On Mon, 7 Aug 2017, Alex wrote:
Hi,
On Mon, Aug 7, 2017 at 6:56 PM, Jacek Osuchowski <ja...@osuchowski.net> wrote:
We use emails to allow users to reset their passwords to our website. We
send very brief emails containing the reset password. Example between >>>>:
Your password to access your account is:
S]U3bC7k
Upon successful login you may change your password by going to Modify
Account / Change Your Password.
* 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100%
* 0.2 BAYES_999 BODY: Bayes spam probability is 99.9 to 100%
You can't control their bayes training so there's nothing you can do here.
You -can- control the content of your message. I'm guessing that short
password reset message doesn't have very many tokens, and the ones that it does
have may be too close a match to things like password phish spams. (something
that we train heavily on).
Put more text in there that is related to your business/organization which will
be unique and thus unlike other spammy message.
* 2.1 HTML_IMAGE_ONLY_12 BODY: HTML: images with 800-1200 bytes of words
Are you sending these emails as an image or text?
Do you have a text component to your message as well?
More to the point do you have an image attached/embedded in your message?
If so, either drop it altogether or add a few Kbytes of text to balance it out.
--
Dave Funk University of Iowa
<dbfunk (at) engineering.uiowa.edu> College of Engineering
319/335-5751 FAX: 319/384-0549 1256 Seamans Center
Sys_admin/Postmaster/cell_admin Iowa City, IA 52242-1527
#include <std_disclaimer.h>
Better is not better, 'standard' is better. B{