How do I…? Reduce spam Introduction The spam problem has now reached epic levels, with users continuously barraged with unwanted mail. Begin fighting the problem by learning the basics of stopping spam and getting resources at your disposal. We've gathered the articles featured in our "How do I…" resource center for you here in one download. Use them to reduce spam in your organization. The "How do I…?" resource center covers many topics. From system intrusions to disaster recovery to career advice, you'll find help with some of your most common IT woes. Table of Contents Introduction ............................................................................................................................................. 1 Table of Contents .................................................................................................................................... 1 How to stop spam and keep e-mail moving ........................................................................................... 2 Lock IT Down: Know your resources in the war against spam .......................................................... 4 Talking Shop: TechRepublic members offer battle plan for spam..................................................... 7 Related resources................................................................................................................................... 26 About TechRepublic.............................................................................................................................. 27 Page 1 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. How to stop spam and keep e-mail moving By Brian Hook Spam is not only a nuisance, but it can also be hazardous to your network. Many computer systems are increasingly vulnerable to viruses and cyberattacks, many of which arrive by unsolicited e-mail. The National Research Council estimated that U.S. businesses spent about $12.3 billion to clean up the damage from spam in 2001 and predicted even higher costs in 2002. How can IT managers stop the proliferation of spam without hindering internal communications? The Computer Science and Telecommunications Board, part of the National Research Council, blames the growing problem on firms that are not implementing available security measures. Researchers from the group urged companies to make use of available technologies, such as e-mail and Web filtering software, to reduce the risks to corporate networks. SurfControl is also tracking the growth of spam with its RiskFilter database, part of the SuperScout Email Filter software. The RiskFilter database is a constantly updated Signature Database List of junk e-mail. “Companies are seeing a huge increase in spam and junk e-mail,” said Kelly Haggerty, SurfControl's vice president for Global Product Development. "This kind of traffic can seriously pollute a network, and there are a few simple steps systems managers can take to alleviate many of the headaches,” said Haggerty. Here are Haggerty's top five antispam tips for IT managers: 1. Tell users never to respond to spam e-mail messages. Sending a reply, even if it's a request to be taken off a list, confirms a user at an address and encourages the spammer to send more mail. 2. Include guidance in your Internet use policy forbidding the use by employees of their company e-mail addresses when surfing or shopping online. 3. Subscribe to "real time black hole" list services that block delivery of e-mails from known spammers. 4. Subscribe to a Signature Database List, which prevents the delivery of known spam and other digital junk. And make sure you update the subscription list regularly to ensure the most complete protection. 5. Install content filtering tools that scan and block e-mail messages that include suspect text like "Get Rich Quick" or similar subject words and phrases, and those with multiple forwards or huge distribution lists. Scouting antispam services There are plenty of antispam services on the market. Brightmail is just one example of many. It currently serves eight of the top 11 ISPs with antispam technology. Brightmail reported that over the past month, there has been a 16 percent increase in spam attacks. To fight the increase, Brightmail has a spam attack analysis center staffed 24 hours a day by e-mail experts. When a new spam attack is launched, Brightmail picks it up through its hundreds of thousands of e-mail addresses placed at strategic domains across the Internet. The spam experts quickly analyze the spam and write filtering rules that will block it out before the attack can reach most e-mail users among its clients. MessageLabs’ SkyScan Anti-Virus service is another provider that intercepts offending e-mails at the Internet level, before the spam reaches customers’ networks. MessageLabs estimates that U.S. inboxes will receive more than 62 billion spam e-mails this year. SkyScan stops unsolicited e-mail from entering a business's network by checking all incoming mail against Page 2 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. recognized public blacklists, which detail e-mail addresses for known spam offenders. In addition, customers can create their own blacklists. John Harrington, director of marketing at MessageLabs, said it is also important for IT managers to educate end users. He said a lot of the problems could be overcome by implementing the simple tips noted earlier and by implementing a managed service. Rick Romkey, general manager and chief operation officer at Activis acknowledged that these managed services may not be able to stop all spam, however. Activis also provides IT managers with a service called e:)scan. It also traps spam before it hits the company servers. “First and foremost, don't expect that this will stop all spam. It is a best-effort to reduce the amount of noise that reaches an employee's desktop, and e:)scan can allow an administrator to set the sensitivity threshold used when scanning e-mails for spam,” said Romkey. “If a high level of sensitivity is selected, e:)scan will block and quarantine more potential spam e-mail than at lower levels.” Let users help manage spam Yori Nelken, chief technology officer and founder of Banter Inc. said that it is important for IT managers to talk with the users before implementing these types of services. Banter Server provides a system that uses languageprocessing technologies to manage incoming e-mails. “What one person may believe to be spam may be deemed by another in the same organization to be informative,” said Nelken. “Survey your users or employees and figure out exactly what they perceive as spam. From that survey, create a map of what it is exactly you're trying to block.” With Banter Server, an IT manager could decide whether to block material on a corporate level, department level, or personal level. The ability to fine-tune the process on each level is done by constantly providing feedback to the system. But even with spam blocking services and programs, IT managers still have to deal with spam that sneaks through the system undetected. Ted Brockwood, IT manager at KVO Public Relations said he deals with this problem on a daily basis. He uses a product called Trend Antivirus to scan incoming mail. “I generally archive anything that might be spam; then, I sift through the archive every day to ensure the filter hasn’t inappropriately blocked a message,” said Brockwood. “Blocking spam is very time-intensive. We're blocking anywhere from 100-400 pieces of junk mail a day while we only have 45 active mailboxes here. And even with a product as solid as Trend's, we're still finding spam gets through as the spammers find more creative ways.” Kaitling Duck Sherwood, author of Overcome Email Overload, said that the main problem with filtering technology is that it is a pass-fail system. “Unfortunately, while a given feature may mean that something is ‘usually’ spam, that doesn’t mean that it is ‘always’ spam. A better strategy is to use fuzzy logic,” said Sherwood. “Scoring is one way to do this. For example, if the message is from someone I know, add 200 points. If it's got an embedded image, subtract 100 points. If it doesn't have a ‘real name,’ subtract 50 points. Then, kill anything lower than a certain value.” Page 3 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Lock IT Down: Know your resources in the war against spam By Becky Roberts Just last week I received eight credit card offers, twelve sexually explicit ads, six ads for online pharmaceuticals, and numerous other solicitations all not so subtly designed to part me from my money. I’m being spammed on a daily basis. Since the first spam, sent in 1978 by Einar Stefferud, this particularly irritating form of advertising has grown to where, according to a May 2003 article in Information Week, unprotected e-mail users waste an average of 200 minutes processing spam for every 1,000 messages they receive—adding up to an unbelievable 3.5 hours of lost productivity per person per month. And if the loss in productivity is not a sufficiently compelling reason to apply resources to the war on spam, just consider the ramifications of the offended employee shocked by the contents of a message bringing a hostile work environment suit against the company. So if you’ve made the decision to filter incoming e-mail, your next step is to determine exactly how. A basic search on the Internet will reveal a confusing plethora of alternative options, products, methods, and services. How do you decide which is the best choice for your environment? Regardless of whether you decide to utilize a service, purchase an add-on for your e-mail server, buy a client-based product or filter at the periphery of your network, a basic understanding of spam control methodologies will facilitate your decision making process. Here’s an evaluative summary of a few of the methodologies most frequently employed. Content filtering (Example products/services: ESafe, GFI MailEssentials and SpamKiller) This method scans the subject line and/or message contents for specified individual words and phrases. Most products that offer this form of filtering supply a canned list of words that can then be customized to meet your specific needs. While this method is appealing in its simplicity, it’s too crude to be seriously considered as a total solution. If the list of words and phrases is sufficiently comprehensive to block most spam, it will also block many legitimate messages, especially if used in a multilanguage environment. Word lists require a great deal of maintenance. Many spammers succeed in thwarting content filtering by disguising certain key words and by embedding all text within file types the scanner cannot read. Content filtering is a useful method when used as one aspect of a total solution. Heuristic filtering (Example products/services: SpamAssassin, SpamKiller and ScanMail eManager) Heuristic filtering takes content filtering to the next level by scanning message subject and contents for patterns. Most products utilizing heuristic scanning apply rules to each message to determine its degree of compliance with known spam words/phrases and scores are applied accordingly. A message is then classified according to its total score. Some applications allow the strength of the heuristics applied to be selected by the user—the stronger the heuristics the more spam will be blocked—but this also increases the risk of blocking more legitimate messages. In general, heuristic filtering is more sensitive and effective than content filtering, but it cannot protect against all forms of spam. Tarpitting (Example products/services: VisNetic MailScan, Merak E-Mail Server, Alligate) Tarpitting is an entirely different approach designed to thwart spammers. Instead of inspecting the contents of a message, tarpitting looks at such factors as the number of recipients or the number of unsuccessful delivery attempts. If a message has more than a specified number of recipients, for example, a delay is inserted between the delivery times of the message to each recipient. This delay has the effect of “tarpitting” the spammer, causing them to assume that the connection has stalled and cease sending. This use of tarpitting is particularly effective against spammers attempting to use your e-mail server as an open relay. Another example of tarpitting counts unsuccessful attempts to Page 4 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. deliver a message. When this count exceeds a specified amount, the sender’s IP is blocked for the remainder of the session. Blocking (Example products/services: ESafe, SpamCop, MailProtector) Similar to content filtering, spam blocking simply prevents messages from being delivered to the intended recipient if it was sent from a specified e-mail address, domain, server, IP address, or range of addresses. Some products offering this feature have a predefined list of known spammers that can be updated by download. This is another simple solution that requires almost daily maintenance because regardless of how many senders are added to the blocked list, new spammers are constantly spawned and old ones learn to disguise their identity. As with content filtering, blocking is useful only as an adjunct to other forms of spamicide. Real-time black hole (Example products/services: WebShield, AppRiver, IronMail) Real-time black hole improves on simple blocking by comparing the sender’s domain against a real-time list of known spammers. Products using this methodology frequently scan and block mail at the gateway thereby preventing spam from ever reaching the e-mail server. When considering using a product or service that employs a real time black hole, it’s important to determine what type of list or lists is used. In most cases, the lists are either comprised of domains or open relays. Whereas using real-time lists of domains is a very effective method of blocking spam without incurring a high risk of accidentally blocking legitimate e-mail, using lists of open relays is more problematic. An open relay is a mail server that is capable of processing messages where neither the sender nor the recipient is a local user. Open relays are frequently used by spammers to distribute their messages. Not every e-mail administrator is necessarily aware that their server is an open relay; hence blocking open relays could result in a high number of false positives. As general awareness and understanding of spam grows, this could become a more viable method of reducing spam. RFC compliance (Example products/services: Alligate, ActiveServers, SpamCop) RFCs or Request for Comments is a set of standards for communication across the Internet. No one is forced to comply with RFCs, but it’s generally regarded as bad practice not to do so. Some spam services/products offer the ability to block e-mail originating from a domain or IP address that is not RFC compliant. As with open relay real-time blackholes, implementing an antispam methodology based on RFC compliance is at high risk for blocking a considerable number of legitimate messages. Again, as awareness of RFC compliance grows, this method will increase in usability. This list of available methodologies is by no means exhaustive. As the volume of spam grows, so too do the options for its prevention. Whether you decide to employ a service, purchase a software package, implement a free solution or select an e-mail system with built-in antispam options, it’s vitally important that you fully understand all the implications of the methodologies employed. At the very least you should seek answers for the following questions for each solution you consider: How high is the risk of blocking legitimate mail in this environment? Can blocked mail be retrieved, and if so, for how long? Is there an option for informing senders/recipients that a message has been blocked? How many hours of maintenance are required? How many different methods does the package employ? Is it possible to customize the strength of each method, e.g., strong or weak heuristics? Page 5 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. What reporting tools are provided? In the days when the occasional spam message interrupted our day we could afford to treat it as a mild irritation, fixed in a couple of seconds with a click on the delete button. Those days are long gone; it is now an insult to our sensibilities and a threat to our productivity; its management demands handling with commensurate importance and attention. Regardless of the size of your spam prevention budget, there are certain steps you can take—at the very least—to reduce the volume of spam without spending a single penny: Never follow the instructions for removing your address or unsubscribing from a spammer’s mailing list. In most cases this will not have the desired result; instead it is merely confirming the validity of your e-mail address. Forward all spam to spamrecycle@chooseyourmail.com—this site offers a free service informing the Federal Trade Commission and Web filter developers of spammer’s addresses. Never enter a company e-mail address in any Web site. Ensure that your mail servers are not open relays; if you do not know how, http://www.mailabuse.com/an_sec3rdparty.html contains instructions for over sixty e-mail systems. Utilize any spam prevention tools you may already possess, such as the junk mail filter provided with Microsoft Outlook. Do not automatically assign Internet addresses to all users. Even if all employees require internal e-mail, they do not necessarily need the ability to send/receive Internet mail. Require users to have written approval from their manager before than can receive an Internet address. Delete unused addresses from your domain as soon as possible and do not reuse them. Some useful links: www.ordb.org: Open relay database allowing testing and look-up of open relays, plus a very useful FAQ section for learning how to both detect and close open relays http://www.mail-abuse.com/: A resource for general information and education pertaining to spam prevention http://www.arachnoid.com/lutusp/antispam.html: Educational material for learning how to stop spam http://songseek.com/spamorg/: Information about reducing spam http://spam.abuse.net: Comprehensive resource for information on fighting spam www.spamcon.org: Antispam resources for ISPs http://www.spamlaws.com/: Listing of laws by country, state and date http://www.spamrecycle.com/: Submitting your spam to this site will get it forwarded to the Federal Trade Commission and to the spam filter developers www.spam.com: Just in case you were looking for the edible variety, here is the official Spam Page 6 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Talking Shop: TechRepublic members offer battle plan for spam By Dana Norton IT managers struggle every day in the fight against spam in the enterprise. Forget about telling users to return spammers' e-mails with the subject “Remove” in the headers. This action will only tell the spammer that your e-mail address is legitimate and will probably only send more junk mail your way. This and other reasons make it difficult to fight spam head-on, so IT managers must develop other ways to battle it. In a recent article, TechRepublic writer Brian Hook outlined several ways IT managers can control spam. This article highlights some entries in the discussion, which followed Hook's article, on how to fight spam. A hard-line approach for users One way to fight spam is to develop an e-mail policy and educate your organization’s users. If users disregard company policy on spam, S.Chandler believes that a hard-line approach is called for. "...There are two truths about spam," Chandler said. "You cannot stop it and you cannot successfully educate users on how to fight it. But you can make users pay for opening attachments containing viruses. “You can make users, who disobey company policy regarding the opening of e-mail from unknown sources, pay for part of the damage,” he said. Here’s how he proposes to do it: Develop a zero tolerance policy toward opening attachments. Make sure every employee knows about and understands the policy. If your organization uses Microsoft Outlook, make sure the Inbox preview window is turned off so users will have less of a chance to open attachments. Ensure that employees understand they will be fined for any e-mail or network damage incurred from or through their accounts or workstations. “If you can't beat it, you can, at least, mitigate the damage,” he said. Good luck, said TechRepublic member Jill about Chandler’s process. “Considering most viruses deliver their payload at a later time than when they're installed, your policy would only work if every person in your company had a dedicated machine that they didn't share with others and that nobody else could have logged in to,” she said. She is also concerned about imposing such a tough policy on users. This could be a detriment to employee morale, she said. “(It’s) better to hire someone to specifically take care of making sure that the systems are clean and stay clean…it may be expensive to hire another person, but I think if you implement a policy like that one, you'll pay more in terms of lost production from your existing people,” she said. Use targeted education campaigns In response to S. Chandler’s views, Bill Schirf, a senior systems engineer, said that the zero tolerance approach might be the right idea but may not work. “But even computer-savvy users have a hard time managing spam (and) viruses. Even with the Outlook preview screen turned off, if you delete one message, Outlook, by default, will automatically open the next message,” he said. Schirf offered an approach that’s easy on users and will reduce spam: Keep spam from reaching your users by stopping spam at the point-of-presence (POP) with server filters. Page 7 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Continually educate users about spam and its dangers. Offer suggested remedies that users can understand. Educating users about spam is the number one strategy Ilana Trager uses in her organization. An information systems manager in Washington state, Trager said that organizations should coach users to manage spam themselves because spammers can find their way around filters. She also said that with filters in place, she spends a lot of her time sorting blocked messages for legitimate e-mails. “The only way I’ve found that seems to work efficiently is to educate the end user,” she said. She offered a list of don’ts users should heed: Never reply to spam. Don’t get suckered by the “Remove” procedures. If you’re using Outlook, turn off the Out Of Office Auto Reply. Use the junk filters provided by your e-mail client. Instruct users on how to forward a spam to the IT team or to the ISP from which the spam originated. “So far, it's working pretty well. The [users] who have gotten a lot of spam in the past have it under control, and the rest of us don't seem to be getting much spam at all,” she said. Look into the law TechRepublic member Phil Hall suggests that IT managers look into state laws that are on the books designed to combat spam. "Many states, like Iowa, have antispam laws on the books now (in Iowa's case, it's Iowa code 714E) that allow recipients to charge the sender $500 per incident; failure to comply allows the recipient to pass it to the State Attorney General," said Hall, an IT technician for the VGM Group. "Personally, the 'real-time black hole' list is a joke. We tried that at work and it failed. Also, there simply are too many companies with their mail gateways misconfigured (like being able to have EACH e-mail server reverse lookup), which is an RFC standard, but most companies apparently don't know crap." Hall said the easiest way to deal with spam would be to strengthen antispam legislation. "We need (in the USA) to have 47 USC 227 altered to specifically cover unsolicited e-mail. Then there would be federal legislation. (As it stands, 47 USC 227 is unclear and as a result can't be used.)" Antispam software solutions Check out this list from CNET of software packages designed to fight spam. Page 8 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Get IT Done: Fight spam with e-mail filters By Kevin Savetz Spam and e-mail viruses are more than nuisances. They tie up your employees' time and take a bite out of your IT budget by hogging bandwidth on your LAN and Internet connection. You can fight back against junk e-mail and virus threats with a well-designed and strategically placed e-mail filter. But a poorly implemented filter can remove important messages, which could cost you more than a barrage of useless e-mail. An e-mail filter is software that scans messages for undesirable content, from annoying "make money fast" messages to hostile viruses. A filter can be installed on your company's LAN or work as an outsourced service. Filters range from simple to sophisticated; a basic filter scans for spam and viruses, while a more sophisticated filter can search for other criteria, such as pornography or confidential business information. Spam filters are good things, but system administrators must implement them with care. If filters are too stringent, they can stop legitimate e-mail in its tracks; too lax, and spam and viruses will sneak through. Check out a related white paper There are financial benefits of stopping spam – increased productivity and reduced costs – and cost considerations for implementing a filtering solution. Learn how to evaluate the ROI of a spam-filtering solution with the help of this white paper from Sophos. Local LAN filtering Filters generally work using heuristics—a problem-solving method that uses rules of thumb rather than a strict formula. The process compares messages to lexicons of spam words and checks for attachments that fit the profiles of viruses. Some advanced tools keep track of whom you regularly communicate with, as well as correspondence from unfamiliar sources, and employ more stringent filters against strangers' e-mail. The simplest filters scan only message headers, while more advanced filters scan the message body as well. Other filters use "black hole" lists of known spammers that are published online and updated as spammers change their tactics and points of attack. The most popular is the MAPS Realtime Blackhole List. Large- and medium-size enterprises will want to consider running filtering software within their LANs. This software can run on the mail host or on a standalone filtering server. Your mail server may have some built-in filtering capabilities. For instance, Sendmail can disable mail relaying and includes an access database that allows administrators to reject mail from certain domains. Sendmail can also be set to refer to the MAPS Realtime Blackhole List. Microsoft Exchange Server can be set to reject relayed mail as well. These built-in filtering options are a good first line of defense against spam but often are not powerful enough to block serious spam attempts or e-mail viruses. Compared to an outsourced filtering service, local filtering has a key advantage: Filtering software can screen intraoffice e-mail. If an e-mail virus gets into the network, filtering intranet mail will keep the virus from flooding the local network. These are some popular filtering software products: Mirapoint's Message Director is an industrial-strength solution for local filtering. The rack-mount hardware device connects between your router and mail servers. In addition to spam and virus filtering, the unit can perform outbound message content filtering, which can be used to ensure that sensitive material is not sent out without proper authorization. This works with any e-mail server and supports POP3, IMAP, and other common messaging protocols. Prices for the Message Director start at $26,000. Junkfilter is free software that works with procmail (a popular mail processing utility) to extract spam. It works at both Page 9 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. the individual user level and the system level, but the creator discourages its use systemwide for networks with heavy e-mail loads. Procmail works under standard mail servers running on UNIX and Linux but not Windows NT/2000. Options for Windows NT/2000 environments include CommandView and Tumbleweed Messaging Management System. Outsourced services It takes IT resources to configure, maintain, and update filters on an internal mail server. If yours is a smaller business or your IT staff is already tapped, an outsourced filtering service may be a better solution. You won't have to update filters when new viruses are released or spammers try new tactics. What CNET Enterprise readers are doing to combat spam John Stockman: "We have created a spam mailbox for users to forward these messages to. Once a day, we review these submissions and add entries to our blocking and content filters. We are now blocking nearly 10 percent of all incoming messages through this automatic filtering system." Jason Rabel, Webmaster, Extreme Overclocking: "[You] can edit the [Sendmail] Access.conf file to reject domains, e-mail addresses, IPs, and so on. So as spam comes in, I check the entire header to see if I can find a legitimate origin. If so, I send an e-mail and Cc: the letter to an admin of the domain...then I add that e-mail/IP/domain to my reject list. I've already killed off many junk domains that have open relays, and I'm contemplating killing off [other entire domains]." Dave Therault, Field IT Manager: "The best thing I've found for spam is Brightmail.com. (I use Spaminator, the EarthLink private label of it.) There are always 100 to 200 spammies sitting in my Spaminator account, and I only receive about one to three spams a day...I have two of my e-mail addresses forwarded to a Motorola two-way pager, where I pay for service by the character. So far, I have kept those addresses from getting spammed. When enough people paying a nickel for every hundred characters start getting spammed, we'll see some laws with teeth in them." On the downside, sending e-mail to an external filtering service adds a layer that can slow down delivery. Managers may worry that routing outbound e-mail through another company's server could compromise confidentiality, but unencrypted e-mail is always prone to being sniffed. Filtering does not significantly increase the possibility of outbound or inbound messages being intercepted. Outsourced filtering options include MessageLabs' SkyScan and Postini's Junk Email Assistant. The cost of these services varies considerably, depending on the features you want (spam filtering, virus filtering, or both) and the number of e-mailboxes to be scanned. Postini, for instance, charges $1.50 to $2.50 per month per user for spam and virus scanning. MessageLabs quoted a starting price of $1.50 per user per month. Whichever option you choose, no filtering tool is perfect. "The moment you automate anything, there is the risk that you're going to have a little bit of collateral damage," says Satish Ramachandran, CEO of Mirapoint. "Those fishing nets that are out to catch tuna—invariably they catch some dolphins as well." With some software, legitimate commercial e-mail and mailing list messages can resemble junk mail. Also, black hole lists may temporarily block messages from legitimate business partners, so how your filtering tool handles suspected spam could make all the difference. Configuring your filter Most filtering tools offer choices for how to treat potential spam. Suspicious messages can be tagged (using a header field such as X-SPAM: yes) but delivered normally. The recipient can then use an e-mail client filter to delete the message or move it to a special folder. Suspect messages can also be moved automatically to a gray list e-mailbox, where they can be verified by staff. Or messages can be deleted. Simply throwing away messages is the worst option; if the software is wrong, it could trash vital messages. "Most people start off cautiously, letting it all through and logging hits to see if the stuff we're tagging really is spam. Once they are confident, they generally go for the full block," says Alex Shipp, chief antivirus technologist at MessageLabs. Page 10 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. A diverse array of mail filtering options exists and, with a little research, any organization can find the one that best suits its needs, budget, and mail volume. Many large organizations will benefit most by using an in-house mail filter, though outsourcing may be the answer for organizations with a taxed IT staff. Some enterprises may get the best of both worlds if their ISP is willing to filter messages on its mail server. This will provide a local filter and distribute the cost across multiple clients. No matter which method you eventually choose to fight e-mail spam and viruses, your planning and cautious implementation will ultimately pay off—for your users and for your bottom line. Page 11 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Step-By-Step: Teach end users how to keep spam out of the inbox By Kyle Harmon Let’s face it. Even though no one likes receiving spam (unsolicited commercial e-mail), deleting spam is still a part of almost any Internet user’s daily routine. Unfortunately, the problem only seems to be getting worse. What can IT trainers do about spam? Whenever you’re training beginning e-mail users, make sure you cover these fundamental rules to help your students avoid spam. Rule #1: Maintain two separate e-mail addresses You should have one e-mail address that you give out only to close friends and relatives—anyone with whom you would have personal communication. Then establish another e-mail address with a provider such as Hotmail or some other online account, and use that address every time you fill out a form on the Web that asks for an e-mail address. Of course, there’s no guarantee that your private e-mail address won’t get out. If one of your friends or relatives includes you in a long cc list, someone else in the cc list could disseminate your e-mail address. Rule #2: Don’t buy from a spam ad This rule should be a given, but it’s important to underscore this point to new Internet citizens. Spammers will only continue to spam as long as it is profitable. By teaching your students to refuse to purchase any items that are advertised in spam, then eventually it will no longer be profitable. Rule #3. Don’t even respond to it! Never, ever respond to a spam. Responding to spam, whether to a “remove” address or otherwise will only worsen the problem. Responding to spam only tells the spammer that your address is a valid e-mail address that accepts spam. Don’t expect to get removed from any lists that way. Rule #4. Turn off cookies Many of you will quarrel with this rule, because legitimate Web businesses (like TechRepublic) use cookie technology to save customers time and to serve them better. But browser cookies have a dark side. Some unscrupulous businesses use them to obtain information from you when you visit their Web site. You and your students can minimize the chances of your e-mail address being broadcast to every Web site you visit by turning your browser cookies off, or at least making your browser ask for confirmation before accepting cookies. Rule #5: Report spam to your ISP Most ISPs have strict anti-spam policies. Your students should report spammers to their ISPs. In many cases, there is a good chance that the account used by the spammer to get on the Internet will be disabled by the ISP. As a last resort, you can fight spam with filtering software. Personally, I am not a fan of filtering software. In many cases, it’s simply too strict and winds up blocking personal e-mails that you really do want to receive. However, when you’re teaching end users how to use an e-mail client, you should show them how to activate filtering and senderblocking options—just in case they need them. Support anti-spam legislation Visit the Coalition Against Unsolicited Commercial Email for information on how you can help support anti-spam legislation. Unfortunately, contrary to what many spam e-mails claim, there is no current legislation in place to control spam. Do your part and write your congressmen and congresswomen to support anti-spam legislation. Where to complain Unfortunately, figuring out how and where to complain about spam can be a difficult task. I recommend SpamCop. After jumping through a few hoops to register, SpamCop provides a simple interface for reporting spam to ISPs. SpamCop also provides a service for a few dollars a year that will let you take advantage of their extensive spam- Page 12 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. filtering software. Page 13 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Lock IT Down: Controlling spam and e-mail content with Nemx By David Williams In today’s workplace, many e-mail administrators and their companies are finding it necessary to function with e-mail content management software in place. At my organization, we recently evaluated a number of these products, and the one that came out on top was Power Tools from Nemx. Of all the products evaluated, this was the only product that did everything we needed while offering low overhead in terms of consuming system resources. In this article, I’ll show you some of the key features of Nemx Power Tools and demonstrate how easy it is to implement. Features of Nemx Power Tools Nemx Power Tools can: Scan message subjects for keywords defined by the administrator. Scan message body for keywords and sentences. Scan messages for attachments. Scan message headers for organizations or individuals that are banned from sending messages into our domain. Auto-add disclaimers to messages. You configure the Power Tools product from within the Exchange Administrator utility. This provides great ease of use and flexibility, especially in a large company that may have more than one network administrator. Signature Maker can add predetermined blocks of text (Banners) to the beginning and/or end of all messages originating from a particular user or group of users. Defaults may be set up on a server basis, with overrides available on a per recipient basis, including distribution lists. Signatures can be defined with property variables, which are then replaced with the user's specific properties (Name, phone, etc.). This is ideal for company-wide disclaimer statements or consistent "look and feel" signatures for users or departments of users. With Address Manager, you can easily add e-mail addresses to handle the unique requirements of your organization. Full wildcarding is supported, allowing an unlimited number of addressing rules to guarantee accurate delivery of otherwise-undeliverable mail. In addition, you can ensure that misdirected mail gets routed to the correct user based on the intended friendly name. Spam Blocker stops unsolicited and unwanted mail at the front door of Exchange before it can get to your users, wasting their time and stealing valuable message storage space. Using a combination of various e-mail header recognition techniques and RBL database lookup, Spam Blocker is an effective measure in reducing the battle against junk mail. Using the Content Filtering module, you can easily define rules to monitor the contents of outgoing and/or incoming messages for violations in corporate policy, offensive language, or security implications. Once triggered, the message can be deleted, quarantined, forwarded to another user for review, appropriately categorized, or a number of other possible actions. Content Filtering can also prevent specific files from entering or leaving your Exchange organization. Working with Banners Banners are set up on the page shown in Figure A. Basically, a Banner is an auto-appended block of text that can be defined by an administrator. The Banner can be associated with an Exchange container (meaning all users within that Page 14 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. container get that particular Banner) or associated with the individual mailbox. The administrator sets up the Banner, and the end user has no configuration capabilities over the Banner. Figure A To build a Banner, we first give it a name and a description, as shown in Figure B. It is a good idea to make this information as descriptive as possible so that you know what the banner contains. You can choose to either build the banner using Plain Text or Rich text Format. Figure B Address Manager Next, we’ll take a look at the Address Manager module. It can be used to set up auto-forwarding to addresses. For instance, say you have a person in your company with an often-misspelled name such as Debbie.Zwilling. You could set up an Address Manager that forwards all messages sent to Debbie.Zwillin, Debbie.Zwiling, and Debbie.Swilling to Debbie.Zwilling. You can have multiple addressing rules for the same recipient to cover all possible versions of that person’s name. Page 15 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Figure C shows the dialog box for creating new Address Manager rules. The Addressing Rule box will contain the name that you want it to intercept. In our example above, this would be Debbie.Zwillin@yourdomain.com. Selecting the Delete Mail option will delete any mail that arrives at your domain from outside that is addressed to Debbie.Zwillin@yourdomain.com, but if you select the Forward Mail option, you can either enter the name of the person you want to receive the e-mail (Debbie.Zwilling@yourdomain.com, in our example) or you can click Browse to search through Exchange’s Global Address List (GAL) and assign it to anyone in your organization. For example, you may have a utility e-mail address that collects all of these mistaken messages. Figure C Spam Manager The main screen for the Spam Manager module takes you to the Subject Filtering area, Originator Filtering area, and Header Filtering area. Figure D shows all the Subject Filtering rules that have been set up. Figure D In the Add Subject rule dialog box, you can enter the subject you want to filter on, for example ScreenSaver, and then select the action you want activated when the filter finds an e-mail that contains this subject. The choices are Delete (the message is automatically deleted) and Quarantine (the message is held in a quarantine, and an e-mail is sent to all Exchange administrators notifying them). Once you specify the desired action, select the transfer mode(s) you want covered by this rule. The choices are Inbound, Outbound, Private (checks Private folders), and Public (checks Public folders). Also, in the Restrictions dialog box, you can specify whether you want certain members of the GAL to be excluded from this rule. Page 16 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. In Figure E, you can see the main screen for Originator Filtering. This lists all the filtering rules based on the e-mail addresses of senders who are known to spam your users. Figure E Figure F shows the dialog box for adding Originator Filtering rules. You configure these rules by entering an address such as *.AOL.Com. (This would filter for all e-mails coming from or going to AOL). Just as with the earlier rules, you select the transfer modes you want the rules to affect (Inbound, Outbound, Private, or Public) and specify whether you want to exclude certain members of the GAL. Figure F Page 17 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Content Filtering Figure G shows the screen for the Content Filtering module, which consists of the Message Text Filter and Attachment Filter. The Message Text Filter can be used to look for predetermined words and/or phrases within messages. Once found, the program can then quarantine or delete the message based on how the rule is set. Figure G In Figure H, you can see the full list of Attachment Rules that have been set up. As far as I am aware, there is no limit to the amount of rules you can have. Figure H Summing up This article has provided insight into how useful Nemx Power Tools can be for an Exchange administrator. With all Page 18 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. the tools the product has in its arsenal, I would highly recommend it to any Exchange admin. As I mentioned above, it does all of this with very little performance hit, which is extremely important when you have a high message flow through your Exchange servers. Page 19 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Lock IT Down: Preventing spam is the best approach By John McCormick Spam, Spam, eggs, sausage, and Spam. Spam was a popular item on a diner's menu in a Monty Python sketch, but it's also an excellent description of the daily contents of my e-mail inbox. Spam defined Spam definition one: A meat-like substance that tastes good but may clog your arteries. Spam definition two: A message-like substance from a complete stranger that clogs your e-mail. So why am I writing about e-mail in a security column? Because e-mail can adversely impact the operation of your network, either accidentally or intentionally; thus, it’s a security risk. There's certainly no denying that a flood of e-mail can cause a denial of service attack whether intentional or accidental. If it hasn't happened to you already, it could. It has happened to businesses I’ve worked with. Whether you are facing a major spam attack that takes your e-mail server down or an attack that affects just a full mailbox or two, your users lose messages. To outsiders, your business can appear inept. There are programs designed to help filter out this mass of unwanted e-mail, but that means extra expense for installing and maintaining the software. And there is always the possibility that some messages that should get through will be accidentally blocked. Prevention is the best medicine It's better to avoid spam in the first place. There are strategies you can implement to greatly reduce the amount of spam aimed at your server. The vast majority of spam comes from automatic scan programs, which watch newsgroups. Most Usenet chat is just that—chat. However, there are a number of newsgroups where people exchange useful computer-related information, from troubleshooting tips to discussions of new products. For some companies, newsgroups are also extremely fertile sources of information about consumer wants and complaints. Participation can also be a solid stealth-marketing strategy. So, while you might want a policy restricting newsgroup participation from work, it probably isn't a good idea to ban it entirely. A growing amount of junk e-mail is acquaintance spam, which is triggered by visits to business sites that capture your employees' addresses while they legitimately seek product information. You probably already have a policy in place telling employees they shouldn't surf the Web on company time, but such policies obviously shouldn't stop authorized, legitimate surfing for product information. As for unauthorized Web surfing, surveys have shown that company policies don't stop most workers from surfing, and it's difficult to block unauthorized Web surfing. And because some employees should be tracking newsgroup messages and perhaps even interacting with others in newsgroups to build company presence, it's important to find a simple way to battle spam. Just configure one or more free e-mail accounts at any of the many Web portals offering this service and use them where appropriate. I find that mail.usa.com is a good choice because of the variety of address options available, such as server names for each state and each major city as well as the ease of configuring the mailbox to forward messages. Forwarding messages is especially important if you expect a flood of e-mail about some special offer or other event, but you don't want to be bothered with people learning of it six months later and writing upon discovery. You can Page 20 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. forward the initial surge of messages to any mailbox you desire, even changing the mailbox hourly or daily if necessary. When the event is over, just check the messages occasionally right at mail.usa.com or close the mailbox. Once you get another address, set this as your reply address in any company browsers. Now users can surf the Web with impunity because the spam will go to the dummy mailbox that you can access if desired, or you can simply ignore it completely. This is a painless way to eliminate most of the spam you would otherwise have to manage on your own server. But, there are other aspects of e-mail that directly concern security engineers. Another reminder Users tend to forget just how unreliable e-mail can be and how insecure it is. Also, your messages usually go through, but sometimes they get lost and are often altered. These changes are usually very slight formatting ones, such as altering tabs to spaces, but this should remind you that no e-mail message containing any confidential data should be sent in plaintext. Plaintext, of course, is cryptographer-speak for unencrypted. John McCormick is a consultant and writer (five books, 14,000 plus articles and columns) who has been working with computers for more than 35 years. Page 21 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Get IT Done: Controlling spam relaying on your e-mail server By Christopher Tellez It’s 8:30 A.M. You’ve finished booting up your machine and you’re preparing for the day ahead. Your boss suddenly storms in with an infuriated look on his face. “Insert Your Name Here, we’ve got a big problem! Someone is e-mailing pornographic spam from our company. An offended customer e-mailed us with a copy of the spam and is threatening legal action unless we take care of it IMMEDIATELY! How did this happen? I want the employee responsible found and brought to my attention!” He throws down a copy of the e-mail on your desk and walks out even more upset than when he first came in. You look at the header of the e-mail and notice that the originating e-mail address is not someone at your company but an outside source. Inside the header, you also find your Exchange server listed. You realize you are the victim of mail relaying. What is mail relaying? Mail relaying is essentially when someone taps port 25 on your Exchange Server and uses it to send his or her spam. Mail relaying not only uses up the resources of your already-busy Exchange Server but also makes it nearly impossible for those who receive the spam to unsubscribe. On top of that, you appear to be the offending source of the spam because your mail server name is more prominent than the spammer’s originating e-mail address, which is hidden deep within the header. This mail relay ability is available by default on any Exchange Server installation. For some organizations, it’s a useful function and can help them streamline the performance of their mail servers. But for others, it may be unnecessary, just offering an open hole for a spammer. To determine whether you’re open to relaying, follow these steps: 1. Open the command prompt. 2. Type telnet YOUR EXCHANGE SERVER 25 Example: telnet exchange 25The Exchange Server should respond with a response similar to this: 220 exchangeservername.yourdomain.com ESMTP Server <Microsoft Exchange Internet Mail Service 5.5.2650.21> ready When you type the information below, please note that the text will not appear, so type slowly to ensure accuracy. 1. Type MAIL FROM: noone@bogusdomain.com The server should come back with250 OK 1. Type RCPT TO: mysteryperson@unrealdomain.com The server’s response should be550 Relaying is prohibited If it instead shows250 OK – Recipient <mysteryperson@unrealdomain.com> you are open to relaying. Keeping out the spam So, let’s say you’ve determined that you’re susceptible to relaying—how do you turn it off? If you’re running Exchange 5.5 with Service Pack 2, you’re in luck. There are steps to correct the problem. If you’re running an earlier version, it is time to install or upgrade to 5.5 with SP2. There is no way to close this hole in previous versions. For those of you with Exchange 5.5/SP2, there is an informative article on Microsoft’s TechNet Exchange site. The only problem is that the article doesn’t tell you what to do if you want to stop relaying but still allow POP3 e-mail users. If you follow the instructions to the letter, you’ll find that your POP3 users will no longer be able to send e-mail externally. It will bounce back to them, even if they’re authenticated. To avoid the POP3 problem, be sure to select the Hosts And Clients That Successfully Authenticate box in the Page 22 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. routing restrictions settings. After you change the settings, you’ll be required to stop and restart the Internet Mail Connector for the changes to take effect. Run the mail relay test again, and you should see the message 550 Relaying is prohibited Keep in mind that an ingenious spammer can still hack in to learn one of your account names and passwords to relay messages. In that case, you’ll have to decide, along with the powers that be, whether POP3 is really necessary. If it is, you’ll need to keep up with all the IP addresses that are allowed to access the server. Do not get on the list What can mail relaying do to you besides hijack your server? Well, it can get you blacklisted. There are organizations out there that are actively trying to stop spammers. They compile lists of spammers, as well as servers that are open to relaying. The groups offer the lists for download (often for free) by mail system administrators wanting to avoid spam. Those who have been blacklisted find themselves unable to send mail to people they were previously able to e-mail. They may also find that when sending mail to servers that use this service, they receive messages telling them that any mail from their domain is no longer accepted due to their listing on those services. Once you’re blacklisted, the only way to get your server off the list is for you to prohibit relaying and then submit to the blacklisting organizations that you no longer allow it. They will test your server and clear you once you’ve proved that relaying is no longer available. Your full clearance may take a few days so all subscriber DNS databases have time to refresh the data. You either stop the relaying or you live with not being able to e-mail some people. If you’re interested in these services, want to know more about mail relaying, or would like to know where to go to get unblocked, the following URLs may help. Note that I’m providing them for reference only. Since some of the practices of these organizations are controversial, please understand that neither I nor TechRepublic endorses or condemns them. Network Abuse Clearinghouse UC Davis Mail Relay Resources Mail Abuse Prevention System (MAPS) MAPS Relay spam Stopper MAPS Relay Stopping Techniques MailShield E-mail relaying is a real problem. It can have a wide range of effects, from a server that is brought to its knees to blacklisting to lawsuits against your company. Take it seriously and address it like you would any other issue with Exchange. Hopefully, this information, along with the information you might find on the above Web sites, will allow you to make an informed decision and implement some effective practices. Page 23 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Lock IT Down: Spam zappers you should know about By Ed Bott Want a safe conversation starter for your next dinner party? Skip religion and politics, and don't even think about asking who really invented the Internet. Instead, ask your guests what they think about unsolicited commercial e-mail, more commonly known as spam. No controversy here: Everyone hates spam, and you'll undoubtedly unleash a torrent of spam stories. You can look like a hero when you offer these surefire spam-busting solutions, which come courtesy of TechRepublic members who responded to my most recent Microsoft Challenge. The most popular spam-fighting strategy is based on common sense: Set up a throwaway e-mail account, usually through a free e-mail service like Hotmail, and use it for any untrusted correspondence. TechRepublic member rparz reports, "Hotmail does a pretty decent job of blocking spam. I've learned to accept it after all these years, so the Bulk Mail filter is a breath of fresh air." Unfortunately, that's only a partial solution for me. As a computer advice columnist, my e-mail address is fair game for both spammers and legitimate readers, and it means that the volume of spam that plops into my inbox increases every day. Based on your responses, I've decided that the best way to stop spam is to block it at the server, before it can reach users. If you're using Exchange Server, you could do what TechRepublic member TomF12 does: "We deal with spam the same way we deal with unwanted viruses...by scanning and quarantining them before they hit our Exchange servers. We use Tumbleweed Communications' Tumbleweed Messaging Management System. Its secure mail server allows us to scan all incoming mail for viruses (and unwanted content, if need be) as well as to set up rules to block specific senders or domains." TechRepublic member jsg recommends Mail Essentials from GFI: "I've been using this third-party utility to block spam from reaching our mail server for the last six months. It has reduced spam almost to zero." However, you don't have to install yet another piece of server software to stop spam. TechRepublic member steveo gladly outsourced this messy task: "I manage a mail server of about 60 users. We use MailWatch [from Mail.com] to screen and filter all of our incoming mail. Besides scanning for viruses and malicious code, it checks for keywords typical of spam and gives each one a point value. Based on the number of points, I specify whether I want the mail logged, quarantined, or deleted. I originally went with the service as a stopgap measure. After using it, I decided the minimal cost is less than I would spend trying to stay ahead of the spammers." For POP3 and other accounts where you don't control server settings, take charge by mastering the filtering features in your e-mail software. TechRepublic member mark_weinstock, for example, uses the Rules Wizard in Outlook 2000, filtering in Outlook Express, and similar solutions in two non-Microsoft e-mail clients, Poco and Eudora. "I use different addresses for different types of mail, and each goes into its own folder, where filters delete obvious spam. By using multiple accounts, I can set different strengths of filters on each account. For example, my personal account is very tightly controlled. But I'm more willing to let unknown people e-mail me in my other accounts. That way, I can address the stuff that's important to me and put off the other accounts until I have some free time." The most tempting option of all, however, is to use a third-party utility that blocks and tackles spam before it arrives at your client. I haven't tested any of the following products, but I'm interested in learning more after reading these capsule reviews: TechRepublic member Tomaste raves about two free spam-filtering services: “Brightmail acts as a proxy between you and your POP account. It maintains a large filtering service that weeds out almost all of my annoying spam, and I can receive a weekly digest of all the spam they have filtered. As a second line of defense, I use a service called Despammed. You get a free forwarding e-mail address you can use in places that are at high risk for spam, such as newsgroups." I've heard nothing but good reports about Brightmail; note, however, that it works only with standard POP accounts and is incompatible with MSN and AOL. Page 24 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. If you'd rather not redirect your mail through another server, TechRepublic member mecusar suggests Novasoft's SpamKiller 2. "It uses less resources than leaving Microsoft Outlook open and checks my mail every minute. It also automatically gets updates for the filters, and you can use a wizard to add your own." A 30-day free trial is available; to continue using the software, you pay a registration fee of $30. It doesn't work with AOL or Web-based e-mail. Page 25 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. Related TechRepublic resources: How do I…? Reduce spam Related resources More TechRepublic articles and downloads: SuperScout Email Filter Free Trial Download Get IT Done: Fight spam with e-mail filters Choose the best vendor for spam filtering software TechRepublic books and CDs: IT Professional's Guide to E-mail Administration E-mail Security Policy Quick Guide: Exchange 2003 Migration TechProGuild Articles: Repair and restore Outlook data Talking Shop: Launch MTACheck.exe to recover an MTA database in Exchange Build Your Skills: Archive Hotmail messages in Outlook Express How do I…? Writing an effective e-mail policy Managing e-mail storage and archiving Recover deleted e-mail Setting up secure Outlook Web Access Fixing an overworked e-mail server Page 26 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html. TechRepublic: The collective voice of IT professionals About TechRepublic TechRepublic communities engage IT professionals in the ultimate peer-to-peer experience, providing actionable information, tools, and services to help members get their jobs done. TechRepublic serves the needs of the professionals representing all segments of the IT industry, offering information and tools for IT decision support and professional advice by topic. TechRepublic site features Free e-newsletters: Keep up-to-date on any aspect of the IT industry with e-newsletters—from tech stocks to daily software tips, from IT careers to hot trends—delivered right to your e-mail Inbox. Free downloads: We've collected resources to make your job easier, including ready-to-use IT forms and templates, checklists, tools, executables, Gartner product analyses, and white papers. TechRepublic's books and CDs: Find the latest books and CDs about today's critical IT topics, including PC troubleshooting, VPN, TCP/IP, Windows client and server issues, and Cisco administration. Discussion center: Open a discussion thread on any article or column or jump into pre-selected topics: career, technology, management, and miscellaneous. The fully searchable Discussion Center brings you the hottest discussions and threads and allows you to sort them by topic. Our online IT community provides real-world solutions and the latest articles, resources, and discussions affecting frontline IT pros. Get access to more than 250 full-text IT books, along with exclusive downloads and in-depth articles on network and system administration, PC troubleshooting, help desk and support issues, and more. Page 27 Copyright ©2004 CNET Networks, Inc. All rights reserved. To see more downloads and get your free TechRepublic membership, please visit http://techrepublic.com.com/2001-6240-0.html.