On Tue, 3 Mar 2009, Luis Daniel Lucio Quiroz wrote:
I'm focusing into mail attachment, those nothing-better-to-do users that
sends images to his friends using their corporate email.
Ah, corporate policy enforcement.
I wouldn't worry so much about trying to intelligently identify images to
filter out porn. If you have a user who is abusing the system that way
they should be easy to identify through other means.
A couple of possibilities: collect statistics on how much image traffic
(bytes) each user sends, and how much image data is stored on their
workstation. With that data you'll be able to focus on the problem users.
Not sure that SA is the correct tool for this.
--
John Hardin KA7OHZ http://www.impsec.org/~jhardin/
jhar...@impsec.org FALaholic #11174 pgpk -a jhar...@impsec.org
key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
Failure to plan ahead on someone else's part does not constitute
an emergency on my part. -- David W. Barts in a.s.r
-----------------------------------------------------------------------
5 days until Daylight Saving Time begins in U.S. - Spring Forward