Re: misc_10.cf
On 09.02.09 22:09, RobertH wrote: after a few, i kinda figured that it wasnt in 3.2.x yet i was still trying to understand why on the website and then the download link page has that info at the bottom. because users tend to complain to authors who have no possibility of affecting servers other then their own? so the bottom line is that page should be edited / corrected and i am still wanting to find the right example to make this file /etc/mail/spamassassin/10_local_report.cf am i chasing a ghost for no reason? anyone else using this in thier installs? I don't use report_safe. If you do, you apparently should modify that. --- from downloads link page on spamassassin site System Administrators Please create a local copy of the report_template text in a file named something like /etc/mail/spamassassin/10_local_report.cf, and modify it to provide your tech support desk's contact information, instead of the default. Otherwise your users will be confused, and some may ultimately contact the SpamAssassin development team, which is not appreciated; we cannot help them with whitelisting/blacklisting/customisation of settings at your site, after all. The default report text can be found in the file rules/10_misc.cf. -- Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Save the whales. Collect the whole set.
Re: misc_10.cf
RobertH wrote on Mon, 9 Feb 2009 22:09:02 -0800: so the bottom line is that page should be edited / corrected and i am still wanting to find the right example to make this file /etc/mail/spamassassin/10_local_report.cf am i chasing a ghost for no reason? System Administrators Please create a local copy of the report_template text in a file named something like /etc/mail/spamassassin/10_local_report.cf What is it that you don't understand in this description? Don't you find report_template ? Did you notice that is says something like ? Kai -- Kai Schätzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com
Re: misc_10.cf
On 9-Feb-2009, at 23:02, Theo Van Dinter wrote: 10_misc.cf isn't in 3.2, 3.1 was the last version to have it. In 3.2 it's called 10_default_prefs.cf. You should have it installed in the default rules dir, probably /usr/share/spamassassin. /usr/local/share/spamassassin/10_default_prefs.cf on my system -- Hey kids, shake it loose together the spotlight's hitting something That's been known to change the weather we'll kill the fatted calf tonight So stick around you're gonna hear electric music: Solid walls of sound
vbounce and ooo messages
Jason: you said if I came up with a patch (and this is the first one) for ooo messages, I should send it to you. consider that ooo messages, AND, read recipet messages will be generated by the recipients MTA, will NOT include any of the original message, and therefore cannot bw whitelisted by the whitelist_vbounce servers at all. ALL of my FP's for vbounce are now ooo messages (annoying, yes), and read receipt, and like CR_BOUNCE_MESSAGES, I believe they deserve a different rule. (yes, I like to put a 10 score on 'bounce_messages', BUT not CR_bounce, or 000 bounce) this makes a new meta rule, OOO_BOUNCE_MESSAGES for the OOO rules, adds OOO_BOUNCE_MESSAGES to the ANY_BOUNCE_MESSAGES META, excludes it from BOUNCE_MESSAGES. normal (low) suggested score also. (I added in the _have_bounce relays, and ! whitelist relays, just in case) see bug #6063 for patch: https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6063 -- Michael Scheidell, CTO Phone: 561-999-5000, x 1259 *| *SECNAP Network Security Corporation * Certified SNORT Integrator * King of Spam Filters, SC Magazine 2008 * Information Security Award 2008, Info Security Products Guide * CRN Magazine Top 40 Emerging Security Vendors * Finalist 2009 Network Products Guide Hot Companies _ This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/ _
RE: misc_10.cf
matus and others i hadnt ever seen that info before and was just checking to see what it was all about first of all, the info on the SA website download area is outdated. bad info. second of all, i was trying to figure out if it was talking about getting valid info to people and if it could be benefical for our clients and even more specifically if it could benefit legit people that email our clients who send garbage that gets bounced. getting good info to people when there are problems usually seems to be helpful. we do not use the function where the email becomes an attachment if that is what you mean by report safe - rh
RE: misc_10.cf
What is it that you don't understand in this description? Don't you find report_template ? Did you notice that is says something like ? Kai kai i was only trying to find out if there was something that could benefit clients or people that email them and save our organization time was all. evidentally, it is all a wild goose chase ...otherwise i would have gotten better understanding from many on the list that know what it is used for to help clients communicate with organizational administrators in dealing with problems or whatever - rh
Re: pflogsum and Bayes
On Tue, 2009-02-10 at 07:36 -0700, LuKreme wrote: I have a cron event that sends output of pflogsum to me each day. I don't have any special handling of these messages in procmail, so they get processed by spamc/spamd along with everything else. Despite a lot of training with sa-learn, the messages are ALWAYS tagged, and ^^ tagged quite high. Looking at the rules triggered and your description of pflogsum, I can only imagine what the contents actually might be... However, training *that* as HAM is most likely to be counter-productive, attempting to learn spammy tokens as ham. I absolutely would not. So, I can setup of a special rule to have these messages avoid the spamc/d check and that is certainly an option, but I am hesitant to I definitely would do that. No, wait, I *am* doing that. :) Wherever you call SA, avoid calling it for these particular mails. Actually, for any messages of this kind, cron messages generated internally. Do you expect spam to originate there? -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
RE: misc_10.cf
The information on the download page should be corrected to point to the right file. Or perhaps removed entirely: when you build from source, the build procedure prompts you for site contact information and puts it into the 10_default_prefs.cf file. It is also put into the sa-update script, so that the substitution is made whenever sa-update downloads a new version of 10_default_prefs.cf. (I don't know if this happens for CPAN or package installs.) -Original Message- From: Matt Kettler [mailto:mkettler...@verizon.net] Sent: Tuesday, February 10, 2009 1:16 AM To: RobertH Cc: users@spamassassin.apache.org Subject: Re: misc_10.cf RobertH wrote: Um, that's a file that comes with SA, and it is *NOT* user editable. Therefore, it's not an example, it is a standard config file that generates the default settings that you later over-ride with your local.cf. The 3.2.5 installation tarball will install the version of this file that is appropriate for 3.2.5, and sa-update may update it. matt, i am not seeing that file anywhere in my install and i am quite capable of using the locate command etc... Ahh, I forgot, 10_misc.cf has been renamed to 10_default_prefs.cf. My bad. Here's the 3.2 version. http://svn.apache.org/repos/asf/spamassassin/branches/3.2/rules/10_defa ult_prefs.cf It should, by default, be in /usr/share/spamassassin, along with the other files that create the default ruleset. Updated ones created by sa-update would be in /var/lib/spamassassin. You may want to template off that (see below) i am fairly certain i hand generated and installed via rpm generated by rpm -tb sa-tarballname.whateveritwas.somethingsomething something like that. on a centos aka redhat clone the misc_10.cf file looks pretty editable to me in some respects. If it looks editable, please note it contains this text near the top: # Please don't modify this file as your changes will be overwritten with # the next update. Use @@LOCAL_RULES_DIR@@/local.cf instead. # See 'perldoc Mail::SpamAssassin::Conf' for details. (see below for more clarification) i wouldnt have even have asked if i had not gone to spamassassin.apache.org and then clicked on downloads and on that page it says System Administrators Please create a local copy of the report_template text in a file named something like /etc/mail/spamassassin/10_local_report.cf, Ok, *that* you can do. You can, at the /etc/mail/spamassassin/ level create a file, with any name, that has the report_template parts of the file and edit that. This is, of course, creating a copy in your site rules dir, which is OK. I was trying to steer you away from the very common mistake of editing the base config files in /usr/share/spamassassin, as they get over-ridden, or obliterated, by sa-update runs. Editing files at the /usr/share/spamassassin or /var/lib/spamassassin level will just result in your changes being lost on the next sa-update run. Hence the warning.
Updating SpamAssassin
Hi, I have been looking at installing spam assassin on a small network I have setup at home. The machine that I am setting up spam assassin on does not have internet access. So the question is how can I setup spam assassin or more precisely how do I setup sa-update to link to a file I have downloaded via another machine ? If I can download the latest update from your updates.spamassassin.org via another machine store it on a locally shared folder and then point SA to that directory that would be ideal. Is this possible ?? The plan is to automate this at some stage but I was looking on your wiki and I wasnt sure if what I am aiming for is possible or will be possible in upcoming releases ? Any Help would be great Many Thanks Dan _ News, entertainment and everything you care about at Live.com. Get it now! http://www.live.com/getstarted.aspx
system response message backlash from spam messages
Hello, I've got SA with a few features installed and it's working great and has been for a while. However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? Thanks Scott
Re: Updating SpamAssassin
On Mon, 9 Feb 2009, Daniel Berry wrote: The machine that I am setting up spam assassin on does not have internet access. Not to be snarky, but if it doesn't have internet access how is email getting to it? -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 --- Gun Control laws cannot reduce violent crime, because gun control laws assume a violent criminal will obey the law. --- 2 days until Abraham Lincoln's and Charles Darwin's 200th Birthdays
Re: system response message backlash from spam messages
Hello, I've got SA with a few features installed and it's working great and has been for a while. Enable the vbounce detector. See 20_vbounce.cf -- Michael Scheidell, CTO |SECNAP Network Security Finalist 2009 Network Products Guide Hot Companies FreeBSD SpamAssassin Ports maintainer _ This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/ _
Re: system response message backlash from spam messages
On Tue, 2009-02-10 at 11:14 -0600, Johnson, S wrote: However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? The VBounce rules can identify the lions share of these. Disabled by default, unless properly configured. http://spamassassin.apache.org/full/3.2.x/doc/Mail_SpamAssassin_Plugin_VBounce.html Also, please be sure to read the comments in 20_vbounce.cf, the rules file itself, how these bounces are intended to be handled -- moved to a dedicated folder. It is generally not a good idea to simply raise the scores. Good luck! -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
Re: system response message backlash from spam messages
On Tue, 10 Feb 2009, Johnson, S wrote: However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? Assuming the forged sender address is in your domain, you should look into publishing an SPF record for your domain and/or implementing DKIM signing of your outbound mail. Unfortunately this will only *reduce* the backscatter, not eliminate it totally. Not everyone checks inbound mail using these antiforgery mechanisms. -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 --- Gun Control laws cannot reduce violent crime, because gun control laws assume a violent criminal will obey the law. --- 2 days until Abraham Lincoln's and Charles Darwin's 200th Birthdays
RE: system response message backlash from spam messages
This isn't coming from within our network... Someone on the outside is using these email addresses to send their spam. We just get the responses when they try to send to a person that doesn't exist. -Original Message- From: John Hardin [mailto:jhar...@impsec.org] Sent: Tuesday, February 10, 2009 11:44 AM To: Johnson, S Cc: users@spamassassin.apache.org Subject: Re: system response message backlash from spam messages On Tue, 10 Feb 2009, Johnson, S wrote: However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? Assuming the forged sender address is in your domain, you should look into publishing an SPF record for your domain and/or implementing DKIM signing of your outbound mail. Unfortunately this will only *reduce* the backscatter, not eliminate it totally. Not everyone checks inbound mail using these antiforgery mechanisms. -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 --- Gun Control laws cannot reduce violent crime, because gun control laws assume a violent criminal will obey the law. --- 2 days until Abraham Lincoln's and Charles Darwin's 200th Birthdays -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
RE: system response message backlash from spam messages
On Tue, 10 Feb 2009, Johnson, S wrote: This isn't coming from within our network... Someone on the outside is using these email addresses to send their spam. We just get the responses when they try to send to a person that doesn't exist. That's what I understood you to be saying. -Original Message- From: John Hardin [mailto:jhar...@impsec.org] On Tue, 10 Feb 2009, Johnson, S wrote: However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? Assuming the forged sender address is in your domain, you should look into publishing an SPF record for your domain and/or implementing DKIM signing of your outbound mail. Unfortunately this will only *reduce* the backscatter, not eliminate it totally. Not everyone checks inbound mail using these antiforgery mechanisms. -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 --- Gun Control laws cannot reduce violent crime, because gun control laws assume a violent criminal will obey the law. --- 2 days until Abraham Lincoln's and Charles Darwin's 200th Birthdays -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. -- John Hardin KA7OHZhttp://www.impsec.org/~jhardin/ jhar...@impsec.orgFALaholic #11174 pgpk -a jhar...@impsec.org key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79 --- The United States has become a place where entertainers and professional athletes are mistaken for people of importance. -- Maureen Johnson Smith Long --- 2 days until Abraham Lincoln's and Charles Darwin's 200th Birthdays
Re: system response message backlash from spam messages
John Hardin wrote: On Tue, 10 Feb 2009, Johnson, S wrote: However, over the past few weeks I've had a few select users complain about receiving 3-4 thousand bounce messages per day from what appears to be mail delivery error messages. From what I can tell it's the spammer spoofing the sender with their user ID and the messages they receive are the servers responding with an unknown user or the like. Does anyone know a work around for this? Assuming the forged sender address is in your domain, you should look into publishing an SPF record for your domain and/or implementing DKIM signing of your outbound mail. Unfortunately this will only *reduce* the backscatter, not eliminate it totally. Not everyone checks inbound mail using these antiforgery mechanisms. Backscatter is a problem caused by misconfigured mail servers who bounce back the email to the (forged) sender address after initially accepting the mail at the smtp level. If the admins responsible for these servers can't configure that relatively simple aspect correctly what hope do you place that they may have successfully managed to configure SPF or DKIM? You have no way of knowing how effective SPF may (or may not) be against backscatter. Besides, I'm not aware of many places that will arbitrarily bounce mail based on SPF failure. JMHO :)
Re: pflogsum and Bayes
Karsten Bräckelmann wrote on Tue, 10 Feb 2009 17:37:54 +0100: pflogsum postfix log summary Kai -- Kai Schätzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com
Re: Updating SpamAssassin
Please DO subscribe to a mailing list before posting, to avoid unnecessary moderation work and delays. http://wiki.apache.org/spamassassin/MailingLists On Mon, 2009-02-09 at 18:57 +, Daniel Berry wrote: I have been looking at installing spam assassin on a small network I have setup at home. The machine that I am setting up spam assassin on does not have internet access. So the question is how can I setup spam Your worst issue by far with a SA machine not having Internet access will be rather poor performance -- you can't run the most helpful network checks. assassin or more precisely how do I setup sa-update to link to a file I have downloaded via another machine ? If I can download the latest update from your updates.spamassassin.org via another machine store it on a locally shared folder and then point SA to that directory that would be ideal. Is this possible ?? Sure. Run sa-update, and share the updates folder... See http://wiki.apache.org/spamassassin/RuleUpdates The stock rules are updated very infrequently. You could even manually ssh them over, no problem. Third-party channels if you want to use them can be much more hassle. The plan is to automate this at some stage but I was looking on your wiki and I wasnt sure if what I am aiming for is possible or will be possible in upcoming releases ? I don't see a problem to do this. Really wonder why that machine dos not have Internet access, though. Not to be snarky either, but I'd be interested in the answer to John's question, too. ;) -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
unable to find user?
We're running Spamassasin on three machines, two Fedora 8 and one the latest CENTOS. We're trying to move all of the SA installations to CENTOS. These are MX servers that front an Exchange server. The systems are all set up using the same .cf and init.d files, but we're seeing a difference. We run a single user system -- all mail should be processed by one set of rules and bayes is handled as the user 'root' through MySQL. On CENTOS, we see this in maillog: spamd: handle_user unable to find user 'abc' for each incoming message. We do not see that message under Fedora. Aside from just ignoring it, what should be we be looking at? #ps -ef |grep spam sa-milt 8512 1 0 12:14 ?00:00:02 /usr/sbin/spamass-milter -p /var/run/spamass-milter/spamass.sock -f -u sa-milt -i 127.0.0.1,10.0.0.0/8 -r 10 -- -d localhost -p 783 root 11501 1 0 13:28 ?00:00:03 /usr/bin/spamd -d -u spamass --max-children=20 --min-children=6 --max-spare=8 -r /var/run/spamassassin/spamd.pid
Re: Updating SpamAssassin
On 2/10/09 at 8:38 PM +0100 Karsten Bräckelmann wrote: I don't see a problem to do this. Really wonder why that machine dos not have Internet access, though. Not to be snarky either, but I'd be interested in the answer to John's question, too. ;) I can't speak for Daniel but I have an offline machine setup for running mass-check. Nedry
Re: Updating SpamAssassin
[...] So the question is how can I setup spam assassin or more precisely how do I setup sa-update to link to a file I have downloaded via another machine ? [...] Ah, after re-reading this -- I guess there's your issue right there. :) sa-update doesn't need to be linked to the updated files, it isn't involved run-time at all. sa-update is a handy tool to download updated rule-sets (if any) and place it in a dir SA expects the updates. As long as the updates will end up in that dir, it doesn't matter how they got there. See the wiki docs for more information concerning dirs. Sure. Run sa-update, and share the updates folder... See http://wiki.apache.org/spamassassin/RuleUpdates -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
Re: Updating SpamAssassin
On Tue, 2009-02-10 at 15:04 -0600, Larry Nedry wrote: On 2/10/09 at 8:38 PM +0100 Karsten Bräckelmann wrote: I don't see a problem to do this. Really wonder why that machine dos not have Internet access, though. Not to be snarky either, but I'd be interested in the answer to John's question, too. ;) I can't speak for Daniel but I have an offline machine setup for running mass-check. I prefer not to assume the unusual. ;) -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
RE: Updating SpamAssassin
Daniel, please keep the thread on-list, unless you intend to send a private message. I am not the only one who can help you. Oh, and do subscribe. http://wiki.apache.org/spamassassin/MailingLists On Tue, 2009-02-10 at 21:30 +, Daniel Berry wrote: Ahh ok, So what triggers SA to update if you dont need to use SA update tool ? Does it check on a startup to see if there any new files in that directory and then update ? Err, yes, SA will use the updated rules instead of the ones shipped at install-time when (re)started. However, SA will not update anything itself -- it uses the already updated rule-set, as usually done by sa-update. So, after updating the rules (if there actually are updates), just restart SA. Did you read the docs yet? Third time is a charm. In particular, have a loot at the Examples section. http://wiki.apache.org/spamassassin/RuleUpdates Sorry for so many questions I am new to perl and to spam assassin so this has been quite an experience getting this far ;) Many Thanks Dan [ full-quote-below snipped ] -- char *t=\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4; main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;il;i++){ i%8? c=1: (c=*++x); c128 (s+=h); if (!(h=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}
ApacheCon Europe 2009: Early Bird Deadline Extended until 13th of February
Here's some great news for everyone who's thinking of traveling to Amsterdam for this year's ApacheCon Europe. The Early Bird deadline has been extended to Friday, February 13th - and remember, there is a discount of 150 Euro on registration for anyone staying at the Mövenpick Hotel. Register at http://www.eu.apachecon.com. ApacheCon is a week of open source goodness straight from the source of The Apache Software Foundation: - More than 60 1-Hour Sessions on System Administration, Development, Data Mining and Search Technologies, Enterprise Web Services, SOA, and Cloud Technologies, Open Source Business and Community, and more - Over a dozen Training Workshops from industry experts (see below) - World-class Keynotes and vendor Expo - Lightning Talks and Birds-of-a-Feather sessions - New this year: Geeks for Geeks Track, BarCampApache, and Hackathon! ApacheCon Europe 2009 features 2-day, 1-day, and half-day Training Workshops on the following topics: Data Mining and Search Technologies --- - Lucene Boot Camp (Grant Ingersoll) - Solr Boot Camp (Erik Hatcher) The Next Generation of Web Data Storage --- - Building Standalone CouchDB Applications (J. Chris Anderson) - High Performance CouchDB (J. Chris Anderson) Cloud and Distributed Computing Technologies - Hadoop Tools and Tricks for Data Processing Pipelines (Christophe Bisciglia and Aaron Kimball) System Administration - - Apache HTTP Server - Nuts to Bolts (Jim Jagielski) - Everything Tomcat - Administering, Tuning, Troubleshooting and Developing (Mark Thomas) Developing State-of-the-Art Web Applications - A Day of REST (J Aaron Farr) - Apache CXF - Developing and Deploying Open Source SOA Endpoints (Adrian Trenaman) - Ajax on Struts 2: How a Second Generation Web Application Framework Meets the Demands of RIA (Chad Michael Davis) - Behavior-Driving Your Apache Wicket Application: Making the Most of Webdriver and JDave-Wicket (Timo Rantalaiho) Building and Managing Java-based Projects - - Maven Workshop (Zeger Hendrikse) Professional Media Trainings - Media Analyst Training (Sally Khudairi) - Intermediate Media Analyst Training (Sally Khudairi) We hope to see you on the 23-27 March at the Mövenpick Hotel in Amsterdam! Visit http://www.eu.apachecon.com for further information and registration details. Interested in sponsoring the ApacheCon conferences? Please contact Delia Frees at de...@apachecon.com for further information. -- ApacheCon Europe 2009 Team planners-2009-eu at apachecon.com http://www.eu.apachecon.com
html picture spam
is anyone finding any value in scanning html picture spam of size 250kB to 500kB in size? what are you using? - rh