Contact ProExe

Live Chat
RSS Feed
Knowledgebase : SPAM / Anti-virus
   


There are many computer viruses around, and it is wise to protect your computer from virus, worm, and Trojan horse attacks. However, you should view with care any unsubstantiated warnings you receive by email or see on newsgroups. Some of these warnings m...
Techniques to stop spam fall into two categories: Filtering out spam and minimising the exposure of your email addresses. Do Not, ever, click on the REMOVE link SPAMmers add to their emails to you. This also will verify your email address as VALID and you...
Spoofing occurs when a user receives an email from your domain making it look like you were the sender. It's a cheap trick for spammers to trick visitors into thinking it's being sent from a legit place and retrieving everything from passwords to credit c...
1. Most of the worms which use email to propagate use Microsoft Outlook or Outlook Express to spread. If you use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-...
RBL = Real-time Blackhole List The Real-time Block List (RBL) is a real-time database of IP addresses of spam-sources, including known spammers, spam gangs, spam operations and spam support services. The database is kept updated every day, around the cloc...