consequently when configuring and using it.