How to remove ourselves from nudity blacklists? [duplicate]
No, there is no “global” list; every company maintains their own classifications. So you will have to contact each one individually.
No, there is no “global” list; every company maintains their own classifications. So you will have to contact each one individually.
MxToolbox has a web-based blacklist check tool that’s a good starting point. The Domain Name System Blacklists (DNSBL) and Anti-Abuse Multi-RBL Check are other great free resources for this purpose. DNSstuff also has a subscription based service called RBLalerts that will monitor 130+ blacklists for an IP address you specify and notify you if it … Read more
Here is my list and why I use them: zen.spamhaus.org – Comprehensive RBL, catches a ton of spam sources, updated regularly. They have a long history and decent reputation in the spam filtering community. I have heard some negative things about them from time to time, but those are generally without real merit. Downside is … Read more
Is this becoming a real problem for your users? I’d recommend a full-on mail filtering service at this point. Bayesian isn’t really that hot anymore. Reputation, RBL, header/intent-analysis and other factors seem to help more. Consider a cloud filtering service to combine multiple approaches (and collective volume) to provide better protection (I use Barracuda’s ESS … Read more
try using iptables and building multi-level tree to decrease number of lookups. iptables -N rules_0_0_0_0_2 iptables -N rules_64_0_0_0_2 iptables -N rules_128_0_0_0_2 iptables -N rules_192_0_0_0_2 iptables -N rules_0_0_0_0_4 iptables -N rules_16_0_0_0_4 iptables -A INPUT -p tcp –dport 80 -s 0.0.0.0/2 -j rules_0_0_0_0_2 iptables -A INPUT -p tcp –dport 80 -s 64.0.0.0/2 -j rules_64_0_0_0_2 iptables -A INPUT … Read more
I’d suggest grabbing a firewall configuration tool, such a Firestarter, and going from there. Here are some basics for you, though. #Flush existing rules iptables -F # Set up default DROP rule for eth0 iptables -P INPUT DROP # Allow existing connections to continue iptables -A INPUT -i eth0 -m state –state ESTABLISHED,RELATED -j ACCEPT … Read more