MailScanner: Buy The Book!

Matt Krause krausem at gmail.com
Thu Sep 16 19:42:33 IST 2004


When someone gets this book and has a chance to flip through it, I
wouldn't mind seeing a review/synopsis of the book.   Is the
information contained within it more detailed than what is on the web?
 Stuff like that.

Thanks.

Matt


On Wed, 15 Sep 2004 08:49:23 +0100, Julian Field
<mailscanner at ecs.soton.ac.uk> wrote:
> At 02:57 15/09/2004, you wrote:
> >Can I have the table of content of  the book. I can't find it in the above
> >site.
>
> Chapter
> Introduction..........................................................................
> 7
> A Brief History of
> MailScanner....................................................................7
> How MailScanner
> Works..............................................................................7
> 2 Chapter
> Planning the
> Installation...................................................... 13
> System Requirements
> ................................................................................13
> Firewall and Network
> Requirements.........................................................14
> Installing Red Hat Enterprise
> Linux..........................................................14
> Installing the Message Transfer
> Agent......................................................15
> Installing sendmail
> .....................................................................................15
> Installing Exim
> ...........................................................................................15
> Installing
> Postfix.........................................................................................15
> Installing MailScanner
> ...............................................................................15
> Installing
> SpamAssassin.............................................................................16
> 3 Chapter
> MailScanner Configuration.................................................. 19
> MailScanner
> Files.......................................................................................19
> Getting Started with MailScanner Configuration
> .....................................20
> Before you
> start..........................................................................................20
> MailScanner.conf
> Parameters....................................................................21
> General settings
> .........................................................................................21
> System
> Settings..........................................................................................22
> Incoming Work Dir
> Settings.......................................................................23
> Quarantine and Archive
> Settings...............................................................24
> Processing Incoming Mail
> ..........................................................................25
> Virus Scanning and Vulnerability Testing
> .................................................28
> Options specific to Sophos
> Anti-Virus........................................................31
> Options specific to ClamAV Anti-Virus
> ......................................................32
> Removing/Logging dangerous or potentially offensive content ...............32
> Attachment Filename
> Checking.................................................................35
> 4
> Reports and
> Responses..............................................................................
> 36
> Changes to Message Headers
> ................................................................... 39
> Notifications back to the senders of blocked messages
> ........................... 42
> Changes to the Subject:
> line...................................................................... 43
> Changes to the Message
> Body................................................................... 45
> Mail Archiving and
> Monitoring.................................................................. 46
> Notices to System Administrators
> ............................................................. 46
> Spam Detection and Virus Scanner Definitions
> ........................................ 47
> Spam Detection and Spam Lists (DNS blocklists)
> .................................... 48
> SpamAssassin.............................................................................................
> 50
> What to do with spam
> ................................................................................
> 53
> Logging.......................................................................................................
> 56
> Advanced SpamAssassin Settings
> ............................................................. 57
> Advanced Settings
> .....................................................................................
> 58
> 4 Chapter
> SpamAssassin Configuration.............................................. 63
> spam.assassin.prefs.conf
> ........................................................................... 64
> SpamAssassin and DNS
> .............................................................................
> 64
> White and Black
> Listing.............................................................................
> 64
> Bayesian Filtering
> ......................................................................................
> 65
> Network
> Checks.........................................................................................
> 66
> Adding SpamAssassin Rules
> ...................................................................... 67
> Changing SpamAssassin Rule
> Scores........................................................ 68
> SpamAssassin SURBL
> rules....................................................................... 68
> 5 Chapter
> Advanced Configuration via Rulesets ................................. 71
> Ruleset Formats
> .........................................................................................
> 71
> Direction.....................................................................................................
> 71
> Pattern........................................................................................................
> 72
> Result..........................................................................................................
> 73
> 6 Chapter
> Related Applications
> ........................................................... 75
> MailWatch for MailScanner
> ....................................................................... 75
> MailScanner Webmin Module
> ................................................................... 76
> Vispan.........................................................................................................
> 76
> MailScanner-mrtg
> ......................................................................................
> 76
> 5
> phplistadmin...............................................................................................77
> Network Spam
> Checks...............................................................................77
> DCC.............................................................................................................77
> Razor...........................................................................................................77
> http://razor.sourceforge.net/......................................................................78
> Pyzor
> ...........................................................................................................78
> Tuning.........................................................................................................79
> Trouble shooting
> ........................................................................................80
> Getting Help
> ...............................................................................................80
> AppendixA
> Installing Red Hat Enterprise Linux.................................. 83
> AppendixB
> Installing Third Party Virus Scanners ............................... 85
> AppendixC
> Practical Ruleset Examples ............................................... 89
> Spam Black
> List..........................................................................................89
> Only Sign Outgoing Messages
> ...................................................................89
> Use Different Signatures for Different Domains
> .......................................90
> Only Virus Scan Some
> Domains.................................................................90
> Send System Administrator Notices to Several People
> ............................90
> Scan for spam only from certain domains
> .................................................91
> Filename and Filetype Checking for Specified Domains
> ..........................92
> AppendixD
> Upgrading MailScanner (rpm Version)............................. 95
> The
> Upgrade...............................................................................................95
> Upgrading Mailscanner.conf
> .....................................................................95
> Installing .rpmnew
> files..............................................................................96
>
> 1 Training Introduction
> ....................................................................................................
> 101
> 2 Email Message Structure
> ..............................................................................................
> 105
> 3 The Mail Delivery
> Process............................................................................................
> 111
> 4 MailScanner: What It
> Does...........................................................................................
> 117
> 5 Detailed Analysis
> ..........................................................................................................
> 123
> 5.1 Child Processes
> .....................................................................................................
> 129
> 5.2 Spam Checking
> .....................................................................................................
> 135
> 5.3 Spam
> Actions........................................................................................................
> 159
> 5.4 Attachment Extraction
> ..........................................................................................
> 171
> 5.5 Attachment Checks
> ...............................................................................................
> 181
> 5.6 Virus
> Scanning......................................................................................................
> 203
> 5.7 HTML Checks
> ......................................................................................................
> 213
> 5.8 Quarantine & Modifying Messages
> ...................................................................... 223
> 5.9 Silent & Non-Forging Viruses
> ..............................................................................
> 245
> 100
> 5.10 Message
> Responses...............................................................................................
> 253
> 5.11 Macro-virus Disinfection
> ......................................................................................
> 261
> 6 Administration
> ..............................................................................................................
> 269
> 7 Configuration
> ................................................................................................................
> 279
> 7.1
> Rulesets.................................................................................................................
> 285
> 7.2 Custom Functions
> .................................................................................................
> 297
> 7.3 Internationalisation &
> Reports..............................................................................
> 305
> 7.4 Directory
> Structure................................................................................................
> 309
> 7.5 Startup and
> Shutdown...........................................................................................
> 315
> 8 Charity
> Support.............................................................................................................
> 327
>
>
>
> --
> Julian Field
> www.MailScanner.info
> MailScanner thanks transtec Computers for their support
>
> PGP footprint: EE81 D763 3DB0 0BFD E1DC 7222 11F6 5947 1415 B654
>
> ------------------------ MailScanner list ------------------------
> To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
> 'leave mailscanner' in the body of the email.
> Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
> the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).
>



--
Matt Krause
krausem at gmail.com
http://www.mattkrause.net

------------------------ MailScanner list ------------------------
To unsubscribe, email jiscmail at jiscmail.ac.uk with the words:
'leave mailscanner' in the body of the email.
Before posting, read the MAQ (http://www.mailscanner.biz/maq/) and
the archives (http://www.jiscmail.ac.uk/lists/mailscanner.html).



More information about the MailScanner mailing list