Dos & Don'ts: Securing e-mail systems

Want to keep your e-mail systems safe from hacker attacks and spam? Here are a few tips from Stalker Software president and CEO Vladimir Butenko.

Stalker Software president and CEO Vladimir Butenko shares a few tips for protecting e-mail systems from unsolicited mail and hacker attacks.

Do limit the number of concurrent connections from a single incoming IP address -- Spammers and hackers alike will often attempt to disrupt a system by sending or bombarding the system with requests, all coming from the same IP address. This will help to prevent such intrusions.

Do limit the number of failures from a single IP -- Spammers trying to relay or to submit messages to a dictionary of addresses on a server will generate errors. If you can limit the number of failures (errors) that is acceptable before blocking the IP, this is ideal.

Do use good RBL's -- You can prevent a lot of spam from getting to your users by doing some research and figuring out which real-time blackhole lists are the most effective.

Do report known spammers -- If you discover someone is sending unsolicited e-mail, be sure to report them. This is what makes RBL's more effective.

Don't be a spam relay -- Be sure that when the mail system is configured as a closed relay. If not, you are part of the problem and shortly your server will end up blacklisted.

Don't let your users' addresses be overexposed -- prevent, to the extent you can, your users' e-mail address exposure on the Internet. Or in the very least warn them that the more their e-mail address is used on the Internet, the more likely they are to be the victims of spammers.

Don't let your users become spammers -- Monitor your user base. If they start to send unsolicited messages, your server could end up blacklisted.

Dig Deeper on Linux system security best practices



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: