| 11. | The defendants also used technology designed to avoid AOL's spam filtering mechanisms.
|
| 12. | Spam filtering imports users'address books to compile a whitelist of allowed senders.
|
| 13. | Spam filtering uses technologies Symantec acquired from Brightmail.
|
| 14. | This difficulty is why feature hashing has been tried for spam filtering at Yahoo!
|
| 15. | Other features include a personal firewall, email spam filtering, and phishing protection.
|
| 16. | A low number of false negatives is an indicator of the efficiency of spam filtering.
|
| 17. | Other features included were a personal firewall, email spam filtering, and phishing protection.
|
| 18. | Spam filtering software based on this formula is sometimes referred to as a naive Bayes classifier.
|
| 19. | We can already block IP addresses, which serves as a basic form of spam filtering.
|
| 20. | It is one of the oldest ways of doing spam filtering, with roots in the 1990s.
|