-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello Dierk,

Saturday, August 9, 2003, 11:28:41 PM, you wrote:

DH> Hello Sean!

DH> On Saturday, August 9, 2003 at 9:24:16 PM you wrote:

>> That is one point of using Bayesian, but you can use it anywhere
>> and train it for your own setup. One man's mail, another's spam :)

DH> Didn't ever doubt it, but as it makes much more sense to filter out
DH> junk mail before it is sent, and in view of the mails having to be
DH> stored, Bayesian filters are best used at server level, not at home,
DH> where much simpler filtering is more than sufficient to kill such
DH> mails.


Given that what one person views as spam is not always the same as another. Most ISPs 
will not filter 100% of spam out anyway and leave that to us to do with tools like 
Spampal and Bayesit! :)

Sean
- --
Fidonet: 2:263/950 ICQ: 679813
Website http://www.tcob1.net
THE VIEWS EXPRESSED HERE ARE NOT NECESSARILY THOSE OF MY WIFE.
What If The Hokey Pokey Is Really What It's All About?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (MingW32)

iD8DBQE/NgWkHMnSWn2nApQRAqH1AJ9McbHOebPWDz9px87RqQvs4GHl6ACfeRXD
NjBu8psPsYG2bvVA+YMrowE=
=pzlr
-----END PGP SIGNATURE-----
________________________________________________________
 Current beta is 2.0b1 | "Using TBBETA" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to