How to stop spam:

Call us at 310 395-7546 - we have a solution that will eliminate spam from reaching you. We scan for spam and viruses in email and you never have to see the junk we remove!

How to train SPAM and HAM filters:

Scores are given in all tests in both positive (HAM) and negative (SPAM) integers. This is because the tests look for a wide range of information. The tests are looking for indications of offensive language, scam messages (like get rich quick or grow enormous body parts).

The tests are also looking for information that would indicate the email is NOT SPAM (HAM).

HOWEVER - The system needs to LEARN from user input.

The more frequently users login to webmail and "teach" the filters the better the system will work. To improve performance we recommend at least once a week each user take some time to train the filters.

To do this login to your mail account in the morning before checking mail in Outlook: (NOTE: this will only work with accounts hosted by CompanyV)

LEARN SPAM: check the box to the right of very message in your inbox that is SPAM and then click the "LEARN SPAM" button.

LEARN HAM: Check the box to the right of EVERY GOOD message and then click the "Learn Ham" Button.

NOTE: Never login to webmail while Outlook is running - that will create a "POP lock" and you will need to close both applications for 10 to 15 minutes to unlock.

Teaching the filters in BOTH directions increases performance greatly. When you "learn" either "ham" or "spam" it does not mean that those messages will automatically be given a score that is in accordance. That would create huge false positives and actually make the problem worse. Instead the system looks at all of the information contained in the email in great detail from the information in the headers (loads of background information), as well as the particulars of the content and formatting.

The system is designed to fight new and constantly mutating Spamming techniques by combining innovative SPAM fingerprinting, Bayesian SPAM classifiers, connection level controls and policy management to properly classify SPAM emails while delivering the lowest number of false positives.

The spam that is making it to your actual "Inbox" is only a small portion of the spam being sent to you. The filters are automatically placing email it feels very sure is spam into a folder that only exists on the mail server.

To view this folder you can select the "SPAM" folder by using the dropdown box in the upper left corner of webmail. In addition to that mail there is an even larger amount being sent to you that the server is not even bothering to deliver to your spam folder. In addition, there are entire sender services and service providers globally that we will not even accept a connection from due to blacklist policies that are honored by compliant ISPs.
Back to top

*  Why do I type https rather than http for webmail and DeSpaminator?
We run a secure server for your web-based mail services so that your mail is secure. Once you enter, NONE of your communications with the server are viewable by anyone but you because they are encrypted. To support this your browser must be capable of 128-bit encryption. If you get the message "Forbidden" when trying to log onto your webmail server, you must upgrade your browser.
Back to top

*  What is a Domain?
Practically speaking, your Domain is the core of your Internet identity, your online brand. Your customers will remember this name and use it to find out about your products and services. And since no two parties can ever hold the same domain simultaneously, your Internet identity is totally unique.

Technically, a domain is an addressing construct used for identifying and locating computers on the Internet. While computers use Internet Protocol (IP) numbers to locate each other on the Internet, people find them hard to remember. Therefore, domains were developed to permit the use of easily remembered words and phrases to identify Internet addresses.

For example, the domain represents the company Corporation. When you type in a web browser or send e-mail to someone at, the Domain Name System (DNS) translates, into the IP numbers used by the Internet and connects you to the website.

You can search for a domain here:
Back to top

*  What is Hosting?
Every domain must reside on a host computer, or Domain Name Host. Domain Name Hosts are connected to the Internet and use special software to translate domains into the numerical addresses (Internet Protocol numbers) used by the Internet. When Internet users your domain into their browser bar, the Domain Name Host directs them to your Web site. Without it, your domain is invisible on the Internet.

The hosting service acts as a parking lot for your website.

internet service providercomputer transfer internet
mail transfer
Hosting Server    Internet

Our Hosting computers... or web servers are maintained by our in-house staff of engineers and technicians. Our web servers are connected to the internet 24 hours a day 7 days a week on a fractional T-1 (commercial high speed connection).

By offering hosting services to our website customers, we feel we can service their accounts most efficiently.

If you choose to host with us, you will still need an ISP of your own.
Back to top

*  What is an ISP?

An ISP is an "Internet Services Provider"

The most common way to access the Internet from home is with DSL or Cable, for businesses it is more common to be a T1. Your computer connects via router or to the ISP, which in turn is connected to the Internet with a high-speed connection.

computer data transfer data lines data isp email internet
email data data
Computer   Router   ISP   Internet

Most ISPs provide a full range of fast, reliable products, ranging from basic dial-up access to high-bandwidth connections that offer uninterrupted internet connection.
With DSL, you get high-speed internet access over your existing phone line. This means you can talk on the phone and surf the web simultaneously.
With a cable provider, you receive internet access via your cable company's existing lines. You can watch your favorite channels on television while still connected to the internet.
For areas where dial-up is the only option, most have several access numbers, or points-of-presence (POPs) as they are often called. Wi-Fi hotspots are locations where a business like a hotel or coffee shop (fro example) has allowed access through a wireless router to their dsl or T1 connection. You can easily set up your home connections to operate wireless as well.
Back to top

*  ISP Pricing
Internet Service Providers typically offer several pricing plans for connection services. Check with your local phone company and cable company for rates and connectivity options.
Back to top

*  ISP Features
Many ISP accounts provide more than a simple connection from your computer to the Internet. They typically also include such services as:

  • an e-mail account for you to send and receive electronic mail
  • access to Internet newsgroups
  • a personal Web page

These additional services are provided on the ISP's computers, since they need to be available even when your computer isn't connected to the Internet.
Back to top

*  Email
Incoming e-mail is received by your ISP and stored in a mailbox for you on a computer known as a server. When you next connect to your ISP and run your e-mail program, the message is downloaded to a mailbox on your computer. At this point, the message can be automatically removed from the ISP's POP server since it is now stored on your computer's hard drive (until you delete it in your e-mail program). See your email application help files for instructions on changing settings to leave mail on server or remove from server on check.

computer data transfer Router data transfer isp mail transfer internet
Computer   Router   Mail Server   Internet

Your ISP will provide you with the address of their Mail server, which you will need to into your e-mail program. they will provide the type of server.

Back to top

*  what is IMAP Email

What is an IMAP account?

IMAP (Internet Message Access Protocol) is an advanced protocol for sending and receiving e-mail. It is a method of accessing e-mail messages which are stored on a mail server. E-mail stored on an IMAP server can be manipulated using an e-mail client like Outlook or Eudora from different computers or telephones without the need to transfer messages or files back and forth between the computers. This is possible because the messages are stored on the server, unlike POP3, where messages must be downloaded to your computer's hard drive before reading.

A strong advantage of IMAP over POP3 is the ability for users to set up IMAP folders on the server. Incoming mail can then be organized into the correct folder. This is especially helpful if the IMAP e-mail account has many folder and is used in conjunction with other devices like phones or laptops or if it is shared by more than one user.

Back to top

*  What is POP Email?

What is a POP Mail account?

POP stands for Post Office Protocol)
Outgoing e-mail is essentially the same process in reverse. When you send a message from your e-mail program it is uploaded right away to the ISP. It is temporarily stored in an outgoing mailbox on a computer known as an SMTP server. Usually the message can be delivered right away, but if there is a problem delivering the message, it will be stored on the SMTP server until it can be delivered later. You don't need to stay connected to the internet to assure delivery.

Back to top

*  What is Webmail?

What is a Webmail account?

Webmail is when you are given the ability to access your email account through a browser like Internet Explorer or Firefox. This is very useful if you are at a location with internet access but on a computer that is not your own.

computer goes here Router information goes here what is an ISP information goes here how the internet works
Computer   Router   SMTP Server   Internet

Your ISP will also provide you with the address of their SMTP or outgoing server. In some cases, it may be the same address used for the POP server. (SMTP stands for simple mail transfer protocol.)
We do not recommend forwarding from another service provider to your account running DeSpaminator.
The reason is the headers, a forwarded email will alter the headers and your other account will look like the sender. Forwarding to this account defeats many of the features.
Back to top

*  What is a URL?
A URL is a Uniform Resource Locator. Think of it as a networked extension of the standard filename concept: not only can you point to a file in a directory, but that file and that directory can exist on any machine on the network, can be served via any of several different methods, and might not even be something as simple as a file: URLs can also point to queries, documents stored deep within databases, the results of a finger or archie command, among other things.
Back to top

HTTP stands for HyperText Transport Protocol. HTTP servers are commonly used for serving hypertext documents, as HTTP is an extremely low-overhead protocol that capitalizes on the fact that navigation information can be embedded in such documents directly and thus the protocol itself doesn't have to support full navigation features like the FTP and Gopher protocols do. A file called "FAQ.sqrl" on HTTP server "" in a directory called "support" which corresponds to this URL:
This is the page that you are viewing and you should see this in the "Address" bar at the top of the screen you are looking at.
Back to top

*  What is a Realtime Blackhole List (RBL)?
The Real-time Blackhole List, or RBL, is a blacklist of Internet TCP/IP addresses known to send spam, or considered friendly to spam.
This blacklist is maintained independently of DeSpaminator. For more information about the RBL, see
The RBL is an effective way of drastically reducing the amount of spam that you receive. However, if you enable the RBL test, it is likely that you will also accidentally refuse valid email. The reason for this is the RBL bans all email coming from a given set of TCP/IP addresses. For example, if an ISP has been banned because they allow spam from their mail servers, then all mail from that ISP will be banned, not just the spam.
We do not recommend that this setting be enabled if it is important to you to not reject valid mail. On the other hand, if you fully understand the implications of the RBL for your system's mail, and you want to participate, then you should enable this feature, as the RBL has been effective in getting ISP's to secure their relay hosts in order be removed from the ban.
By default, this setting is disabled.
Back to top

*  What is the body of an email?
The body of the email is the same as the body of a letter. It is the portion of the email in which you read and/or write text.
Back to top

*  What is a header?
Headers are the block of information lines which appear at the top of a mail or news message. Headers identify the sender and recipient of a message, the route the message took from one site to another and so on. Headers are used to determine the source of a message. Click here for more information about headers and how to find them!
Back to top

*  Why use HTML sanitizer?
When you receive an email message written in HTML, the possibility of it concealing a potentially destructive, self-initializing sequence of events is very high. For example, the message could contain Active X components, hidden executable's, images containing hidden executable's, and/or potentially intrusive or malicious virus content. These can launch simply by opening the email they're contained within.
By converting incoming mail from HTML to TEXT, DeSpaminator will disable all embedded images in the incoming email. Images pose a threat because of their ability to contain (and launch) viruses. Disabling the embedded images will remove this threat.
Additionally, many mailing list companies can keep track of what links you click within the email messages they send to you. In turn, they sell this "click-stream" information about you to their clients. By converting incoming mail from HTML to TEXT, DeSpaminator will turn these links (hidden or otherwise) into plain text which will show the entire contents of URL. With the entire URL displayed, you can edit, cut, and copy it into a browser yourself or choose to disregard the link altogether, thus restricting any "click-stream" information about you being sent to potential spammers.
Back to top

*  Where does SPAM come from?
The majority of spam comes from people who are trying to sell or promote something. They have programs to find your email address and send you their junk. It is difficult to track the source of spam because most spammers use a fake or forged email address or a domain that is not in use. Many Spammers will use free accounts like Yahoo or Gmail because they are free and therefor "disposable".
Back to top

*  How did they get my email address?

We have many users report email as SPAM that they actually "signed up for".

When you enter your information in any online form while and agree to the "terms of Service" frequently those terms say that you agree to receive email from them or their partners or affiliates. READ THE TERMS BEFORE YOU AGREE!

There are many ways SPAMMERS can get your email address. One common way is through forwarded email. Let's say you forward a joke to friends & family. In turn, they forward it to their own list of people, and so on and so forth.

Every email address contained within the HEADERS of the forwarded message can be extracted and added to a SPAM list or address book. If you insist on sending email such as this, there are precautions you can take to protect yourself and your friends' email addresses. One way to remedy this (instead of forwarding the entire email), is to COPY ONLY THE TEXT in the BODY of the email you'd like to send out and PASTE it into a brand-new email. "Bcc" whomever you'd like to include in the mailing.

You may also receive spam if you put your e-mail address in an online membership list, write postings in online bulletin-boards, or otherwise display your e-mail address so that automated e-mail harvesting systems can find it. Mail-order catalogs, charities and non-profit organizations, sweepstakes & prize raffles, and "free" electronic cards are other ways your email address can be listed. Remember: nothing in life is free.

If you use go to online voting or petition sites or send electronic birthday/holiday card or party invitation services, your email address could very well be on a list for sale as well as the email address of your friends.

Back to top

*  Should I click the REMOVE ME line in a SPAM email?

No! More often than not, clicking on the "remove me" link in an unsolicited email will result in even MORE SPAM. It will only verify that your e-mail address is owned and used by a real person, and this will make your address more valuable to sell to more spammers. If you find that a "remove me" link does not work or results in more spam, you can file a compliant at , or report them to their service provider, but tracking them can be very difficult and time consuming. Thats why we have Squirrels!
Back to top

When "Off-the-shelf" isn't good enough!

We clear the air on Cloud services. Place your valuable data in a safe place not a vague place like a public cloud!

Websites - WordPress Design support and Hosting - Virtual Private Servers - VMs - Email - Backups - Tech Support - all things Internet!

Looking for a higher class email? with Spam & Virus Filtering plus Webmail and customer support?

Our servers detect and remove virus and spam from ever making it to your inbox!

Whatever your needs - if it involves Internet services - give us a call!

Hosted email - websites designed implemented and hosted - we can do that! Backups or Secure Shares or Virtual Private servers (VPS) - we can do that too!

Our spam solution can be configured to work with Exchange and will save you bandwidth, storage and backup space.

If CompanyV servers are delivering a failure message to incoming mail you can send an email to someone who is unable to email you - ask them to copy the entire delivery failure message and fill out the on this page: That link should also be in the delivery failure message they received.
CompanyV email account set-up instructions.

These instruction only apply to CompanyV Email customers. You would have received username, passwords plus incoming and outgoing mail server information from us by phone, fax, text or through another email account.

More information not required for set-up:

We Get The Nuts Out Of Your IN Box!

Email - Like it's supposed to be

Does your service provider answer the phone and your questions?
We do!

1 805 322-1007 ext 1
1 310 388-8123 ext 1 Corp
1237 S VICTORIA AVE #444
OXNARD, CA 93035