In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
How to analyze the configuration of ScrolloutF1, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain for you in detail, people with this need can come to learn, I hope you can gain something.
The configuration of ScrolloutF1 is here.
1.Secure-Levels
This page is configured with each filter and rating, 1-3 is strict, 4-6 is medium, 7-10 is loose.
1.1 Auto Defense automatic defense, prohibit illegal access and over-limited access to IP for a period of time. The newly built system suggests 7, which will be reduced to about 5 after using for a period of time.
1.2 Average reputation average reputation, evaluate the sender reputation score according to the sender address, IP, domain, fingerprint and other comprehensive information over a period of time.
1.3 Body filter is scored based on the Pyzor2 plug-in.
1.4 Connection filter connection filter to filter spammers based on RBL and DNSBL. The RBL in the figure below is the RBL that comes with ScrolloutF1. This RBL address is virtual and calls ScrolloutF1 services. Other third-party RBL services, such as CBL,ZEN, can also be used here. But generally free RBL will have a daily query limit, such as ZEN is 30W times a day.
1.5 Geographic filter Geographic filter, query the region score according to sender IP, server IP,URL IP, etc. This feeling is not very practical, after all, the network is global integration. We don't know which country our customers will send e-mails from, maybe there are new customers.
1.6 Hearder add attachments filter attachment filter, based on email attachment filtering, such as executable file .exe, document, multimedia, multiple or hidden extension attachments, specific restrictions can be checked in the SpamAssassin configuration file to modify.
1.7 Hostname filter hostname filter, graded or blocked according to the sending hostname, such as wireless, dynamic IP, etc., to prevent domain name forgery.
1.8 IPSec encryption IPSec encryption, dark green strong encryption: AES256,SHA512 and DH modp8192, light green medium encryption: AES256,SHA384 and DH modp3072, red weak encryption: AES128,SHA256 and DH modp2048.
1.9 Picture filter image filter, through OCR technology to detect and score picture content, picture size and links.
1.10 Rate limits in inbound connection limit, in a period of time, SMTP connection number limit, when level
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.