Master of Science thesis Fighting Spam
Master of Science thesis Fighting Spam Master of Science thesis Fighting Spam
Figur 56 Whitelistfanebladet i hovedvinduet. For at tilføje en emailadresse til listen, indtastes emailadressen i tekstfeltet i bunden af fanebladet. Herefter trykkes på knappen Add . Nu tilføjes emailadressen til whitelisten og email fra denne adresse vil herefter altid modtages. Ønskes det siden hen at fjerne en adresse fra listen, markeres denne ved at klikke i listen. Herefter trykkes på Remove , og adressen fjernes fra listen. 170
Appendiks C Litteratur I følgende referencer optræder en række internetadresser, hvis indhold kan have ændret sig på nuværende tidspunkt. Derfor understreges det, at der er refereret til internetadressernes indhold i Januar og Februar 2005. [1] The Time Overhead of Email, A Ferris Research White Paper, Dec 2003 [2] The Cost of Spam, A Ferris Research White Paper, March 2003 [3] DNS Blacklist [4] Spam Cannibal www.solarwinds.net www.spamcannibal.org. [5] MAPS (Mail Abuse Prevention System) [6] Postini Statistics 171 www.mail-abuse.org www.emcs.net/Protection/statistics.htm [7] Sahami, M., Dumais, S., Heckerman, D., and Horvitz, A Bayesian approach to filtering junk e-mail, 1998. [8] SpamFighter [9] Razor www.spamfighter.com razor.sourceforge.net [10] Distributed Checksum Clearinghouse [11] Brightmail www.rhyolite.com/anti-spam/dcc www.brightmail.com, Symantec corporation, www.symantec.com [12] Filtering Technologies in Symantec Brightmail AntiSpam 6.0, Symantec Corporation. [13] SpamAssassin www.spamassassin.apache.org, [14] C. Dwork et al, Pricing via Processing, Combatting Junk Mail, 1992 [15] C. Dwork et al, On Memory-Bound Functions for Fighting Spam [16] HashCash www.hashcash.org [17] M. Abadi et al, Moderately Hard, Memory-bound Functions [18] IBM Systems Journal Vol 41, No 4, 2002 [19] M.Abadi et al, Certified Email with a Light Online Trusted Third Party: Design and Implementation, Maj 2002 [20] Bruce Schneier & James Riordan, A Certified E-Mail Protocol [21] Cashette www.cashette.com [22] Lorrie Faith Cranor and Brian A. LaMacchia, Spam!, Communications of the ACM. Vol. 41, No. 8, Aug. 1998 [23] GnuPG www.gnupg.org
- Page 121 and 122: udskrevet i terminalen. Findes der
- Page 123 and 124: ved at udføre trin 7 og trin 8). H
- Page 125 and 126: 8 Evaluering Formålet med at imple
- Page 127 and 128: - Indkasser SpamCash . Brugeren mar
- Page 129 and 130: I alle følgende Modtag email -case
- Page 131 and 132: færdig. Derudover blev der sendt o
- Page 133 and 134: - CurrencyBlindingFactorPacket(Blin
- Page 135 and 136: RS Registreringsserver Registrering
- Page 137 and 138: I pengeserveren skal det fastsætte
- Page 139 and 140: Oprettelsesbeløb Oprettelse i syst
- Page 141 and 142: ingen vil benytte systemet. At skul
- Page 143 and 144: 8.3.1.a Emailhåndtering SpamCash-s
- Page 145 and 146: klienten brug for mindre, kunne den
- Page 147 and 148: af systemet checker mail døgnet ru
- Page 149 and 150: 9 Konklusion Dette afsluttende kapi
- Page 151 and 152: Som systemet er nu, udføres automa
- Page 153 and 154: Appendiks A Installationsvejledning
- Page 155 and 156: A.2 Installation og start af klient
- Page 157 and 158: A.6.2 OpenSSL Oprettelse af certifi
- Page 159 and 160: Appendiks B Brugsvejledning B.1 Spa
- Page 161 and 162: For at starte registreringsprocedur
- Page 163 and 164: Figur 43 Hovedvinduet under fanebla
- Page 165 and 166: Figur 46 Fejlbesked ved åbning af
- Page 167 and 168: Under møntantallene kan ses en lis
- Page 169 and 170: Sker der en fejl eller er det ikke
- Page 171: Figur 55 B.6.5 Opdater whitelist Di
- Page 175 and 176: [45] Levente Buttyán and Jean-Pier
- Page 177 and 178: SpamCash 175
- Page 179 and 180: GUI 177
- Page 181 and 182: MailHandler 179
- Page 183 and 184: Safe 181
- Page 185 and 186: NetworkPackets 183
- Page 187 and 188: CES 185
- Page 189 and 190: Utilities 187
- Page 191 and 192: Appendiks E Logfil Herunder ses et
- Page 193 and 194: Appendiks F Maple kode Herunder ses
- Page 195 and 196: Appendiks G Matlab kode I dette app
- Page 197 and 198: Appendiks H JAVA Kode I dette bilag
- Page 199 and 200: 10.4.4 BLS ........................
- Page 201 and 202: 10 Kildekode 10.1 Client 10.1.1 Con
- Page 203 and 204: throw new Exception("Error"); regis
- Page 205 and 206: NotificationHeader header = new Not
- Page 207 and 208: catch(ConnectException ex) { error
- Page 209 and 210: throw new Exception( "An error has
- Page 211 and 212: } Debugger.debug(getClass(), 1, "Co
- Page 213 and 214: } MimeMessage ext2 = MimeTools.read
- Page 215 and 216: addType1(c, privkey2, address4); ad
- Page 217 and 218: public CurrencyExchangeClient() thr
- Page 219 and 220: } return(int) (amount / Config.coin
- Page 221 and 222: private PlusMinusListener plusMinus
Appendiks C Litteratur<br />
I følgende referencer optræder en række internetadresser, hvis indhold kan have ændret<br />
sig på nuværende tidspunkt. Derfor understreges det, at der er refereret til<br />
internetadressernes indhold i Januar og Februar 2005.<br />
[1] The Time Overhead <strong>of</strong> Email, A Ferris Research White Paper, Dec 2003<br />
[2] The Cost <strong>of</strong> <strong>Spam</strong>, A Ferris Research White Paper, March 2003<br />
[3] DNS Blacklist<br />
[4] <strong>Spam</strong> Cannibal<br />
www.solarwinds.net<br />
www.spamcannibal.org.<br />
[5] MAPS (Mail Abuse Prevention System)<br />
[6] Postini Statistics<br />
171<br />
www.mail-abuse.org<br />
www.emcs.net/Protection/statistics.htm<br />
[7] Sahami, M., Dumais, S., Heckerman, D., and Horvitz, A Bayesian approach to<br />
filtering junk e-mail, 1998.<br />
[8] <strong>Spam</strong>Fighter<br />
[9] Razor<br />
www.spamfighter.com<br />
razor.sourceforge.net<br />
[10] Distributed Checksum Clearinghouse<br />
[11] Brightmail<br />
www.rhyolite.com/anti-spam/dcc<br />
www.brightmail.com, Symantec corporation, www.symantec.com<br />
[12] Filtering Technologies in Symantec Brightmail Anti<strong>Spam</strong> 6.0, Symantec<br />
Corporation.<br />
[13] <strong>Spam</strong>Assassin<br />
www.spamassassin.apache.org,<br />
[14] C. Dwork et al, Pricing via Processing, Combatting Junk Mail, 1992<br />
[15] C. Dwork et al, On Memory-Bound Functions for <strong>Fighting</strong> <strong>Spam</strong><br />
[16] HashCash<br />
www.hashcash.org<br />
[17] M. Abadi et al, Moderately Hard, Memory-bound Functions<br />
[18] IBM Systems Journal Vol 41, No 4, 2002<br />
[19] M.Abadi et al, Certified Email with a Light Online Trusted Third Party: Design<br />
and Implementation, Maj 2002<br />
[20] Bruce Schneier & James Riordan, A Certified E-Mail Protocol<br />
[21] Cashette<br />
www.cashette.com<br />
[22] Lorrie Faith Cranor and Brian A. LaMacchia, <strong>Spam</strong>!, Communications <strong>of</strong> the<br />
ACM. Vol. 41, No. 8, Aug. 1998<br />
[23] GnuPG<br />
www.gnupg.org