© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
D. BothUsing and Administering Linux: Volume 3https://doi.org/10.1007/978-1-4842-9786-5_50

50. Combating Spam

David Both1  
(1)
Raleigh, NC, USA
 

Objectives

In this chapter you will learn
  • How to use SpamAssassin to identify spam email using a set of scoring rules

  • How to create and modify SpamAssassin rules

  • How to hack MIMEDefang to classify spam depending upon its spam score

  • How to use Procmail to sort spam and other emails into mail folders

Introduction

Email is a powerful and useful tool and – despite other, newer types of communication such as texts and social media – retains a prime place in the communications strategies of most organizations and ...

Get Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.