In-Depth

Spam-Fighting Terminology

A list of terms you should know.

Like any other specialized field, spam-fighting has developed its own terminology. Here’s a quick guide to some of the terms you may encounter when researching anti-spam products.

Bayesian. Bayesian analysis looks at relative word frequencies between good and bad e-mail to determine whether a particular e-mail is most likely spam or not. See the sidebar, “Understanding Bayesian Analysis.”

Blacklist. A list of addresses from which e-mail should never be accepted.

DNSBL. DNS Black List. An automated service that returns a code specifying whether it thinks a particular IP address belongs to a spammer. See the sidebar, “Using DNSBLs.”

False negative. Mail that should have been recognized as spam, but which was delivered as regular e-mail instead.

False positive. Mail that should have been delivered, but which was erroneously recognized as spam. Most users find false positives to be far worse than false negatives.

Ham. E-mail that the user wants to receive (the opposite of spam).

Quarantine. A holding pen for messages, from which they can be deleted or approved for delivery, either by the systems administrator or by an individual user.

Spam. Undesired e-mail of any sort. Sometimes called UCE or Unsolicited Commercial E-mail.

Web beacon. A single pixel linked image in an HTML e-mail. This is invisible to the user, but serves to tell the sender when a piece of mail has been opened.

Whitelist. A list of addresses from which e-mail should always be accepted.

Additional Information on Spam

Outrun the Avalanche
http://mcpmag.com/features/article.asp?editorialsid=362

What's New in Exchange 2003
http://mcpmag.com/features/article.asp?editorialsid=363

Understanding Bayesian Analysis
http://mcpmag.com/features/article.asp?editorialsid=364

Two Services for the Enterprise
http://mcpmag.com/features/article.asp?editorialsid=365

Using DNSBLs
http://mcpmag.com/features/article.asp?editorialsid=366

A Thanks to Hormel
http://mcpmag.com/features/article.asp?editorialsid=367

For more terminology and a catalog of spammers’ tricks for disguising their e-mails, see ActiveState’s “Field Guide to Spam” at www.activestate.com/Products/PureMessage/Field_Guide_to_Spam/?_x=1.

About the Author

Mike Gunderloy, MCSE, MCSD, MCDBA, is a former MCP columnist and the author of numerous development books.

Featured

  • Microsoft Expands Azure AD Password Lengths, Adds Conditional Access Controls

    Microsoft announced a couple of Azure Active Directory enhancements this week regarding password lengths and new conditional access controls for IT pros.

  • Attack Surface Analyzer 2.0 Available for Checking Software Installs

    Microsoft this week described Attack Surface Analyzer 2.0, an updated tool for checking software installations that's now built using open source code.

  • What Causes Hyper-V Replication Failures?

    Hyper-V replication failures happen rarely, but their impact can be catastrophic when they do. Know the scenarios that are likely to trigger a replication failure.

  • Microsoft Touts Using HyperClear To Address Intel Processor Woes

    Microsoft is again promoting its HyperClear Hyper-V hypervisor technology as a potential balm for organizations trying to come to grips with Intel's latest speculative execution side-channel attack disclosures.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.