How to make email-lists and do not mow: practical advice

How to make email-lists and do not mow: practical advice

 
The developer, who first encountered the generation of e-mails, has almost no chance to write an application that will do it correctly. About 40% of emails generated by enterprise applications have some kind of violation of standards, and as a result, problems with delivery and display. There are reasons for this: e-mail is technically much more complicated than the web, mail work is regulated by several hundred standards and an uncountable number of common (and not so) practices, and email clients are diverse and unpredictable. Testing can significantly improve the situation, but there are practically ...
+ 0 -

Naive Bayes, or how mathematics allows you to filter spam

Hello! In this article I will talk about how the spam of the letter is being filtered in almost all popular mail services. Let's go through the theory, then consolidate the practice, well, in the end I will provide my sketch of the code in my adored language R. I will try to present as lightly as possible expressions and formulations. Let's get started!
 
 
Naive Bayes, or how mathematics allows you to filter spam
 
Very good article about the naive Bayesian classifier
 
I drew knowledge from the Wiki: ...
+ 0 -

HOWTO setup ubuntu ??? sendmail + DKIM + SFP + DMARC or how I managed to get into the bastion of gmail

Foreword


 
On my server there is an online lighting store sevenlight.ru and an online store for building materials st-goods.ru Before the history with locks of Roskomnadzor we collected traffic about 2000 visits per day, and the mail server sent out about 200 letters per day to all popular mail services , incl. Google and Yandex. Everything was great. But as they say in the well-known clip: "Everything was so good until Roskomnadzor came!" Now, when we managed to find a host whose IP addresses do not fall under the blocking of state censorship, another problem arose.
 
 
I recently discovered ...[/h]
+ 0 -

Symbolic vulnerability: as a simple message results in errors in the phone

Symbolic vulnerability: as a simple message results in errors in the phone
 
Shot from the film "The Matrix" (1999)
 
 
Against the background of the capabilities of modern smartphones, it's easy to forget that mobile communication is a very old technology. The only concept of sending short text messages is was developed. more than 30 years ago. If people started creating SMS in 201? then probably would not limit one message to 160 characters (in 7-bit encoding).
 
 
Communication inherits not only the constraints inherent in the creation. Many errors, hidden and obvious, are waiting for their time for years, beginning with a distant mobile past. Over time, new hardware ...
+ 0 -

How users teach Yandex to warn about telephone spam

All those who have flashed their number on the Internet, filled in a questionable questionnaire in offline or who simply were not lucky to get into numerous bases are familiar with the telephone spam. Today we will tell the readers of Habrahabra about how, through user feedback and machine learning, we taught the Yandex application to warn about unwanted calls.
 
 
How users teach Yandex to warn about telephone spam
 
 
Calls from unfamiliar numbers are always a difficult choice. Is this a long-awaited courier or another operator calling with a "unique" promotional offer? To solve this problem, there are mobile applications that work on the basis of directories ...
+ 0 -

DNSCrypt 2.0 and ad blocking

In this article I would like to consider the innovations of Dnscrypt, on a concrete example, which is sure to be useful for someone.
 
 
For those who do not know, Dnscrypt is a unique protocol for encrypting DNS traffic. It makes it possible to protect DNS communications from interception and spoofing, and, for example, bypass blocking implemented at the level of DNS queries.
 
 
Of the main features of the new version, first of all, I want to note the possibility of communication with the server via the TCP protocol, which makes this channel more stable and less noticeable.
 
 
In this article...
+ 0 -

Conference DEFCON 17. "Steal profits from spammers: how I stopped worrying about spam and fell in love with it." Grant Jordan

Before I tell you about our project, I want to tell you who I am, Grant Jordan, and who is Kyle Vogt, who works for Justin.tv. We are students of the Massachusetts Institute of Technology, who have a lot of free time. And we have a lot of interesting projects, such as a device for hacking safes, which allows you to open safes with the highest degree of protection. However, to understand why we deal with spam, the answer to the question: who are we not?
 
 
We are not experts in the exchange market, spammers or people who suddenly became rich by playing on the stock exchange. Therefore, all I will ...
+ 0 -

Find it if you can. How to select messages in the general stream

Each of us is familiar with the problem of a huge mass of alerts from shops, banks, car dealers and other organizations that are constantly falling on all electronic and not very electronic channels. We used to call it spam, developed reflexes of lightning-speed removal, set up spam filters, or just do not notice such messages. And we reconciled ourselves to the fact that it is practically impossible to find useful messages among them.
 
 
Find it if you can. How to select messages in the general stream
 
 
Is it possible to make electronic channels more efficient, somehow help recipients to find the right letters? The matter is complicated by the fact that while artificial ...
+ 0 -

How to write a single page application (SPA) using Vue.js

How to write a single page application (SPA) using Vue.js
 
Single-page applications (SPA) have many advantages, such as speed, a really good UX, and full control of HTML markup. There are more and more sites for SPA; more and more tools that simplify the process of developing a SPA. You probably already read about the young and promising framework. Vue.js . I suggest you go deeper into Vue and on a concrete example deal with a simple SPA.
 
We will write a client-server application of the simplest blog. The application will display the list of records as well as the full text of each individual record. And by itself, all this will happen without reloading ...
+ 0 -

We extend the capabilities of CleanTalk Anti-Spam

We extend the capabilities of CleanTalk Anti-Spam

Checking existing Joomla users for spam


 
 
Spam bot messages (comments) are often disguised as ordinary user messages, but contain sponsored links or text. The main tasks of such messages are, the user's transition to a malicious resource, advertising or links to enhance the positions of their site. This compromises the site and can spoil the reputation, search engines can lower the position of the site in search results.
 
 
We have implemented a spam check, for comments and users who already exist on the site. This allows site administrators to automatically check and identify comments and ...[/h]
+ 0 -