Search results

  1. R

    Inteligence Artificial implementation

    Greetings! I believe that AI-enhanced spam filtering isn't just "Bayes with more inefficiency"; it’s about addressing the limitations of static statistical models. While Bayes is effective for known patterns, modern spam evolves (e.g., adversarial attacks, polymorphic content). Then knowing...
  2. R

    Inteligence Artificial implementation

    For example, this is what i have found, but i am investigating in labs to add to my pmg: * In box zer. * Otis * Assp * GuardianAI * Spam Filter AI * Spam Detector AI
  3. R

    Inteligence Artificial implementation

    Good afternoon. No, Bayes is not AI. Bayes is a classification system that uses statistical techniques for email filtering. It typically relies on a set of characteristic words to identify spam emails, which is a common approach in text classification. Bayes does not go beyond what it was...
  4. R

    Inteligence Artificial implementation

    Some one has any idea to implement IA for checking headers and learn what is spam or what's not? I believe there is any way to get the incoming mails and analize them through a local IA database and machine learning.
  5. R

    [TUTORIAL] PVE 6.2 Private VM (NAT) network configuration setup

    I am using openvswitch only, openvswitch should not be the problem: I believe you did not set the subnet on the vnet, i will show you my configuration for example and reference. For enable dhcp you need to add first the zone in my example i create "zone1" in my develop2 server: In the zone...
  6. R

    Suggestions on how to stop a spoof, with from name and then matching domains?

    But it will be really hard to do it for the whole enterprise, if your server is zimbra or any LDAP capable, you can link it with your proxmox and do a rule to validate if the user "to" is on the database for example, if the From exist in the DB and if is coming from the valid MTA, it would be...
  7. R

    Suggestions on how to stop a spoof, with from name and then matching domains?

    One way is using LDAP AUTH, and validate if the email is coming from the right server or the user if is coming from outside it should be a warning o quarantine.
  8. R

    [TUTORIAL] PVE 6.2 Private VM (NAT) network configuration setup

    First of all I did not use LLM I am answering what you have said and i qoute "... There's no reason to set up bridge interfaces inside the virtual machines too ....", I leave your full text: I You read my answer i didn't propose to set bridge interfaces inside the virtual machines, my...
  9. R

    [TUTORIAL] PVE 6.2 Private VM (NAT) network configuration setup

    Hello! I’d like to help you achieve your goal of setting up a private IP (NAT) environment for your VMs in a more streamlined and modern way. Since you’re using Proxmox, I recommend upgrading to Proxmox VE 8 if you haven’t already. This version introduces Software-Defined Networking (SDN), which...
  10. R

    [TUTORIAL] PVE 6.2 Private VM (NAT) network configuration setup

    It’s true that setting up bridges might seem overcomplicated for newcomers or those unfamiliar with Linux networking, but for experienced Linux administrators, it’s a standard and powerful practice. Proxmox simplifies many of the tasks we’ve traditionally done via the command line, and bridges...
  11. R

    [TUTORIAL] PVE 6.2 Private VM (NAT) network configuration setup

    Hi. In my case i would answer, because it is a good practice to keep an standard and normalization in your configurations and installation, in that way you are following an standard configuration and is easy to manage, teach, learn and pass to others. A single network card will not add any...
  12. R

    DKIM for Quarantine Notifications

    I am installing a proxmox mail gateway under a close enviroment and i will test installing a dkim on the postfix of proxmox and do testing experiments. I will comment the outcomming.
  13. R

    Suggestions on how to stop a spoof, with from name and then matching domains?

    It would be a path to analyze all incoming domains, and storage the source ip and from domain, then after the day or when an spoofed email is detected, mark the domain and ip and then apply a rule to only allow the right domain and right ip. For example on all day i got following info: domain1...
  14. R

    How come phishing email can pass all

    When a spammer use a well configured relay server and is compliant with all security checks, it has a good FQDN and good PTR, is not on blacklist, is coming from an existing hacked email account but is being spoofed as another user, for now, the solution is to use de sa-learn and get help with...
  15. R

    Controlling outbound spam

    Yes you can filter outgoing messages
  16. R

    DKIM for Quarantine Notifications

    I am in the same hole. I would like to know how to sign all proxmox mail gateway root notifications with dkim, I have tried to add in the dkim but not dkim signing for local messages notifications and i am having problems, the clients does not receive the messages because dmarc is on reject...