Quality of antispam for Windows software

The criteria for quality measurement of antispam for Windows software are false positive rates and false negatives. The false positive rate is the percentage of legitimate e-mails wrongly identified as spam by the antispam for Windows solution in place. A false negative rate is the percentage of spam that is interpreted by the antispam for Windows as legitimate e-mails.

Lower these rates, the better the solution. An effective antispam for Windows software will be a system that guarantees a low rate of false positives and false negatives. Unfortunately, these two rates always vary inversely. It is relatively simple to develop a solution that removes almost all spam, however, legitimate emails will inevitably be interpreted as spam. Conversely, by minimizing the number of false positives, the amount of spam detected will also be reduced!

Anti spam for Windows

False positives, however, remain a critical element because they can correspond to legitimate emails that are more important and more prejudicial. It is therefore natural to focus as much as possible on reducing the false-positive rate while trying to maintain a good level of spam detection.

Since all antispam for Windows software inevitably generates false positives, it is also advisable to offer the customer an alternative in order to turn around in case of false positives. To answer this problem, several techniques exist. In the case of a solution implemented directly on the user's computer, a folder associated with spam will often be found so that the user can analyze the contents of this file a thoroughly. In the case of a solution implemented on the side of the mail server, the publisher will propose either a spam quarantine or access to webmail containing as in the first case a folder specific to spam.

The consequences for victims of spam but also for its creators!
At first glance, spam does not represent a huge danger, but it causes a considerable loss of time. Let's take the example of advertisements for products that the user does not need or for pornography sites. Indeed, the receipt of spam increases the time spent by the user to view, sort and delete his emails, at the risk of deleting valid and important emails.

On the other hand, the mailbombing clearly intends to interfere with the loss of time, adding to the risk of denial of service at the targeted mail server and the loss of data. Indeed, the majority of the providers of access or free email addresses decree a maximum size for the mailboxes. And the mailbombing completely saturates the capacity of the box of the user so the following emails are lost due to lack of storage.

When companies, they are likely to see their brand image degraded because spamming is nowadays very poorly perceived. In addition, harsher sanctions may be considered when spamming is accompanied by wrongdoing. In the case of mailbombing or when spamming greatly disrupts the proper functioning of a network device, the spammer can be subject to severe legal proceedings under certain specific territories like Singapore, Canada, and Japan which legislated their own antispam for Windows laws.

The different types of spam

Spam is unwanted, unsolicited e-mail with commercial content that creates discomfort when recipients receive it. Recent viruses have an exceptional ability to spread by exploiting the flaws of some messaging software. Thus, they register the list of contacts of the infected and then establish their messages by crossing the addresses of the transmitters and recipients. As a result, any user who is part of a contaminated contact list may, without his knowledge, send and receive spam and viruses. And in just a few days, a mailbox can be submerged with automatic messages simply by being registered in the list of contacts of a poorly protected person.

Self-propagating viruses exploit the contact lists of infected stations. These self-propagating viruses are included in a single email and are sent and received by hundreds of millions every day. They can be stopped by the anti-virus gold; it is common that this type of messages continues to propagate without the signature of the virus or that the update arrives only 2 days after the propagation, in this case, the messaging is polluted useless emails.

Scams are emails whose content is attractive, but it is actually a scam. These emails come in most cases from Nigeria. Here is the identical scenario each time: you are asked for help to secure a large sum of money in Europe or North America, often on your account. As a thank you for your cooperation, a commission of the order of 20% of the sum is returned to you and amounts to several million dollars. The trap lies in the fact that this sum absolutely does not exist!

The antispam for Windows is an appliance that runs stealthily in the background and filters spam transparently for the users. The antispam for Windows runs alongside the company’s mail server, saving the limited system resources of the latter. Comodo AntiSpam Gateway’s antispam remover algorithm uses heuristics scanning for emails. It installs a special antispam for Windows filtering system for those still suspiciously behaving file attachments.


Start Your 30-Day Free Trial Now

Comodo AntiSpam Gateway as an antispam for Windows is light on system resources. The antispam for Windows from Comodo guarantees to not consume any resources from the mail server, as it is a hosted antispam for Windows service in the cloud. As a hosted service, Comodo’s Antispam for Windows has a contractual obligation to provide a bundled level of free support with the antispam for Windows during the license period, serving as an all-in-one antispam remover for any organizations large and small.

The antispam for Windows used by your enterprise right now may not be able to cover the future requirement for anti spam. Comodo AntiSpam Gateway is the answer. Sign-up for a trial today!