3. Conclusion
By implementing a mail relay, using the software solution presented, all current anti-SPAM functions are available, each with its advantages and disadvantages.
Thanks to the modularity of this architecture, it is possible to play with all levels of filtering, both in terms of activating or deactivating an entire section of control, and in terms of the control itself within a specialized module. In this way, it is possible to fine-tune the control aimed at blocking SPAM, but also the authorizations intended to allow by-passes for sources recognized as reliable.
Finally, it's worth noting that such a solution can be implemented very quickly. For someone technically qualified in the selected Unix operating system, it's a matter of a day.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Networks and Telecommunications"
(
170 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!