On Mon, 7 Aug 2017, Alex wrote:

Hi,

On Mon, Aug 7, 2017 at 6:56 PM, Jacek Osuchowski <ja...@osuchowski.net> wrote:
We use emails to allow users to reset their passwords to our website. We
send very brief emails containing the reset password. Example between >>>>:


Your password to access your account is:

S]U3bC7k

Upon successful login you may change your password by going to Modify
Account / Change Your Password.



* 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100%
* 0.2 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%

You can't control their bayes training so there's nothing you can do here.

You -can- control the content of your message. I'm guessing that short
password reset message doesn't have very many tokens, and the ones that it does have may be too close a match to things like password phish spams. (something that we train heavily on).

Put more text in there that is related to your business/organization which will be unique and thus unlike other spammy message.



* 2.1 HTML_IMAGE_ONLY_12 BODY: HTML: images with 800-1200 bytes of words

Are you sending these emails as an image or text?

Do you have a text component to your message as well?

More to the point do you have an image attached/embedded in your message?
If so, either drop it altogether or add a few Kbytes of text to balance it out.


--
Dave Funk                                  University of Iowa
<dbfunk (at) engineering.uiowa.edu>        College of Engineering
319/335-5751   FAX: 319/384-0549           1256 Seamans Center
Sys_admin/Postmaster/cell_admin            Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{

Reply via email to