123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Challenge Response Spam Filters Explained

Profile Picture
By Author: Niall Roche
Total Articles: 9
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

As the flood of spam increases end users are looking for new and more efficient solutions to block spam. In turn software developers are knocking themselves out trying to come up with the killer app that will stop spam forever.

For several years now companies have been focusing on faster and smarter software to be installed on your PC or on your servers that will detect spam through increasingly more complex algorithms. The ingenuity behind these products can't be argued with. The problem was that as the spam filters became better so did the quality of the bulk email software used by the spammers. The battle to fight spam was spiralling out of control.

There's an old scientific principle called Occams Razor. It simply means that all things being equal the most simple solution is often the best one.

Somebody somewhere realized that there was a simple solution to the vast majority of spam. Spammers email millions of people each day. This is an automated process that they can't possibly monitor manually. Enter challenge response spam email filtering.

When using a challenge response system ...
... each email address must be authorized to deliver email to you. You can either authorize these email addresses manually by adding them to your challenge response whitelist or the challenge response email server can take care of that for you.

The process is simple but incredibly efficient.

Spammer sends email

Challenge response email server doesn't recognize address so issues a challenge email that must be phyiscally answered by a real human.

Challenge answer = yes = sender is authorized to send you email

Challenge answer = no = senders email address is added to blacklist and all future email from them is automatically blocked.

Challenge repsonse spam filters demand that a real person reply to the challenge email. Spammers who generate millions of emails a day simply don't have the time to do this and are therefore blocked from sending you any future junk email.

Using a challenge response system initially can be extra work but after 30 days you'll see a dramatic reduction in the amount of email you receive from spammers. Our challenge response system is currently showing 11,000 blocked pieces of spam in the last *5 months*. Those are hard figures to argue with.
About the Author Niall Roche is the content author and owner of www.spam-site.com which reviews spam blocker software.

Total Views: 188Word Count: 392See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: