Blue Security's Do Not Intrude Registry - page 2
CEO Eran Reshef said that users report their spam to Blue Security by simply forwarding it to a special e-mail address allocated for each user. The Blue Security analysis team then identifies the spammer's sites and provides instructions to the Blue Frog client (running on the user's machine) on how to post complaints to those sites.
The Blue Frog Web Reporting tool extension for the Firefox browser integrates with user's webmail applications such as Gmail, Hotmail, and Yahoo and automatically forwards the spam for analysis. Thunderbird users will be happy to know that they can report their spam by a click of a button, thanks to some members of the Blue Community that developed a similar extension. Additional mail client extensions are planned in the near future.
Users have full control over the client software. The Blue Frog tool can run in fully active mode or function when the computer is idle. The user can also run it manually, only when needed. Free Linux and Windows versions of Blue Frog are available for download.
The solution is 'transparent' in that community members have visibility into where and when recent opt-out requests have been posted. Members can view this information on the Community portion of the Blue Security Web site. A Blue Frog icon (on the desktop) alerts users when a specific activity is occurring. For example, a message will pop-up from the icon tray indicating that an opt-out request being sent or a report has been sent to a specific government agency.
Blue Security verifies Web sites using blacklists and Internet searches, along with the user reported emails, to ensure that action is not taken on just one source of data. Using proprietary clustering and data management tools, analysis can quickly be done on very large volumes of suspected incoming spam.
The Do Not Intrude Registry is an encrypted list of e-mail addresses of Blue Community members who wish to stop receiving spam. The encryption uses a special hash function developed by Blue Security. Spammers are requested to remove all addressed in the Do Not Intrude Registry from their mailing lists by downloading free compliance tools supplied by Blue Security, which protect the privacy and personal information of members.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 3Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 4Linux Top 3: Linux 3.11, Kubuntu Goes Commercial
- 5Linux Top 3: RHEL 6.5, Debian 7.2 and EOL for Linux 3.0.x