On Sun, 11 Mar 2012 13:56:52 -0600
LuKreme wrote:
>
> On 09 Mar 2012, at 17:07 , RW wrote:
>
> > It's been demonstrated on Bogofilter that "train-on-everything"
> > outperforms "train-on-error" on the same corpora. They both end-up
> > with similar accuracy, but "train-on-everything" gets there
On 3/11/12 2:52 PM, João Gouveia wrote:
- Original Message -
From: "Michael Scheidell"
To: "SpamAssassin Users List"
Sent: Sunday, March 11, 2012 6:25:52 PM
Subject: someone hijacked spamassassin.org whois record?
hacked dns servers records?
Not likely.
It does look like someone scr
On 09 Mar 2012, at 17:07 , RW wrote:
> It's been demonstrated on Bogofilter that "train-on-everything" outperforms
> "train-on-error" on the same corpora. They both end-up with similar accuracy,
> but "train-on-everything" gets there very much faster.
But training is exceedingly slow. Under no
I built the following script:
#/bin/bash
VROOT="/usr/local/virtual/";
for i in `ls -d ${VROOT}*@*` ; do
echo "`date`"
echo "Processing ${i}"
J_PATH="${i}/.Junk"
H_PATH=${i}/"NotJunk"
if test -d ${J_PATH}; then
/usr/local/bin/sa-learn --spam -u vpopmail "$J_PATH/{new,cur}"
el
- Original Message -
> From: "Michael Scheidell"
> To: "SpamAssassin Users List"
> Sent: Sunday, March 11, 2012 6:25:52 PM
> Subject: someone hijacked spamassassin.org whois record?
>
> hacked dns servers records?
Not likely.
It does look like someone screwed up something.
This seams
hacked dns servers records?
Domain ID:D81255450-LROR
Domain Name:SPAMASSASSIN.ORG
Created On:17-Dec-2001 02:01:49 UTC
Last Updated On:11-Mar-2012 12:32:35 UTC
Expiration Date:17-Dec-2012 02:01:49 UTC
Sponsoring Registrar:Dotster, Inc. (R34-LROR)
Status:CLIENT DELETE PROHIBITED
Status:CLIENT TRAN
On Sun, 11 Mar 2012, dar...@chaosreigns.com wrote:
The software used to generate the sought rules, or perhaps an old version
of it, is in the spamassassin source tree. You can feed it a folder of
known non-spams, and a folder of known spams, and it'll auto-generate rules
that hit the spams but
Dave Funk wrote:
>>
>> As an admin on a site that regularly gets hit with phish attacks, I can
>> answer that. The forms are most often a web-page, which are:
>>
>> 1) forms hosted on Google-Docs or legit servey sites.[0]
>> 2) sites hidden behind URL-shorteners
would you want to submit detai