
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"How to Filter Spam, Phishing Emails, and Viruses Correctly without Blocking Legitimate Mail","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JDnVHHxqmL\"><a href=\"https:\/\/www.otava.com\/blog\/how-to-filter-spam-phishing-emails-and-viruses-correctly-without-blocking-legitimate-mail\/\">How to Filter Spam, Phishing Emails, and Viruses Correctly without Blocking Legitimate Mail<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/how-to-filter-spam-phishing-emails-and-viruses-correctly-without-blocking-legitimate-mail\/embed\/#?secret=JDnVHHxqmL\" width=\"600\" height=\"338\" title=\"&#8220;How to Filter Spam, Phishing Emails, and Viruses Correctly without Blocking Legitimate Mail&#8221; &#8212; OTAVA\" data-secret=\"JDnVHHxqmL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Email is an essential service especially in today\u2019s world of convenience and quick communication between clients and businesses. However with email come viruses, phishing schemes, and spam that can be a major drawback to hosting your own email system. Although these malicious messages can never be completely avoided, there are many different services and tools that when implemented correctly can reduce the number of spam to controllable amounts. Despite the ability of these excellent programs to prevent you from seeing a million nasty messages they can also impeded the successful delivery of legitimate mail. Most often when I am configuring a server or troubleshooting an email delivery problem for a client I find that there is very little knowledge of the spam policies used by other email providers. The most troublesome and often the hardest to find any information on email policies are web based email service providers such as Yahoo, Microsoft Hotmail, and AOL. These services often use a variety of methods to determine if a message is legitimate and should be passed through or spam which often will be simply deleted. Another major problem with spam filters is that they will often automatically block the address of your..."}