Der rechtlich einwandfreie Umgang mit Spam erhitzt die Gemüter: Es gilt nicht nur, den täglich wachsenden Schaden durch unerwünschte E-Mail-Massen zu begrenzen, sondern auch durch geeignete Gestaltung der Gegenmaßnahmen keinen Straftatbestand zu erfüllen – ein Spagat.
DNS-based block list information/database. Resource to find out information on DNS block lists and check IPs to see if the are block listed in over 100 blacklist in just seconds.
check a domain's SPF (Sender Policy Framework) record, löst includes gleich mit auf | include:_spf.example.com = TXT-DNS-record von _spf-subdomain (dig ... txt) | SPF-Test mit gutem Log (redirect...) http://vamsoft.com/support/tools/spf-policy-tester
Die Anzahl von gestohlenen Datensätzen durch Cybercriminelle und die größten Spam-Versender. INTERNET WORLD Business zeigt interessante Zahlen aus den Bereichen Technik, Social Media und E-Commerce
Getting comments on your articles and such is great — you know people are reading your stuff, helpful visitors will expand, refine and correct your posts. It’s all good. Except when it isn’t. When it isn’t good, you get tons of spam submissions and you feel like you’re spending all your time sifting through them.
Unter Wordpress-Bloggern ist Akismet ein beliebtes Tool, um Spam-Kommentare und -Trackbacks abzufangen. Six Apart, Hersteller von Movable Type und TypePad-Hoster, hat nun die seit Jahren selbst genutzte Lösung unter der GPL veröffentlicht und bietet sie zudem anderen Bloggern als kostenlosen Dienst an.
spamgourmet provides disposable email addresses that get created automatically the first time they are used, forward messages, and then automatically expire.
A. Dargahi Nobari, N. Reshadatmand, and M. Neshati. Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, page 2035–2038. New York, NY, USA, Association for Computing Machinery, (2017)
L. Becchetti, C. Castillo, D. Donato, S. Leonardi, and R. Baeza-Yates. The European Integrated Project Dynamically Evolving, Large Scale Information Systems (DELIS): proceedings of the final workshop, 222, page 99--113. Heinz-Nixdorf-Institut, Universität Paderborn, (February 2008)
J. Abernethy, O. Chapelle, and C. Castillo. Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, page 41--44. New York, NY, USA, ACM, (2008)
J. Ayres, J. Flannick, J. Gehrke, and T. Yiu. International Conference on Knowledge Discovery and Data Mmining (SIGKDD), page 429--435. ACM, ACM, (2002)
M. Atzmueller, F. Lemmerich, B. Krause, and A. Hotho. Proc. LeGo-09: From Local Patterns to Global Models, Workshop at the 2009 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, (2009)accepted.
M. McCord, and M. Chuah. Proceedings of the 8th International Conference on Autonomic and Trusted Computing, page 175--186. Berlin, Heidelberg, Springer-Verlag, (2011)
C. Kater, and R. Jäschke. Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud Prevention, page 2:1--2:6. New York, NY, USA, ACM, (June 2016)
B. Bullock, H. Lerch, A. Roßnagel, A. Hotho, and G. Stumme. Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, page 15:1--15:8. New York, NY, USA, ACM, (2011)
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th international workshop on Adversarial information retrieval on the web, page 61--68. New York, NY, USA, ACM, (2008)
M. Atzmueller, F. Lemmerich, B. Krause, and A. Hotho. Proc. LeGo-09: From Local Patterns to Global Models, Workshop at the 2009 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, (2009)accepted.
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th international workshop on Adversarial information retrieval on the web, page 61--68. New York, NY, USA, ACM, (2008)
M. Atzmueller, F. Lemmerich, B. Krause, and A. Hotho. Proc. LeGo-09: From Local Patterns to Global Models, Workshop at the 2009 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, (2009)accepted.
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th international workshop on Adversarial information retrieval on the web, page 61--68. New York, NY, USA, ACM, (2008)
A. Hotho, D. Benz, R. Jäschke, and B. Krause (Eds.) Workshop at 18th Europ. Conf. on Machine Learning (ECML'08) / 11th Europ. Conf. on Principles and Practice of Knowledge Discovery in Databases (PKDD'08), (2008)
M. Jamnekar, M. Shelke, and P. Sambhare. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (3):
1621--1624(March 2015)
M. Atzmueller, F. Lemmerich, B. Krause, and A. Hotho. Proc. LeGo-09: From Local Patterns to Global Models, Workshop at the 2009 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, (2009)accepted.
J. Van Hulse, T. Khoshgoftaar, and A. Napolitano. Proceedings of the 24th international conference on Machine learning, page 935--942. New York, NY, USA, ACM, (2007)
B. Bullock, H. Lerch, A. Roßnagel, A. Hotho, and G. Stumme. Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, page 15:1--15:8. New York, NY, USA, ACM, (2011)
C. Chang, and C. Lin. ACM Transactions on Intelligent Systems and Technology, 2 (3):
27:1--27:27(2011)Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, page 61--68. New York, NY, USA, ACM, (2008)
C. Dwork, M. Naor, and H. Wee. Advances in Cryptology – CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2005)
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, page 61--68. New York, NY, USA, ACM, (April 2008)
Y. Chung, M. Toyoda, and M. Kitsuregawa. Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web, page 9--16. New York, NY, USA, ACM, (2009)
S. Javanmardi, D. McDonald, and C. Lopes. Proceedings of the 7th International Symposium on Wikis and Open Collaboration, page 82--90. New York, NY, USA, ACM, (2011)
K. Itakura, and C. Clarke. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, page 822--823. New York, NY, USA, ACM, (2009)
T. Yoshinaka, S. Ishii, T. Fukuhara, H. Masuda, and H. Nakagawa. Proceedings of the 2008/2009 international conference on Social software: recent trends and developments in social software, page 88--99. Berlin, Heidelberg, Springer-Verlag, (2010)
P. Kolari, T. Finin, and A. Joshi. AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, Computer Science and Electrical Engineering, University of Maryland, Baltimore County, (March 2006)Also available as technical report TR-CS-05-13.
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, page 61--68. New York, NY, USA, ACM, (April 2008)
B. Krause, C. Schmitz, A. Hotho, and G. Stumme. AIRWeb '08: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, page 61--68. New York, NY, USA, ACM, (April 2008)
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), (July 2010)
H. Kwak, C. Lee, H. Park, and S. Moon. Proceedings of the 19th international conference on World wide web, page 591--600. New York, NY, USA, ACM, (2010)