Email Protection FAQ

Frequestly Asked Questions

What is spam?

Spam is unsolicited e-mail sent to a large number of addresses, usually for a commercial purpose. Most spam is commercial advertising and often the products advertised are worthless, deceptive, and partly or entirely fraudulent. Other times, it is simply advertising for something that you may not be interested in.

What is Phishing?

Phishing is the process of luring unsuspecting Internet users to a fake website by using authentic-looking email with the real organization’s logo, in an attempt to steal passwords, financial or personal information, or introduce a virus.

What is a virus?

A virus is a software program designed to spread itself by infecting files and system areas of a storage device, such as a hard drive or server. They are often transported in encoded messages containing embedded code or messages that include file attachments

What is Denial of Service Attack (DOS)?

DOS is an attack designed to bring an entire network down by flooding it with requests and traffic. A mail or web server can only handle a specific amount of requests and will crash once that limit is reached.

What is a Trojan Horse?

It is a type of program that is often confused with viruses. Trojan Horse is not a virus, but simply a program (often harmful) that pretends to be something else

What is Circles of Trust?

Revolutionary FastTech Email Protection Circles of Trust builds sender recipient relationships between individuals, businesses and servers. When spam checking occurs, the spam engines are able to cross reference their classifications against Circles of Trust. Circles of Trust is able to adjust spam scores according the recipients direct or indirect relationships with the sender, thus reducing the risk of false positive emails even further.

What are botnets?

A Botnet is the term for a collection of software robots, or bots, which run autonomously and automatically. They run on groups of “zombie” computers controlled remotely.

What is a Harvest Directory attack?

A Directory Harvest Attack or DHA is a technique used by spammers to find valid/existent e-mail addresses at a domain. The attack is usually carried out by way of a standard dictionary attack, where valid e-mail addresses are found by guessing valid e-mail addresses at a domain using different permutations of common usernames.

Can we try before we buy?

Yes, a 30 day free trial is available. Simply Request a Trial, and update your contact details and one of our Sales Representatives will be in touch with you

How long will the process take?

If we have all the relevant information the process should take less than 60 minutes.

What is Allowlist and Blocklist?

An allowlist is a list of emails, domains or IP addresses from which you will always accept email, even if it would otherwise be classes as spam. For example, newsletters you subscribe to.
A blocklist is a list or of emails, domains or IP addresses from which you will never accept email even if it is otherwise legitimate.

How does the Recurrent Pattern Detection stop spam?

Recurrent Pattern Detection uses a real time fingerprinting of emails to detect outbreaks of an email. The technology is completely content independent and detects spam by creating an SHA of emails to detect the number of times an email has been detected.

Email Protection FAQ page printed from