Anti-spam and anti-virus suggestions

I would like to ask and get some feedback about the free anti-spam and anti-virus tools which integrate with the Java Messaging System from Sun. I would also like to express my concern with SpamAssassin since I suspect it uses too much system resources. But, anyway, if it blocks the spam with a higher percentage compared to other solution(s), then I would forget about how much resource it requires as long as it is in reasonable amounts.
Please send me your comments,
Thanks!

Hi,
Following on from what Jay said, SpamAssassin can indeed use a lot of resources if badly managed. This includes using large numbers of rulesets especially if they add very little to the overall score, and simpler things such as not using a local DNS cache. SpamAssassin if tuned well and if your system has a reasonable amount of RAM (2GB or more) can work just fine.
For example I ran x86 dual-CPU systems (less powerful then say an x4200) which were able to comfortably Spam (SpamAssassin) and Virus (Sophos Anti-virus) process 100-150K emails/day.
At the end of the day you get what you pay for. I tried out the Sophos Anti-Spam/Virus solution (Puremessage which has its own messaging server channel from memory) and found it to be very competent & slightly more efficient then SpamAssassin. In this case the cost was the limiting factor.
Regards,
Shane.

Similar Messages

  • Selection boxes in Barracuda Anti Spam and Virus Firewall do not appear in 7.0. They appeared in previous versions, and in IE.

    Selection boxes in Barracuda Anti Spam and Virus Firewall do not appear in 7.0. They appeared in previous versions, and in IE.

    FIXED!
    I reverted back to 3.6.23 and all works fine. From everything I can tell; number of problems submitted, breadth of issues, no access to versions 4, 5, 6 (rapid version turnover with no support), and now beta being released for 8, it seems FF is having the user base do all it's alpha/beta testing without consent. Being in product marketing myself, I probably would have lost a significant percentage of my customer base by now. When FF begins to support a new mainstream release, then I'll be interested again.

  • HT203200 Have deleted temp video, configured anti spam and firewall, and one specific video keeps giving me an error. Just tried downloading a previous episode of the show and it worked just fine. Always sunny in philly "Charlie rules the world" anyone el

    Have deleted temp video, configured anti spam and firewall, and one specific video keeps giving me an error. Just tried downloading a previous episode of the show and it worked just fine. Always sunny in philly "Charlie rules the world" anyone else??

    Have deleted temp video, configured anti spam and firewall, and one specific video keeps giving me an error. Just tried downloading a previous episode of the show and it worked just fine. Always sunny in philly "Charlie rules the world" anyone else??

  • Internet Security, Anti-Virus, Anti-Spyware and Anti-Malware

    What is the best internet security, anti-virus, anti-spyware and anti-malware software to use on a MacBook Pro 13' (Late 2011 model) on both Mac and Windows 7 (Parallel 7) without slowing down or effecting the operating system too much ? Do I need to get the free or paid version ?

    Although anti-virus software is not necessary on a Mac, you do need to be aware of what's out there and how to protect yourself against possible new threats. See my Mac Malware Guide.
    As for running anti-virus in Windows 7, that's a Windows issue. I personally put AVG Free on the Windows machines used by my family, but I'm no Windows expert. I'm sure different folks here will have different recommendations, and a few of those folks may even be Windows experts! (In other words, that may be a question better suited for other forums where a higher percentage of Windows users hang out.)

  • Any good anti-rootkit and anti-keylogger for OSX ?

    Hi,
    Is there any reliable anti-rootkit and anti-keylogger software for OSX ?
    I don't mind if its an all-in-one suite with anti-virus, I'm just less conceren about viruses so it's doesn't matter to me too much.
    Many thanks!

    First, there's no software out there that can reliably detect all possible keyloggers. There are legit keyloggers that won't be detected by everything, for example. If you think that someone malicious has had access to your computer, either physical access or through a back door installed through some other method, then the only reliable response is to erase the hard drive and then reinstall the system and all applications from scratch.
    In addition, the term "rootkit" (when used correctly) is a very specific kind of malware that is installed to give the hacker escalated root-level access to the computer. In modern single-user systems, this is not particularly meaningful, for a variety of reasons. Fearing rootkits and not more general malware is kind of like going to Africa and being on your guard against lions, but not against hyenas, hippos, elephants, leopards, poisonous snakes, etc.
    What is the specific issue you're trying to solve? If it's just a general concern about protecting yourself against malware, see:
    http://www.thesafemac.com/mmg
    (Formerly at the reedcorner address the others have referred to.)

  • Anti spyware and anti malware

    I have recently visited some websites which infected my computer ,
    to start off my fire walls was not on which my mistake , then safari had frozen so the massage appeared say i should call a number ( 18555450253) for immediate response which I did and the operator said he is from a protocol security company. he showed me how the firewalls was turned off and told to push and hold the shift button , and then i was able to use the safari browser again . However , he asked me to log on a website ( www.fastsupport.com) , then I downloaded an app there and he was able to use my pc remotely via sharing mode . he showed me how my pc was not secured , then He asked me to pay for anti spyware and another program called sophos anti malware . i do not trust him please help me delete those malware and i have turned on the firewalls.
    i took some screens shot for you to have an idea of what i am trying to explain. thanks

    That is a COMPLETE SCAM. You were taken.....NEVER respond to that sort of stuff.
    I would reinstall OS X from the recovery disk. There is no telling what has been installed.
    Barry
    P.S. A "PC" is a Windows based computer, not a Mac.

  • Spam and anti-virus

    I have never had trouble with spam until the last two months. Should I have a security program and if so, which one?  I have been totally spoiled with not having to deal with spam

    paulafromlutcher wrote:
    I have never had trouble with spam until the last two months.
    Please describe in detail about the spam.  Are you referring to popups, browser re-directs, or email spam etc?

  • Best anti spyware and anti virus for macbook

    Anyone know is there is software designed fr Macs to protect against spyware and viruses?

    There is, but a lot of it isn't very good for one reason or another, and it's not generally necessary. See my Mac Malware Guide.

  • Some websites open multiple pages from just one click.while just one of them is the main page,others are spam and contains virus..how do i stop it?

    these multiple pagres being spam sites slow down my pc and net connection probably through some infection.how do i control the opening of specified pages?

    Do a malware check with some malware scanning programs on the Windows computer.<br>
    Please scan with all programs because each program detects different malware.<br>
    All these programs have free versions.
    Make sure that you update each program to get the latest version of their databases before doing a scan.
    *Malwarebytes' Anti-Malware:<br>http://www.malwarebytes.org/mbam.php
    *AdwCleaner:<br>http://www.bleepingcomputer.com/download/adwcleaner/<br>http://www.softpedia.com/get/Antivirus/Removal-Tools/AdwCleaner.shtml
    *SuperAntispyware:<br>http://www.superantispyware.com/
    *Microsoft Safety Scanner:<br>http://www.microsoft.com/security/scanner/en-us/default.aspx
    *Windows Defender: Home Page:<br>http://www.microsoft.com/windows/products/winfamily/defender/default.mspx
    *Spybot Search & Destroy:<br>http://www.safer-networking.org/en/index.html
    *Kasperky Free Security Scan:<br>http://www.kaspersky.com/security-scan
    You can also do a check for a rootkit infection with TDSSKiller.
    *Anti-rootkit utility TDSSKiller:<br>http://support.kaspersky.com/5350?el=88446
    See also:
    *"Spyware on Windows": http://kb.mozillazine.org/Popups_not_blocked
    Can you send me your troubleshooting information from the Firefox installation that's having issues?
    *Navigate to <code>about:support</code> via Address Bar
    *Click the button that says <code>Copy text to clipboard</code>
    *Now, go back to your forum post and click inside the reply box. Press Ctrl+V to paste all the information you copied into the forum post.

  • What are the best anti keylogger and anti-RAT softwares for Mac?

    Here's an article from March that lists the top anti-keylogger software. http://www.macping.com/top-10-software-that-can-effectively-block-mac-keylogger- programs-on-your-computer/#comments
    But it wasn't very helpful when it came to choosing one. Has anyone done extensive tests on these to see which ones are most effective?
    And what if your computer has been compromised in other ways? 
    What's the best software out there for giving you piece of mind without having to wipe the entire computer? 

    If you have reason to suspect that someone has installed a keylogger on your system, erasing it and reinstalling everything from scratch is going to be the only way you can be certain that the keylogger is removed. Any anti-malware software could miss something, regardless of the developer's claims.
    As to prevention, the best approach is to just make sure that no one has physical access to your computer without your supervision and to keep the system secure from remote access by turning off unneeded services and using strong administrator passwords. Physical access, remote access or trickery are the only ways someone can install a keylogger onto your system.
    Regards.

  • Anti-spyware and anti-adware please

    I didn't know quite where in the Apple forum to post these questions:
    Does the firewall protection available with OS X provide protection against spyware and adware? If not can anyone please advise which software should be used in order to identify and delete spyware from the harddrive. Many times I have opened sites and a number of ad windows pop up. I do keep up with the security updates. I have searched the internet but am not sure if I should be downloading any of the softwares available. If anyone has any experience with these softwares please advise.
    I have definitely received "phishing" e-mails I've immediately passed on to the proper authorities, of course, I have never answered them as this would have been for sure the way to get your private information stolen. In any case there still remains the possibility of spyware installed in my computer and I would like to be able to check and eliminate such software should it indeed be there.
    Thanks
      Mac OS X (10.3.9)  

    Don,
    A firewall can't and won't protect you from your own actions. Don't get me wrong: Enable it and configure it properly.
    If you visit skanky, dodgy, questionable, or otherwise unsavory Web sites, you're inviting problems. Especially if you go there with Open "safe" files after downloading checked in your Safari > Preferences >General tab, surf the Web logged into an administrator profile, click the Yes/No box to view content, install viewers (and provide your admin password to do so), use Limewire or other P2P, etc...
    There is software that claims to detect spyware, but I haven't tested it or seen the code. Except for Apple's widget updater, I haven't seen much of anything in the way of software for OS X that phones home.
    You might want to consider using Little Snitch to identify whether there's any software phoning home.
    There are some choices for popup ad blocking in Panther Safari: SafariBlock - modeled on AdBlock for Firefox - and PithHelmet are two good solutions.
    As always, YourMileageMayVary.
    -Wayne

  • Exchange Anti-Malware and Trend Micro

    Hellow,
    I am finalizing an Exchange 2013 deployment and I have a question:
    I have installed Trend Micro as the anti-virus solution for my exchange servers, but this is a file-level protection software, I guess it doesn't protect my Exchange, rather it protects only the windows server environment.
    Should I enable the Exchange 2013 built-in anti-malware protection along with the trend micro? If it´s not recommended, which one should I choose to keep?
    Thanks in advance.

    Hi Vinicius,
    I suggest enabling the Anti-Spam and Anti-Malware to protect the Exchange 2013 server.
    More details in the following article:
    Anti-Spam and Anti-Malware Protection
    http://technet.microsoft.com/en-us/library/jj150481(v=exchg.150).aspx
    Thanks
    Mavis
    Mavis Huang
    TechNet Community Support

  • Anti malware / anti spam / virus protection

    Greetings,
    With the introduce of Exchange Server 2013 along with its architecture, Microsoft has moved Transport services / roles to Mailbox Server Role. well, when it comes to anti malware / anti spam and viruses , Microsoft recommends deploying them on Mailbox Server
    role, while on CAS, not necessarily be deployed as long as messages are not inspected on CAS Servers.
    While some articles say the opposite, and mention configuration of Anti malware ,etc.. on CAS Servers.
    What is the best practice for deploying anti malware / spam / virus  Software on CAS, and what is the best recommended software for messaging and OS level protection, say Symantec for example.
    Thanking you
    Jamil

    Hi,
    Based on my knowledge, in Exchange 2013, the CAS server acts as a stateless proxy for all inbound and outbound external SMTP traffic, it does not inspect message content and does not queue any messages locally. Moreover, as you know, in Exchange 2013, 
    the Transport service, which runs on all Mailbox servers, is almost identical to the Hub Transport server role in previous versions of Exchange.
    Thus, anti-spam agents in Exchange 2013 run on Mailbox servers. And here is a reference about enabling Anti-Spam on Mailbox Servers:
    http://technet.microsoft.com/en-us/library/bb201691(v=exchg.150).aspx
    Thanks,
    Angela Shi
    TechNet Community Support

  • Malware and Anti-virus

    My company has a policy that we can use our personal laptops as long as it has some form of anti-malware and anti-virus software on it.
    I am fairly new to the mac world, 18 years of working with government issued windows laptops. Could someone point me in the right direction.
    Thanks.

    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from (on no account install Norton Anti-Virus on a Mac running OS X):
    http://www.clamxav.com/
    The new version for Snow Leopard is available here:
    http://www.clamxav.com/index.php?page=v2beta
    (Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program. A recent example is of malware distributed through innocent looking free screensavers: http://www.zdnet.com/blog/security/malware-watch-free-mac-os-x-screensavers-bund led-with-spyware/6560?tag=nl.e589
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications and download torrents) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Also, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    NOTE: Snow Leopard, OS 10.6.x, offers additional security to that of previous versions of OS X, but not to the extent that you should ignore the foregoing:
    http://www.apple.com/macosx/security/
    Apple's 10.6.4 operating system upgrade silently updated the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    Finally, do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.

  • Anti-spam / Outbreak scan size

    Hi everybody,
    I'm looking for advice to determine the maximum message size for Anti-spam and Outbreak scan.
    I am currently using a scan size of 1M for Anti-spam and I will add Outbreak filter (more and more spam exceed my spam limit).
    My equipment is an ESA C370 with AsyncOS 8.0.1.
    I found in the documentation the following lines :
    Always scan messages smaller than—The recommended value is 512 Kb or less [...] Cisco advises not to exceed 3 MB for the always scan message size.
    Never scan messages larger than—The recommended value is 1024 Kb or less. [...] Cisco advises not to exceed 10 MB for the never scan message size.
    For messages larger than the always scan size or smaller than the never scan size, a limited and faster scan is performed.
    I didn't find any sentence about recommanded scan size for Outbreak...
    Thank you for your help.
    Best regards

    This is a little older information - but, still would hold true --->
    Currently, on the E-mail Security Appliance, the maximum scan size for IPAS is limited to 128K by default (the original default was 256K so many older appliance might have this set as the limit).  Messages larger than this limit are not scanned by IPAS.  Recently, Cisco IronPort did some extensive performance and efficacy testing on an average message load to determine the impact of increase scanning size on the E-mail Security Appliance.
    The tests show that when raising the maximum scan size for IPAS the increase in efficacy is significant: a 256K maximum scan size yields a 24% decrease in missed spam, and a 512K maximum scan size yields a decrease of 35% in missed spam.  However, there is a potential performance impact of 24% when going from a maximum scan size of 128K to 512K (depending on the type of hardware platform).  The impact of going from a maximum scan size of 128K to 256K is 12%.  See summary below:
                 128K -> 256K scan size limit:
                         12% possible performance reduction, 24% reduction in missed spam
                 128K -> 512K scan size limit:
                         24% possible performance reduction, 35% reduction in missed spam
    Below table show the performance results of a medium mailbox with a 50:50 ratio of spam and ham. MPS is messages per second.
    128K (Baseline)
    MPS
    256K/
    MPS
    % diff with baseline
    512K/ MPS
    % diff with baseline
    768K/ MPS
    % diff with baseline
    1M/ MPS
    % diff with baseline
    C100
    3.45
    3.1
    10.14%
    2.93
    15.07%
    2.82
    18.26%
    2.75
    20.29%
    C150
    5.25
    4.72
    10.10%
    4.4
    16.19%
    4.4
    16.19%
    4.27
    18.67%
    C160
    12.5
    11.1
    11.20%
    10.4
    16.80%
    9.99
    20.08%
    9.79
    21.68%
    C300
    4.42
    4.08
    7.69%
    3.87
    12.44%
    3.74
    15.38%
    3.67
    16.97%
    C350
    11.8
    10.5
    11.02%
    9.94
    15.76%
    9.55
    19.07%
    9.39
    20.42%
    C360
    30
    27
    10.00%
    25
    16.67%
    24
    20.00%
    24
    20.00%
    C370
    29
    26
    10.34%
    23
    20.69%
    22
    24.14%
    22
    24.14%
    C600
    8.8
    7.86
    10.68%
    7.46
    15.23%
    7.17
    18.52%
    7.06
    19.77%
    C650
    25
    22
    12.00%
    20
    20.00%
    19
    24.00%
    19
    24.00%
    C660
    43
    38
    11.63%
    35
    18.60%
    33
    23.26%
    33
    23.26%
    X1000
    11.3
    10.1
    10.62%
    9.61
    14.96%
    9.27
    17.96%
    9.12
    19.29%
    X1050
    45
    40
    11.11%
    37
    17.78%
    35
    22.22%
    35
    22.22%
    X1060
    51
    45
    11.76%
    41
    19.61%
    40
    21.57%
    39
    23.53%
    X1070
    59
    52
    11.86%
    48
    18.64%
    46
    22.03%
    45
    23.73%
    Recommendation and Performance measure:
    The Cisco IronPort Security Applications Group recommends that all customers review their current stability and performance (see below for some tips on how to measure this) to determine if they can safely raise the maximum scan size for messages sent to IPAS (IronPort Anti-Spam Engine).  It is also recommend that you take a phased approach to the increase.  If maximum scan size for IPAS on your E-mail Security Appliance is currently set to 128K (131072), then first raise the maximum scan size to 256K (262144) and re-evaluate your stability and performance.  If everything is stable then increase the scan size limit to 512K (524288).
    Performance of an E-mail Security Appliance depends on the set of features enabled on the appliance such as anti-spam, anti-virus, message filters and content filters along with the load of the appliance based on the no. of msgs/sec scanned and maximum size of a message allowed.
    The most effective way to monitor system capacity is to track overall volume, messages in the work queue and incidents of Resource Conservation Mode. The System Capacity page under Monitor > System Capacity provides a detailed representation of the system load, including messages in the work queue, average time spent in the work queue, incoming and outgoing messages (volume, size, and number), overall CPU usage, CPU usage by function, and memory page swapping information.
    The System Capacity - system load report shows the overall CPU usage on your IronPort appliance. AsyncOS is optimized to use idle CPU resources to improve message throughput. High CPU usage may not indicate a system capacity problem. If the high CPU usage is coupled with consistent, high-volume memory page swapping, you may have a capacity problem.
    This page also shows a graph that displays the amount of CPU used by different functions, including mail processing, spam and virus engines, reporting, and quarantines. The CPU-by-function graph is a good indicator of which areas of the product use the most resources on your system. If you need to optimize your appliance, this graph can help you determine which functions may need to be tuned or disabled. The memory page swapping graph shows how frequently the system must page to disk.
    If stability and performance does drop below acceptable limits, you might try a smaller increase.  Any amount greater than the current setting will help efficacy and reduce missed spam.  For instance, if 512K proves to be too much of a burden on your E-mail Security Appliance you might try a value of 384K (393216).
    Hope this helps!
    -Robert
    (*If you have received the answer to your original question, and found this helpful/correct - please mark the question as answered, and be sure to leave a rating to reflect!)

Maybe you are looking for