\e$B=i4|@_DjCM$O\e(B 0\e$B!#\e(B
@item spam
-gnus \e$B%(!<%8%'%s%H$,$=$N5-;v$r\e(B SPAM \e$B$@$H8+Pv$7$?$i??!#$3$NH/8+E*<jK!$O!"\e(B
+gnus \e$B%(!<%8%'%s%H$,$=$N5-;v$r\e(B spam \e$B$@$H8+Pv$7$?$i??!#$3$NH/8+E*<jK!$O!"\e(B
\e$B:#8eJQ99$5$l$k$+$b$7$l$^$;$s$,!"8=;~E@$G$O!"$3$l$O%A%'%C%/%5%`$r7W;;$75-\e(B
\e$B;v$,0lCW$9$k$+$I$&$+$rD4$Y$F$$$^$9!#\e(B
\e$B$F$$$k$H!"$=$l$i$N%X%C%@!<$NCM$K%9%3%"$rIU$1$k$3$H$,$G$-$^$9!#$3$N>l9g%9\e(B
\e$B%3%"EPO?$N\e(B 5 \e$BHVL\$NMWAG$,%9%3%"$rIU$1$k%X%C%@!<$NL>A0$K$J$j$^$9!#\e(B
@sc{nntp} \e$B%5!<%P!<$,\e(B overview \e$B$K\e(B NNTP-Posting-Host \e$B$r5-O?$7$F$$$k$J$i$P!"\e(B
-@file{all.SCORE} \e$B%U%!%$%k$N0J2<$NEPO?$O!"C10l$N%[%9%H$+$i%9%Q%`$N967b$,\e(B
+@file{all.SCORE} \e$B%U%!%$%k$N0J2<$NEPO?$O!"C10l$N%[%9%H$+$i\e(B spam \e$B$N967b$,\e(B
\e$B$"$k>l9g$KM-8z$G$9!#\e(B
@lisp
@cindex nocem
@cindex spam
-\e$B%9%Q%`\e(B @dfn{Spam} \e$B$H$O!"F1$85-;v$r2?2s$b2?2s$b2?2s$bEj9F$9$k$3$H$G$9!#%9\e(B
-\e$B%Q%`$O0-$$$3$H$G$9!#%9%Q%`$O6'0-$G$9!#\e(B
+@dfn{Spam} \e$B$H$O!"F1$85-;v$r2?2s$b2?2s$b2?2s$bEj9F$9$k$3$H$G$9!#\e(BSpam \e$B$O0-\e(B
+\e$B$$$3$H$G$9!#\e(BSpam \e$B$O6'0-$G$9!#\e(B
-\e$B%9%Q%`$ODL>o0lF|$+$=$3$i$G!"$5$^$6$^$JH?%9%Q%`5!4X$+$i<h$j>C$7$5$l$^$9!#\e(B
+Spam \e$B$ODL>o0lF|$+$=$3$i$G!"$5$^$6$^$JH?\e(B spam \e$B5!4X$+$i<h$j>C$7$5$l$^$9!#\e(B
\e$B$3$l$i$N5!4X$ODL>o0l=o$K!"\e(B@dfn{NoCeM} \e$B%a%C%;!<%8$bAw?.$7$^$9!#\e(B
@dfn{NoCeM} \e$B$O\e(B ``no see-'em'' (\e$BH`$i$r8+$?$/$J$$\e(B)\e$B$HH/2;$5$l!"0UL#$O$=$NL>\e(B
\e$BA0$NDL$j$G$9\e(B --- \e$B$3$N%a%C%;!<%8$O!":a$rHH$7$F$$$k5-;v$r!"$D$^$j!">C$7$F\e(B
\e$B$O\e(B @samp{alt.nocem.misc} \e$B%K%e!<%9%0%k!<%W$GG[I[$5$l$F$$$^$9!#\e(B
Gnus \e$B$O$3$N%0%k!<%W$N%a%C%;!<%8$r<+F0E*$KFI$_!"2r<a$9$k$3$H$,$G$-!"$3$l\e(B
-\e$B$G%9%Q%`$r>C$75n$j$^$9!#\e(B
+\e$B$G\e(B spam \e$B$r>C$75n$j$^$9!#\e(B
\e$B$b$A$m$s!"$3$l$i$r%+%9%?%^%$%:$9$k$?$a$NJQ?t$,$$$/$D$+$"$j$^$9!#\e(B
"clewis@@ferret.ocunix.on.ca" "cosmo.roadkill" "SpamHippo"
"hweede@@snafu.de")} \e$B$G$9!#H`$i$O$_$s$J!"N)GI$G9b7i$J;TL1$G$9!#\e(B
-\e$B$3$N%j%9%H$K4^$a$i$l$kM-L>$JH?%9%Q%`2H$?$A\e(B
+\e$B$3$N%j%9%H$K4^$a$i$l$kM-L>$JH?\e(B spam \e$B2H$?$A\e(B
\e$B$O\e(B @uref{http://www.xs4all.nl/~rosalind/nocemreg/nocemreg.html} \e$B$K:\$C$F\e(B
\e$B$$$^$9!#\e(B
@item gnus-nocem-expiry-wait
@vindex gnus-nocem-expiry-wait
\e$B8E$$\e(B NoCeM \e$B9`L\$r%-%c%C%7%e$+$i>C$9$^$G$NF|?t!#=i4|@_DjCM$O\e(B 15 \e$B$G$9!#$3\e(B
-\e$B$l$rC;$/$9$k$[$I\e(B gnus \e$B$OB.$/$J$j$^$9$,!"8E$$%9%Q%`$r8+$k$3$H$K$J$C$F$7$^\e(B
+\e$B$l$rC;$/$9$k$[$I\e(B gnus \e$B$OB.$/$J$j$^$9$,!"8E$$\e(B spam \e$B$r8+$k$3$H$K$J$C$F$7$^\e(B
\e$B$&$+$b$7$l$^$;$s!#\e(B
@item gnus-nocem-check-from
@end menu
@node The problem of spam
-@subsection The problem of spam
+@subsection Spam \e$B$NLdBj\e(B
@cindex email spam
@cindex spam filtering approaches
@cindex filtering approaches, spam
@cindex UCE
@cindex unsolicited commercial email
-First, some background on spam.
-
-If you have access to e-mail, you are familiar with spam (technically
-termed @acronym{UCE}, Unsolicited Commercial E-mail). Simply put, it exists
-because e-mail delivery is very cheap compared to paper mail, so only
-a very small percentage of people need to respond to an UCE to make it
-worthwhile to the advertiser. Ironically, one of the most common
-spams is the one offering a database of e-mail addresses for further
-spamming. Senders of spam are usually called @emph{spammers}, but terms like
-@emph{vermin}, @emph{scum}, and @emph{morons} are in common use as well.
-
-Spam comes from a wide variety of sources. It is simply impossible to
-dispose of all spam without discarding useful messages. A good
-example is the TMDA system, which requires senders
-unknown to you to confirm themselves as legitimate senders before
-their e-mail can reach you. Without getting into the technical side
-of TMDA, a downside is clearly that e-mail from legitimate sources may
-be discarded if those sources can't or won't confirm themselves
-through the TMDA system. Another problem with TMDA is that it
-requires its users to have a basic understanding of e-mail delivery
-and processing.
-
-The simplest approach to filtering spam is filtering. If you get 200
-spam messages per day from @email{random-address@@vmadmin.com}, you
-block @samp{vmadmin.com}. If you get 200 messages about
-@samp{VIAGRA}, you discard all messages with @samp{VIAGRA} in the
-message. This, unfortunately, is a great way to discard legitimate
-e-mail. For instance, the very informative and useful RISKS digest
-has been blocked by overzealous mail filters because it
-@strong{contained} words that were common in spam messages.
-Nevertheless, in isolated cases, with great care, direct filtering of
-mail can be useful.
-
-Another approach to filtering e-mail is the distributed spam
-processing, for instance DCC implements such a system. In essence,
-@code{N} systems around the world agree that a machine @samp{X} in
-China, Ghana, or California is sending out spam e-mail, and these
-@code{N} systems enter @samp{X} or the spam e-mail from @samp{X} into
-a database. The criteria for spam detection vary - it may be the
-number of messages sent, the content of the messages, and so on. When
-a user of the distributed processing system wants to find out if a
-message is spam, he consults one of those @code{N} systems.
-
-Distributed spam processing works very well against spammers that send
-a large number of messages at once, but it requires the user to set up
-fairly complicated checks. There are commercial and free distributed
-spam processing systems. Distributed spam processing has its risks as
-well. For instance legitimate e-mail senders have been accused of
-sending spam, and their web sites have been shut down for some time
-because of the incident.
-
-The statistical approach to spam filtering is also popular. It is
-based on a statistical analysis of previous spam messages. Usually
-the analysis is a simple word frequency count, with perhaps pairs or
-words or 3-word combinations thrown into the mix. Statistical
-analysis of spam works very well in most of the cases, but it can
-classify legitimate e-mail as spam in some cases. It takes time to
-run the analysis, the full message must be analyzed, and the user has
-to store the database of spam analyses.
+\e$B=i$a$K\e(B spam \e$B$NGX7J$+$i!#\e(B
+
+\e$B$"$J$?$,EE;R%a!<%k$r;H$C$F$$$k$J$i$P!"\e(Bspam (\e$B@lLgMQ8l$H$7$F$O\e(B Unsolicited
+Commercial E-mail -- \e$BK>$^$l$J$$>&MQEE;R%a!<%k\e(B -- \e$B$NF,J8\e(B
+\e$B;z\e(B @acronym{UCE}) \e$B$N$3$H$O$h$/CN$C$F$$$k$G$7$g$&!#4JC1$K8@$($P$=$l$O;f$N\e(B
+\e$B%a!<%k$KHf$Y$FEE;R%a!<%k$NG[Aw$,$H$F$b0B$/$D$/$?$a$KB8:_$7!"Hs>o$K>.$5$J\e(B
+\e$B3d9g$N?M!9$,\e(B UCE \e$B$K1~Ez$9$k$@$1$G9-9p<g$KMx1W$r$b$?$i$9$N$G$9!#HiFy$J$3\e(B
+\e$B$H$K:G$b0lHLE*$J\e(B spam \e$B$N0l$D$O!"$5$i$K\e(B spam \e$B$r=uD9$9$k$?$a$NEE;R%a!<%k%"\e(B
+\e$B%I%l%9$N%G!<%?%Y!<%9$rDs6!$7$^$9!#\e(BSpam \e$B$NAw?.<T$O$U$D\e(B
+\e$B$&\e(B @emph{spammers} \e$B$H8F$P$l$^$9$,!"\e(B@emph{vermin}\e$B!"\e(B@emph{scum} \e$B$*$h\e(B
+\e$B$S\e(B @emph{morons} \e$B$N$h$&$JMQ8l$b$h$/;H$o$l$F$$$^$9!#\e(B
+
+Spam \e$B$O<o!9$5$^$6$^$J=P$I$3$m$+$i$d$C$FMh$^$9!#M-MQ$J%a%C%;!<%8$r<N$F$:\e(B
+\e$B$K$9$Y$F$N\e(B spam \e$B$rC1$K;OKv$9$k$3$H$OIT2DG=$G$9!#NI$$Nc$O\e(B TMDA (\e$BLuCm\e(B: \e$BAw\e(B
+\e$B?.$9$kEY$K%f%K!<%/$J%"%I%l%9$r;H$&\e(B) \e$B%7%9%F%`$G!"$=$l$O$"$J$?$,CN$i$J$$Aw\e(B
+\e$B?.<T$K!"H`$i$NEE;R%a!<%k$,FO$/A0$KH`$i$,@5Ev$JAw?.<T$G$"$k$3$H$N3NG'$r5a\e(B
+\e$B$a$^$9!#@5Ev$J=P$I$3$m$+$i$NEE;R%a!<%k$,\e(B TMDA \e$B%7%9%F%`$K$h$C$F$=$l$i$N=P\e(B
+\e$B$I$3$m$,3NG'$G$-$J$$!"$^$?$O9T$J$o$l$J$$>l9g$O<N$F$i$l$F$7$^$&$+$b$7$l$J\e(B
+\e$B$$$H$$$&%^%$%J%9LL$O!"\e(BTMDA \e$B$N5;=QE*$JB&LL$KN)$AF~$i$J$/$F$bL@Gr$G$9!#$b\e(B
+\e$B$&0l$D$N\e(B TMDA \e$B$NLdBj$O!"EE;R%a!<%k$NG[Aw$H=hM}$X$N4pK\E*$JM}2r$r%f!<%6!<\e(B
+\e$B$K5a$a$F$$$k$3$H$G$9!#\e(B
+
+Spam \e$B$N=|5n\e(B (filtering) \e$B$X$N:G$bC1=c$J<h$jAH$_$O_I2a$9$k$3\e(B
+\e$B$H\e(B (filtering) \e$B$G$9!#KhF|\e(B @email{random-address@@vmadmin.com} \e$B$+$i\e(B 200\e$BDL\e(B
+\e$B$N\e(B spam \e$B%a%C%;!<%8$r<u$1<h$k$N$J$i$P!"\e(B@samp{vmadmin.com} \e$B$rAK;_$9$l$P$h\e(B
+\e$B$m$7$$!#\e(B@samp{\e$B%P%$%"%0%i\e(B} \e$B$K4X$9$k%a%C%;!<%8$r\e(B 200\e$BDL<u$1<h$k$N$J$i$P!"\e(B
+@samp{\e$B%P%$%"%0%i\e(B} \e$B$r4^$`$9$Y$F$N%a%C%;!<%8$r<N$F$F$7$^$($P$h$m$7$$!#$3$l\e(B
+\e$B$O!";DG0$J$,$i@5Ev$JEE;R%a!<%k$r<N$F$k$?$a$N$9$0$l$?J}K!$G$9!#Nc$($P!"$H\e(B
+\e$B$F$b<(:6$KIY$s$GM-1W$J\e(B RISKS \e$B%@%$%8%'%9%H$O!"$=$l$,\e(B spam \e$B%a%C%;!<%8$H6&\e(B
+\e$BDL$N8l$r\e(B @strong{\e$B4^$s$G\e(B} \e$B$$$k$?$a$K!"G.?4$9$.$k%a!<%k_I2a4o$K$h$C$FAK;_\e(B
+\e$B$5$l$F$7$^$$$^$9!#$=$l$G$b$J$*8IN)$7$?4D6-$G$O!"Cm0U?<$/;H$&$3$H$K$h$C$F\e(B
+\e$BD>@\$N_I2a$OM-1W$K$J$jF@$^$9!#\e(B
+
+\e$B$b$&0l$D$NEE;R%a!<%k_I2a$X$N<h$jAH$_$OJ,;67?\e(B spam \e$B=hM}$G!"\e(BDCC (\e$BLuCm\e(B:
+Direct Client Connection) \e$B$,$=$N$h$&$J%7%9%F%`$rF3F~$7$F$$$^$9!#K\<AE*$K\e(B
+\e$B$O!"@$3&Cf$N\e(B @code{N} \e$B8D$N%7%9%F%`$,!"Cf9q!"%,!<%J$"$k$$$O%+%j%U%)%k%K%"\e(B
+\e$B$K$"$k%^%7%s\e(B @samp{X} \e$B$,\e(B spam \e$BEE;R%a!<%k$rAw=P$7$F$$$k$3$H$rG'$a$?$i!"$=\e(B
+\e$B$l$i\e(B @code{N} \e$B8D$N%7%9%F%`$O\e(B @samp{X} \e$B$^$?$O\e(B @samp{X} \e$B$+$i$d$C$FMh\e(B
+\e$B$?\e(B spam \e$B%a!<%k$r%G!<%?%Y!<%9$K5-F~$7$^$9!#\e(BSpam \e$B8!=P$N4p=`$OJQ$o$j$^$9!#\e(B
+\e$B$=$l$OAw$i$l$?%a%C%;!<%8$N?t$d%a%C%;!<%8$NFbMF$J$I$G$"$k$+$b$7$l$^$;$s!#\e(B
+\e$B%a%C%;!<%8$,\e(B spam \e$B$+$I$&$+$rJ,;6=hM}%7%9%F%`$N%f!<%6$,CN$j$?$$>l9g!"H`$O\e(B
+\e$B$=$l$i$N\e(B @code{N} \e$B8D$N%7%9%F%`$N$&$A$N0l$D$rD4$Y$^$9!#\e(B
+
+\e$BJ,;67?\e(B spam \e$B=hM}$OF1;~$KB?$/$N%a%C%;!<%8$rAw$k\e(B spammers \e$B$HHs>o$K$h$/@o$C\e(B
+\e$B$F$/$l$^$9$,!"$=$l$O%f!<%6!<$,$+$J$jJ#;($J%A%'%C%/$r@_Dj$9$k$3$H$r5a$a$^\e(B
+\e$B$9!#>&MQ$H!"%U%j!<$JJ,;67?\e(B spam \e$B=hM}%7%9%F%`$,$"$j$^$9!#J,;67?\e(B spam \e$B=hM}\e(B
+\e$B$O!"$=$l<+BN$N4m81$b$O$i$s$G$$$^$9!#Nc$($P!"@5Ev$JAw?.<T$,\e(B spam \e$B$rAw$C$?\e(B
+\e$B$+$I$GHsFq$5$l!"H`$i$N%&%'%V%5%$%H$,$=$N;v7o$N$?$a$K;C$/$N4VJD:?$5$l$F$7\e(B
+\e$B$^$&!"$H$+!#\e(B
+
+Spam \e$B_I2a$X$NE}7WE*$J<h$jAH$_$b$^$?Ia5Z$7$F$$$^$9!#$=$l$O2a5n$N\e(B spam \e$B%a%C\e(B
+\e$B%;!<%8$NE}7WJ,@O$K4p$E$$$F$$$^$9!#DL>o$=$NJ,@O$O!"$*$=$i$/C18l$NBP$+;0$D\e(B
+\e$B$NC18l$NAH9g$;$N9g@.$K$h$k!"C18l$N=P8=IQEY$NC1=c$J7W?t$G$9!#\e(BSpam \e$B$NE}7W\e(B
+\e$BJ,@O$O$[$H$s$I$N>l9g$K$H$F$b$h$/F/$/$N$G$9$,!";~$H$7$F@5Ev$JEE;R%a!<%k\e(B
+\e$B$r\e(B spam \e$B$H$7$FJ,N`$7$F$7$^$&$3$H$,$"$j$^$9!#J,@O$K$O;~4V$,$+$+$j$^$9!#$9\e(B
+\e$B$Y$F$N%a%C%;!<%8$rJ,@O$7$J$1$l$P$J$j$^$;$s!#$=$7$F%f!<%6!<$O\e(B spam \e$B$rJ,@O\e(B
+\e$B$9$k$?$a$N%G!<%?%Y!<%9$rMQ0U$7$J$1$l$P$J$j$^$;$s!#\e(B
@node Anti-Spam Basics
@subsection Spam \e$BB`<#$N4pAC\e(B
@end iftex
@item
-Gnus \e$B$O%9%Q%`$r:,@d$d$7$K$9$k$?$a$K\e(B NoCeM \e$B%U%!%$%k$r;H$&;v$,$G$-$k$h$&$K\e(B
+Gnus \e$B$O\e(B spam \e$B$r:,@d$d$7$K$9$k$?$a$K\e(B NoCeM \e$B%U%!%$%k$r;H$&;v$,$G$-$k$h$&$K\e(B
\e$B$J$j$^$7$?\e(B (@pxref{NoCeM})\e$B!#\e(B
@lisp