3. Conclusion
By implementing a mail relay, using the software solution presented, all current anti-SPAM functions are available, each with its advantages and disadvantages.
Thanks to the modularity of this architecture, it is possible to play with all levels of filtering, both in terms of activating or deactivating an entire section of control, and in terms of the control itself within a specialized module. In this way, it is possible to fine-tune the control aimed at blocking SPAM, but also the authorizations intended to allow by-passes for sources recognized as reliable.
Finally, it's worth noting that such a solution can be implemented very quickly. For someone technically qualified in the selected Unix operating system, it's a matter of a day.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Also in our database
Websites
https://www.broadcom.com/products/cyber-security
...Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference