Anti Spam Software
  co.uk uk.com
org org.uk
net ltd.uk
com net.uk
gb.com biz
gb.net uk.net
info
 

Anti Spam Software

Are you tired of going through junk e-mails every day? Do you have to delete a dozen e-mails to get to the one that actually contributes to your business? Are you losing hours of staff productivity with unsolicited e-mail and the time it takes to download?

Legend Communications antiSpam solution is a mail filter to identify spam. Using its rule base, it uses a wide range of tests on mail headers and body text to identify spam, also known as unsolicited commercial e-mail. Once a message is defined as spam, the Legend Communications antiSpam solution enables you to take pre-defined actions, such as tagging, re-routing or deleting the message.

Package features:

  • Control the level of filters based on e-mail attributes and rules
  • Set rules for all POP3 mailboxes on a specific domain
  • Several options on how e-mail spam is handled
  • Make "blacklists" to block spam or "whitelists" to let it through
  • Avoid the junk and simply download the e-mails you want
  • Frees up your Internet connection

99.95 per year - exclusive of VAT

Please click here to enquire about Anti Spam Software..(you will be forwarded to a Legend Communications enquiry form)
Or contact us on 0845 1 000 000

The Life Cycle of a Computer Virus

Computer viruses have a life cycle that starts when they're created and ends when they're completely eradicated. The following outline describes each stage.

Creation

Until a few years ago, creating a virus required knowledge of a computer programming language. Today anyone with even a little programming knowledge can create a virus. Usually, though, they are the creation of misguided individuals who wish to cause widespread, random damage to computers.

Replication

Viruses replicate by nature. A well-designed virus will replicate for a long time before it activates, which allows it plenty of time to spread.

Activation

Viruses that have damage routines will activate when certain conditions are met, for example, on a certain date or when the user takes a particular action. Viruses without damage routines don't activate, instead causing damage by stealing storage space.

Discovery

This phase doesn't always come after activation, but it usually does. When a virus is detected and isolated, it is sent to the International Computer Security Association in Washington, USA to be documented and distributed to antivirus developers. Discovery normally takes place at least a year before the virus might have become a threat to the computing community.

Assimilation

At this point, antivirus developers modify their software so that it can detect the new virus. This can take anywhere from one day to six months, depending on the developer and the virus type.

Eradication

If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat.

For more details on our products and services, see below:

home | services | help | contact | resource directory
domain name history | working of a domain name | choosing a domain name

© 2004 DomainNamesGB.com