Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Antispam » Mail Trustee

This Directory TOP
gpg4win 2.1.0
CryptoHeaven 3.5.3 Build 660
e-mail Bomber v8.1
SpamAssassin in a Box 1.0.1
WinDeveloper IMF Tune 3.0
SpamEater Pro 4.0.5 build 151
Mail Snoop Pro 1.16.015
MailWasher 4.1.9
Spam Blocker 2.3.07
SpamPal 1.591
Kaspersky Security for MS Exchange Server 2003 5.5
BitDefender Total Security 2011 Build 14.0.28.351
BullGuard Spamfilter 8.0
GFI MailEssentials for Exchange/SMTP 12
Alanch v.3.4
SpamWeasel Pro 1.0.44
Kaspersky Internet Security 7.0.1.325
Aloaha Spam Rejector 3.0.45
SpamAware 5.02
Scan and Repair Utilities
DetectSatan
Spyware Stopper
MailScan for SMTP Servers 6.4a
TheStubware 1.8.1
Ashampoo IP Spam Blocker 1.02
Detective Dominator 3.2
MailScan For Mail-Server 5.3a
Web Form SPAM Protection 1.5.1
MailScan 5.0 for CommuniGate Pro 5
EmC 8.17
SPAMfighter Pro
Sa4o - SafestMail4Outlook 2
Search

Mail Trustee

File Size: 595KB
Developer:
Description:     Do you get a lot of unwanted mail in your mailbox? - Are you tired of selecting unwanted messages and wasting time on them? - Do you lose wanted messages amidst all that trash you get in your mailbox? - Do you pay extra money because your mail client receives unsolicited mail? Mail Trustee will help you solve these problems and more! Mail Trustee: a system of E-mail protection programs intended to protect your mailboxes from unsolicited mail (spam). Mail Trustee acts as a proxy server, which is situated between your mail client and mail server. Our unique technology will filter out a huge percentage of the spam, allowing minimum possible mail server access time with a minimum volume of sent and received information. Mail Trustee supports up to 255 mailboxes and each mailbox may have its individual settings for spam filtering and mail rocessing. Mail Trustee has a flexible system of settings which allows adapting it to a users needs. An individual functioning cycle can be set up for each mailbox; it will include: - Receiving mail from mail client with further transfer to mail server - Transfer of received mail from mail server to mail client - Establishing an Internet connection if needed - Mail transfer to mail server - Mail analysis on mail server, unsolicited mail detection for decision-making (delete, accept, etc.) - Receiving mail from mail server - Interrupting an Internet connection if needed While analyzing mail, all necessary types of checks are performed, which gives an excellent result in spam filtering. The following checks may be used in the system: - Allowed E-mails - Forbidden E-mails - Allowed zones - Forbidden zones - Allowed domains - Forbidden domains - Field validity "To:" - Field validity "Received:" - Field syntax "From:" - Lists DNSBL - Allowed expressions in Subject - Forbidden expressions in Subject - Forbidden expressions in Header - Allowed expressions in Message - Forbidden expressions in Message
Download:   Mail Trustee

 

Sponsor Links

Sponsor Links

Share/Bookmark