© David Both 2020
D. BothUsing and Administering Linux: Volume 3https://doi.org/10.1007/978-1-4842-5485-1_9

9. Combating Spam

David Both1 
(1)
Raleigh, NC, USA
 

Objectives

In this chapter, you will learn
  • How to use SpamAssassin to identify spam email using a set of scoring rules

  • How to create and modify SpamAssassin rules

  • How to hack MIMEDefang to classify spam depending upon its spam score

  • How to use Procmail to sort spam and other emails into mail folders

Introduction

Email is a powerful and useful tool and – despite other, newer types of communication such as texts and social media – email retains a prime place in the communications strategies of most organizations and individuals. Email is not the oldest form of digital communication, having been preceded ...

Get Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.