Loading...
Please wait, while we are loading the content...
Similar Documents
Canning Spam: You've Got Mail (That You Don't Want)
| Content Provider | Semantic Scholar |
|---|---|
| Author | Poteet, Jeremy |
| Copyright Year | 2004 |
| Abstract | Introduction. 1. Stealing Candy from a Baby: How Spammers Harvest Email Addresses. 2. Neither Confirm Nor Deny: How Email Attacks Determine that an Email Address is Active. 3. Bad Things Come in Small Packages: How Viruses are Transmitted Through Email Attachments. 4. Using Email Clients for Good and Evil: Guarding Against Script-Based Viruses and Worms. 5. Would the Real Sender Please Stand Up?: How Spammers Spoof Email Identities. 6. Unwilling Accomplices?: How Spammers Mask their Identities using Email Relaying. 7. Separating the Wheat from the Chaff: Using Filters to Block Unwanted Emails. 8. Don't Send us a Postcard: Insuring that your Email is not Sent in the Clear. 9. You've Got Some Email in my Web Site: Using Web-based Email Services Securely. 10. The Bigger they are, the Harder they Fall: Mitigating Denial of Email Services Attacks. Appendix A. Email Protocols. Appendix B. Popular Email Tools. Appendix C. Email Legal Information. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://fireline.store/canning/spam/canning_spam_you_ve_got_mail_that_you_don_t_want_jeremy_poteet.pdf |
| Alternate Webpage(s) | http://mastel.org.uk/canning/spam/canning_spam_you_ve_got_mail_that_you_don_t_want_jeremy_poteet.pdf |
| Alternate Webpage(s) | http://sousou.store/canning/spam/canning_spam_you_ve_got_mail_that_you_don_t_want_jeremy_poteet.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |