In-Depth

Spam-Fighting Terminology

A list of terms you should know.

Like any other specialized field, spam-fighting has developed its own terminology. Here’s a quick guide to some of the terms you may encounter when researching anti-spam products.

Bayesian. Bayesian analysis looks at relative word frequencies between good and bad e-mail to determine whether a particular e-mail is most likely spam or not. See the sidebar, “Understanding Bayesian Analysis.”

Blacklist. A list of addresses from which e-mail should never be accepted.

DNSBL. DNS Black List. An automated service that returns a code specifying whether it thinks a particular IP address belongs to a spammer. See the sidebar, “Using DNSBLs.”

False negative. Mail that should have been recognized as spam, but which was delivered as regular e-mail instead.

False positive. Mail that should have been delivered, but which was erroneously recognized as spam. Most users find false positives to be far worse than false negatives.

Ham. E-mail that the user wants to receive (the opposite of spam).

Quarantine. A holding pen for messages, from which they can be deleted or approved for delivery, either by the systems administrator or by an individual user.

Spam. Undesired e-mail of any sort. Sometimes called UCE or Unsolicited Commercial E-mail.

Web beacon. A single pixel linked image in an HTML e-mail. This is invisible to the user, but serves to tell the sender when a piece of mail has been opened.

Whitelist. A list of addresses from which e-mail should always be accepted.

Additional Information on Spam

Outrun the Avalanche
http://mcpmag.com/features/article.asp?editorialsid=362

What's New in Exchange 2003
http://mcpmag.com/features/article.asp?editorialsid=363

Understanding Bayesian Analysis
http://mcpmag.com/features/article.asp?editorialsid=364

Two Services for the Enterprise
http://mcpmag.com/features/article.asp?editorialsid=365

Using DNSBLs
http://mcpmag.com/features/article.asp?editorialsid=366

A Thanks to Hormel
http://mcpmag.com/features/article.asp?editorialsid=367

For more terminology and a catalog of spammers’ tricks for disguising their e-mails, see ActiveState’s “Field Guide to Spam” at www.activestate.com/Products/PureMessage/Field_Guide_to_Spam/?_x=1.

About the Author

Mike Gunderloy, MCSE, MCSD, MCDBA, is a former MCP columnist and the author of numerous development books.

Featured

  • Microsoft Highlights Emerging Kubernetes Scalability and Governance Efforts

    Microsoft this week highlighted some emerging efforts to improve both the scalability and governance of the open source Kubernetes container orchestration service.

  • Microsoft Ending Azure Container Service Support in 2020

    Microsoft gave notice earlier this month that it will be ending its Azure Container Service on Jan. 31, 2020.

  • Microsoft Releases Surface Diagnostic Toolkit for Business

    Microsoft released a new tool, Surface Diagnostic Toolkit for Business, earlier this month, providing a means for IT pros to find and troubleshoot problems on Microsoft Surface devices.

  • How To Enable Guest Access for Office 365

    While it's possible to give outside users access to certain content in your organization's Office 365 environment, the process of setting them up requires a few extra steps.

comments powered by Disqus
Most   Popular

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.