Your SlideShare is downloading. ×
0
Technical Background Overview<br />
Agenda:<br />What is Spam<br />What is content filteringcompliance<br />Protocols quick overview:<br />smtp<br />ldap<br />
What is SPAM<br />
Definition of SPAM<br />The word &quot;Spam&quot; as applied to Email means Unsolicited Bulk Email (&quot;UBE&quot;).Unsol...
Technical Definition of Spam<br />An electronic message is &quot;spam&quot; IF:(1)the recipient&apos;s personal identity a...
The Spam and the Law<br />Various jurisdictions have implemented legislation to control what they call &quot;spam&quot;. O...
The Law and the Spam<br />Spam is an issue about consent, not content. Whether the UBE message is an advert, a scam, porn,...
Dictionary<br />Scam<br />A confidence trick, confidence game, or con for short (also known as a scam) is an attempt to in...
What is Content Filtering<br />
Definition<br />On the Internet, content filtering (also known as information filtering) is the use of a program to screen...
Anti Spam Vs Content Filtering<br />Content filteringcontent compliance tools are used to <br />filter unwanted contents (...
Protocols overview:smtp - ldap<br />
SMTP<br />Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail sys...
SMTP: things to remember<br />Require TCP-IP to run <br />As well as MX records on DNS <br />Work usually on port 25<br ...
SMTP facts<br />SMTP is a relatively simple, text-based protocol, where one or more recipients of a message are specified ...
Related RFCs<br />RFC 1870 SMTP Service Extension for Message Size Declaration (Obsoletes: RFC 1653) <br />RFC 2476 Messag...
Sample SMTP communications<br />After establishing a connection between the sender (the client) and the receiver (the serv...
Telnet Session HELO<br />S: 220 www.example.com ESMTP Postfix<br />C: HELO mydomain.com<br />S: 250 Hello mydomain.com<br ...
Pay Attention on HELO vs EHLO<br />Although optional and not shown above, nearly all clients ask the server which SMTP ext...
Telnet Session EHLO<br />S: 220-serverdomain.com ESMTP {postfix version and date}<br />S: 220-NO UCE. {etc., terms of serv...
SMTP sequence diagram<br />
LDAP<br />In computer networking, the Lightweight Directory Access Protocol, or LDAP, is a networking protocol for queryin...
Origin and influences<br />LDAP was originally intended to be a lightweight alternative protocol for accessing X.500 direc...
Protocol overview<br />A client starts an LDAP session by connecting to an LDAP server, by default on TCP port 389. The cl...
Directory structure<br />The protocol accesses LDAP directories, which follow the X.500 model:<br />A directory is a tree ...
Directory Structure<br />An entry can look like this when represented in LDIF format (LDAP itself is a binary protocol):<b...
Directory Structure<br />dn is the name of the entry; it&apos;s not an attribute nor part of the entry. &quot;cn=John Doe&...
Supporting vendors (who use LDAP)<br />LDAP has gained wide support from vendors such as:<br />Apache (through Apache Dire...
LDAP implementations<br />Apache Directory Server <br />Critical Path Directory Server and Meta Directory Server <br />Fed...
RFCs<br />LDAP is defined by a series of Request for Comments documents:<br />RFC 1487 - LDAPv2: The initial specification...
LDAP extensions and usages:<br />RFC 1823 - LDAP API (in C) <br />RFC 2247 - Use of DNS domains in distinguished names <br...
Things to remember: Warning!!!!!<br />LDAP is not Microsoft Active Directory<br />Microsoft AD is not LDAP<br />As many ve...
See you next session <br />
Agenda:<br />01) Intro: San Francisco at a glance and Technology Champion Program, we&apos;re here to serve and protect<br...
PPT files<br />antonio01- SMSSMTP5 Overview Final 2006.ppt)  Intro: San Francisco at a glance and Technology Champion Prog...
Upcoming SlideShare
Loading in...5
×

Technical Background Overview Ppt

2,154

Published on

old but always good presentation

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,154
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
47
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Technical Background Overview Ppt"

  1. 1. Technical Background Overview<br />
  2. 2. Agenda:<br />What is Spam<br />What is content filteringcompliance<br />Protocols quick overview:<br />smtp<br />ldap<br />
  3. 3. What is SPAM<br />
  4. 4. Definition of SPAM<br />The word &quot;Spam&quot; as applied to Email means Unsolicited Bulk Email (&quot;UBE&quot;).Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Bulk means that the message is sent as part of a larger collection of messages, all having substantively identical content.<br />A message is Spam only if it is both Unsolicited and Bulk.-Unsolicited Email is normal email(examples: first contact enquiries, job enquiries, sales enquiries)-Bulk Email is normal email(examples: subscriber newsletters, customer communications, discussion lists)<br />
  5. 5. Technical Definition of Spam<br />An electronic message is &quot;spam&quot; IF:(1)the recipient&apos;s personal identity and context are irrelevant because the message is equally applicable to many other potential recipients;AND(2)the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for it to be sent.<br />
  6. 6. The Spam and the Law<br />Various jurisdictions have implemented legislation to control what they call &quot;spam&quot;. One particular example is US S.877 (CANSPAM 2004). Each law addresses &quot;spam&quot; in different ways, and as a consequence, often has different definitions of what they cover, whether they call it &quot;spam&quot; or not. <br />
  7. 7. The Law and the Spam<br />Spam is an issue about consent, not content. Whether the UBE message is an advert, a scam, porn, a begging letter or an offer of a free lunch, the content is irrelevant - if the message was sent unsolicited and in bulk then the message is spam.Spam is not a sub-set of UBE, it is not &quot;UBE that is also a scam or that doesn&apos;t contain an unsubscribe link&quot;, all email sent unsolicited and in bulk is Spam.This distinction is important because legislators spend inordinate amounts of time attempting to regulate the content of spam messages, and in doing so come up against free speech issues, without realizing that the spam issue is solely about the delivery method. <br />
  8. 8. Dictionary<br />Scam<br />A confidence trick, confidence game, or con for short (also known as a scam) is an attempt to intentionally mislead a person or persons (known as the mark) usually with the goal of financial or other gain. The confidence trickster, con man, scam artist or con artist often works with an accomplice called the shill, who tries to encourage the mark by pretending to believe the trickster. ... <br />Phishing<br />The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site (or web page), however, is bogus and set up only to steal the user’s information. <br />
  9. 9. What is Content Filtering<br />
  10. 10. Definition<br />On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable. Content filtering is used by corporations as part of Internet firewall, computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer. Content filtering usually works by specifying character strings that, if matched, indicate undesirable content that is to be screened out. Content is typically screened for pornographic content and sometimes also for violence- or hate-oriented content. <br />Critics of content filtering programs point out that it is not difficult to unintentionally exclude desirable content.<br />
  11. 11. Anti Spam Vs Content Filtering<br />Content filteringcontent compliance tools are used to <br />filter unwanted contents (i.e. words, attachment) form a mail because of company or law requirement<br />add specific text to a mail like disclaimer to adhere law or company requirement<br />Block, modify or reroute tagged mail for recipients or group<br />…..<br />Anti Spam<br />Recognize Spam<br />Determine administrative action after the spam mail have been recognize based on administrative rules (policy)<br />…<br />
  12. 12. Protocols overview:smtp - ldap<br />
  13. 13. SMTP<br />Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one Server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.<br />
  14. 14. SMTP: things to remember<br />Require TCP-IP to run <br />As well as MX records on DNS <br />Work usually on port 25<br />It is possible to test a smtp connection usually by simply telnetting host port 25<br />It’s defined in RFC 821 - Simple Mail Transfer Protocol (SMTP), but a lot of other RFC refers to this protocol adding specifics<br />as amended by RFC 1123 (STD 3) chapter 5. The protocol used today is also known as ESMTP and defined in RFC 2821.<br />It’s sender controlled<br />It’s unrelaiable<br />Because of the last 2 points obviously: <br />smtp services does no requires clustering or other features. Since the services have to implement those features because of the protocol is connectionless and unrealable. As a mater of fact if a smtp server goes down the sender simply retry the transmission to the next mx if the recipient is unavaible after x seconds. <br />Mails could be lost since once the sender relayed the mail to any server does not performany control on the delivery.<br />
  15. 15. SMTP facts<br />SMTP is a relatively simple, text-based protocol, where one or more recipients of a message are specified (and in most cases verified to exist) and then the message text is transferred. It is quite easy to test a SMTP server using the telnet program (see below).<br />SMTP uses TCP port 25. To determine the SMTP server for a given domain name, the MX (Mail eXchange) DNS record is used.<br />SMTP started becoming widely used in the early 1980s. At the time, it was a complement to UUCP which was better suited to handle e-mail transfers between machines that were intermittently connected. SMTP, on the other hand, works best when both the sending and receiving machines are connected to the network all the time.<br />The article about sender rewriting contains technical background info about the early SMTP history and source routing before RFC 1123 (1989, obsoleted by RFC 2821 ).<br />Sendmail was one of the first (if not the first) mail transfer agents to implement SMTP. As of 2001 there are at least 50 programs that implement SMTP as a client (sender of messages) or a server (receiver of messages). Some other popular SMTP server programs include exim, Postfix, qmail, and Microsoft Exchange Server.<br />Since this protocol started out as purely ASCII text-based, it did not deal well with binary files. Standards such as MIME were developed to encode binary files for transfer through SMTP. Today, most SMTP servers support the 8BITMIME extension, permitting binary files to be transmitted almost as easily as plain text.<br />SMTP is a &quot;push&quot; protocol that does not allow one to &quot;pull&quot; messages from a remote server on demand. To do this a mail client must use POP3 or IMAP. Another SMTP server can trigger a delivery in SMTP using ETRN.<br />
  16. 16. Related RFCs<br />RFC 1870 SMTP Service Extension for Message Size Declaration (Obsoletes: RFC 1653) <br />RFC 2476 Message Submission (obsoleted by approved 2476bis) <br />RFC 2505 Anti-Spam Recommendations for SMTP MTAs (BCP 30) <br />RFC 2554 SMTP Service Extension for Authentication <br />RFC 2821 The Simple Mail Transfer Protocol (obsoletes RFC 821 aka STD 10) <br />RFC 2822 Internet Message Format (obsoletes RFC 822 aka STD 11) <br />RFC 2920 SMTP Service Extension for Command Pipelining (STD 60) <br />RFC 3030 SMTP Service Extensions for Transmission of Large and Binary MIME Messages <br />RFC 3207 SMTP Service Extension for Returning Enhanced Error Codes (obsoletes RFC 2487 ) <br />RFC 3461 SMTP Service Extension for Delivery Status Notifications (obsoletes RFC 1891 ) <br />RFC 3462 The Multipart/Report Content Type for the Reporting of Mail System Administrative Messages (obsoletes RFC 1892 ) <br />RFC 3463 Enhanced Status Codes for SMTP (obsoletes RFC 1893 ) <br />RFC 3464 An Extensible Message Format for Delivery Status Notifications (obsoletes RFC 1894 ) <br />RFC 3552 Guidelines for Writing RFC Text on Security Considerations (contains SMTP example) <br />RFC 3834 Recommendations for Automatic Responses to Electronic Mail <br />
  17. 17. Sample SMTP communications<br />After establishing a connection between the sender (the client) and the receiver (the server), the following is a legal SMTP session. In the following conversation, everything sent by the client is prefaced with C: and everything sent by the server is prefaced with S:. On most computer systems, a connection can be established using the telnet command on the client machine, for example<br />telnet www.example.com 25 <br />which opens an SMTP connection from the sending machine to the host www.example.com.<br />
  18. 18. Telnet Session HELO<br />S: 220 www.example.com ESMTP Postfix<br />C: HELO mydomain.com<br />S: 250 Hello mydomain.com<br />C: MAIL FROM:&lt;sender@mydomain.com&gt;<br />S: 250 Ok<br />C: RCPT TO:&lt;friend@example.com&gt;<br />S: 250 Ok<br />C: DATA<br />S: 354 End data with &lt;CR&gt;&lt;LF&gt;.&lt;CR&gt;&lt;LF&gt;<br />C: Subject: test message<br />C: From: sender@mydomain.com<br />C: To: friend@example.com<br />C:<br />C: Hello,<br />C: This is a test.<br />C: Goodbye.<br />C: .<br />S: 250 Ok: queued as 12345<br />C: QUIT<br />S: 221 Bye<br />
  19. 19. Pay Attention on HELO vs EHLO<br />Although optional and not shown above, nearly all clients ask the server which SMTP extensions the server supports, by using the EHLO greeting to invoke Extended SMTP (ESMTP). These clients use HELO only if the server does not respond to EHLO.<br />Contemporary clients will use the ESMTP extension keyword SIZE to inquire of the server the maximum message size that will be accepted. Older clients and servers will try to transfer huge messages that will be rejected after wasting the network resources, including a lot of connect time to dialup ISPs that are paid by the minute.<br />For the edit planning of giant files or sending with older clients, users can manually determine in advance the maximum size accepted by ESMTP servers. The user telnets as above, but substitutes &quot;EHLO mydomain.com&quot; for the HELO command line.<br />
  20. 20. Telnet Session EHLO<br />S: 220-serverdomain.com ESMTP {postfix version and date}<br />S: 220-NO UCE. {etc., terms of service}<br />C: EHLO mydomain.com<br />S: 250-serverdomain.com Hello mydomain.com [127.0.0.1]<br />S: 250-SIZE 14680064<br />S: 250-PIPELINING<br />S: 250 HELP<br />This serverdomain.com declares that it will accept a fixed maximum message size no larger than 14,680,064 octets (8-bit bytes). Depending on the server&apos;s actual resource usage, it may be currently unable to accept a message this large.<br />In the simplest case, an ESMTP server will declare a maximum SIZE with only the EHLO user interaction. If no number appears after the SIZE keyword, or if the current message limit must exactly determined, the user can further interact by simulating the ESMTP header of a message with an estimated size.<br />
  21. 21. SMTP sequence diagram<br />
  22. 22. LDAP<br />In computer networking, the Lightweight Directory Access Protocol, or LDAP, is a networking protocol for querying and modifying directory services running over TCP/IP. An LDAP directory usually follows the X.500 model: It is a tree of entries, each of which consists of a set of named attributes with values. While some services use a more complicated &quot;forest&quot; model, the vast majority use a simple starting point for their database organization.<br />An LDAP directory often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain Name System (DNS) names for structuring the most simple levels of the hierarchy. Further into the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else which represents a given tree entry, or multiple entries.<br />Its current version is LDAPv3, as defined in RFC 3377.<br />
  23. 23. Origin and influences<br />LDAP was originally intended to be a lightweight alternative protocol for accessing X.500 directory services. X.500 directory services were traditionally accessed via the X.500 Directory Access Protocol, or DAP, which required the cumbersome Open Systems Interconnection (OSI) protocol stack. With LDAP, a client could access these directory services through a LDAP-to-DAP gateway. The gateway would translate LDAP requests to DAP requests and DAP responses to LDAP. This model of directory access was borrowed from DIXIE and the Directory Assistance Service.<br />Standalone LDAP directory servers soon followed, as did directory servers supporting both DAP and LDAP. The former has become popular in enterprises as they removed any need to deploy an OSI network. Today, X.500 directory protocols including DAP can be also used directly over TCP/IP.<br />The protocol was originally created by Tim Howes of the University of Michigan, Steve Kille of ISODE and Wengyik Yeong of Performance Systems International, circa 1993. Further development has been done via the Internet Engineering Task Force (IETF). It is noted that in the early engineering stages of LDAP, it was known as Lightweight Directory Browsing Protocol or LDBP. It was renamed as the scope of the protocol was expanded to not only include directory browsing functions (e.g., search) but also directory update functions (e.g., modify).<br />LDAP has influenced subsequent Internet protocols, including later versions of X.500, XML Enabled Directory (XED), Directory Services Markup Language (DSML), Service Provisioning Markup Language (SPML), and the Service Location Protocol (SLP).<br />
  24. 24. Protocol overview<br />A client starts an LDAP session by connecting to an LDAP server, by default on TCP port 389. The client then sends operation requests to the server, and the server sends responses in return. With some exceptions the client need not wait for a response before sending the next request, and the server may then send the responses in any order.<br />The basic operations are, in order:<br />Bind - authenticate, and specify LDAP protocol version, <br />Start TLS - protect the connection with Transport Layer Security (TLS), to have a more secure connection, <br />Search - search for and/or retrieve directory entries, <br />Compare - test if a named entry contains a given attribute value, <br />Add a new entry, <br />Delete an entry, <br />Modify an entry, <br />Modify DN - move or rename an entry, <br />Abandon - abort a previous request, <br />Extended Operation - generic operation used to define other operations, <br />Unbind - close the connection, not the inverse of Bind. <br />In addition the server may send &quot;Unsolicited Notifications&quot; that are not responses to any request, e.g. before it times out a connection.<br />LDAP is defined in terms of ASN.1, and protocol messages are encoded in the binary format BER. It uses textual representations for a number of ASN.1 fields/types, however.<br />
  25. 25. Directory structure<br />The protocol accesses LDAP directories, which follow the X.500 model:<br />A directory is a tree of directory entries.<br />An entry consists of a set of attributes.<br />An attribute has a name (an attribute type or attribute description) and one or more values.<br />The attributes are defined in a schema (see below).<br />Each entry has an unique identifier: its Distinguished Name (DN). This consists of its Relative Distinguished Name (RDN) constructed from some attribute(s) in the entry, followed by the parent entry&apos;s DN. Think of the DN as a full filename and the RDN as a relative filename in a folder.<br />Be aware that a DN may change over the lifetime of the entry, for instance, when entries are moved within a tree. To reliably and unambiguously identify entries, an UUID is provided in the set of the entry&apos;s operational attributes.<br />
  26. 26. Directory Structure<br />An entry can look like this when represented in LDIF format (LDAP itself is a binary protocol):<br /> dn: cn=John Doe,dc=example,dc=com<br /> cn: John Doe<br /> givenName: John<br /> sn: Doe<br /> telephoneNumber: +1 555 6789<br /> telephoneNumber: +1 555 1234<br /> mail: john@example.com<br /> manager: cn=Barbara Doe,dc=example,dc=com<br /> objectClass: inetOrgPerson<br /> objectClass: organizationalPerson<br /> objectClass: person<br /> objectClass: top<br />
  27. 27. Directory Structure<br />dn is the name of the entry; it&apos;s not an attribute nor part of the entry. &quot;cn=John Doe&quot; is the entry&apos;s RDN, and &quot;dc=example,dc=com&quot; is the DN of the parent entry. The other lines show the attributes in the entry. Attribute names are typically mnemonic strings, like &quot;cn&quot; for common name, &quot;dc&quot; for domain component, and &quot;mail&quot; for e-mail address.<br />A server holds a subtree starting from a specific entry, e.g. &quot;dc=example,dc=com&quot; and its children. Servers may also hold references to other servers, so an attempt to access &quot;ou=Some department,dc=example,dc=com&quot; could return a referral or continuation reference to a server which holds that part of the directory tree. The client can then contact the other server. Some servers also support chaining, which means the server contacts the other server and returns the results to the client.<br />LDAP rarely defines any ordering: The server may return the values in an attribute, the attributes in an entry, and the entries found by a search operation in any order.<br />
  28. 28. Supporting vendors (who use LDAP)<br />LDAP has gained wide support from vendors such as:<br />Apache (through Apache Directory Server) <br />Apple (through Open Directory/OpenLDAP) <br />AT&T <br />Banyan <br />Critical Path <br />eB2Bcom (through View500) <br />Fedora Directory Server <br />Hewlett-Packard <br />Identyx <br />IBM/Lotus <br />ISODE (through M-Vault server) <br />Microsoft (through Active Directory) <br />Netscape (now in Sun Microsystems and Red Hat products) <br />Novell (through eDirectory) <br />OctetString (through VDE server) <br />Oracle (through Oracle Internet Directory) <br />Radiant Logic (through RadiantOne Virtual Directory Server) <br />Red Hat Directory Server <br />Siemens AG (through DirX server) <br />SGI and <br />Sun (through the iPlanet and Sun ONE directory servers) <br />Symlabs (through Directory Extender) <br />as well as in open source/free software implementations such as OpenLDAP and Fedora Directory Server. Also the Apache HTTP Server used as a proxy (by the module mod_proxy) supports LDAP.<br />
  29. 29. LDAP implementations<br />Apache Directory Server <br />Critical Path Directory Server and Meta Directory Server <br />Fedora Directory Server <br />Red Hat Directory Server <br />OpenLDAP <br />Novell eDirectory <br />Sun Directory Server <br />IBM SecureWay Directory <br />IBM Tivoli Directory Server (formerly IBM Directory Server) <br />Windows Server 2003 Active Directory <br />Siemens DirX <br />View500 <br />
  30. 30. RFCs<br />LDAP is defined by a series of Request for Comments documents:<br />RFC 1487 - LDAPv2: The initial specification <br />RFC 2251 - LDAPv3: The specification of the LDAP on-the-wire protocol <br />RFC 2252 - LDAPv3: Attribute Syntax Definitions <br />RFC 2253 - LDAPv3: UTF-8 String Representation of Distinguished Names <br />RFC 2254 - LDAPv3: The String Representation of LDAP Search Filters <br />RFC 2255 - LDAPv3: The LDAP URL Format <br />RFC 2256 - LDAPv3: A Summary of the X.500(96) User Schema for use with LDAPv3 <br />RFC 2829 - LDAPv3: Authentication Methods for LDAP <br />RFC 2830 - LDAPv3: Extension for Transport Layer Security <br />RFC 3377 - LDAPv3: Technical Specification <br />
  31. 31. LDAP extensions and usages:<br />RFC 1823 - LDAP API (in C) <br />RFC 2247 - Use of DNS domains in distinguished names <br />RFC 2307 - Using LDAP as a Network Information Service <br />RFC 2798 - inetOrgPerson LDAP Object Class <br />RFC 2849 - The LDAP Data Interchange Format (LDIF) <br />RFC 2891 - Server Side Sorting of Search Results <br />RFC 3062 - LDAP Password Modify Extended Operation <br />RFC 3296 - Named Subordinate References in LDAP Directories <br />RFC 3383 - Internet Assigned Numbers Authority (IANA) Considerations for the Lightweight Directory Access Protocol (LDAP) <br />RFC 3866 - Language Tags and Ranges in LDAP <br />RFC 3909 - LDAP Cancel Operation <br />Chaining documentation at OpenLDAP - not yet defined in an RFC <br />
  32. 32. Things to remember: Warning!!!!!<br />LDAP is not Microsoft Active Directory<br />Microsoft AD is not LDAP<br />As many vendors do, Microsoft use an LDAP proxy to represent the AD structures in terms of LDAP objects, but AD is not LDAP at all. Most of the object that have an LDAP representation are actually different from the LDAP schema.<br />If you plan to create test environments I’ll provide you in the AD section some VBscripts samples to create users and OU in an AD structure. Please do not create them as LDAP queries since you could have unpredictable performance results if doing a test against Microsoft Active Directory<br />
  33. 33. See you next session <br />
  34. 34. Agenda:<br />01) Intro: San Francisco at a glance and Technology Champion Program, we&apos;re here to serve and protect<br />02) technical background overview: protocols (smtp,ldap),spam and content filtering<br />03) What&apos;s new: a technical jurney to the new amazing features (covering platforms, sizeing, HW, MTA, features and services)<br />04) Basic troubleshooting: logs,mySQL and Tomcat survival guidelines<br />05) SMS for SMTP vs SBAS 6.03 and SBAS 6.0.4 (new stuffs good stuffs!!!!)<br />06) Good news and bad news (what we have, what we don&apos;t have, what we would like to have)<br />07) Appliances VS Software: miths and legends<br />08) How to Sell It: competition and myths<br />09) Roadmap for dummy: what the future will bring to us, and when this could be usefoul to sell more<br />10) Query and answers: just start in advance i&apos;ll bring them to SF so i can prepare answers ;)<br />11) Optional0: probe what the hell is this,why we need and how i can become member of<br />12) Optional1: install on linux and microsoft<br />13) Optional2: configuring an MTA basic instruction on sendmail, postifx and IIS<br />14) Optional3: Syslog dig it understand it survive it<br />15) Optional4: Active directory and LDAP (covering ADAM too)<br />
  35. 35. PPT files<br />antonio01- SMSSMTP5 Overview Final 2006.ppt) Intro: San Francisco at a glance and Technology Champion Program, we&apos;re here to serve and protect<br />antonio02- SMSSMTP5 Overview Final 2006.ppt) technical background overview: protocols (smtp,ldap),spam and content filtering<br />antonio03- SMSSMTP5 Overview Final 2006.ppt) What&apos;s new: a technical jurney to the new amazing features (covering platforms, sizeing, HW, MTA, features and services)<br />antonio04- SMSSMTP5 Overview Final 2006.ppt) Basic troubleshooting: logs,mySQL and Tomcat survival guidelines<br />antonio05- SMSSMTP5 Overview Final 2006.ppt) SMS for SMTP vs SBAS 6.03 and SBAS 6.0.4 (new stuffs good stuffs!!!!)<br />antonio06- SMSSMTP5 Overview Final 2006.ppt) Good news and bad news (what we have, what we don&apos;t have, what we would like to have)<br />antonio07- SMSSMTP5 Overview Final 2006.ppt) Appliances VS Software: miths and legends<br />antonio08- SMSSMTP5 Overview Final 2006.ppt) How to Sell It: competition and myths<br />antonio09- SMSSMTP5 Overview Final 2006.ppt) Roadmap for dummy: what the future will bring to us, and when this could be usefoul to sell more<br />antonio10- SMSSMTP5 Overview Final 2006.ppt) Query and answers: just start in advance i&apos;ll bring them to SF so i can prepare answers ;)<br />antonio11- SMSSMTP5 Overview Final 2006.ppt) Optional0: probe what the hell is this,why we need and how i can become member of<br />antonio12- SMSSMTP5 Overview Final 2006.ppt) Optional1: install on linux and microsoft<br />antonio13- SMSSMTP5 Overview Final 2006.ppt) Optional2: configuring an MTA basic instruction on sendmail, postifx and IIS<br />antonio14- SMSSMTP5 Overview Final 2006.ppt) Optional3: Syslog dig it understand it survive it<br />antonio15- SMSSMTP5 Overview Final 2006.ppt) Optional4: Active directory and LDAP (covering ADAM too)<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×