Chapter Download: Unwilling accomplices

If an e-mail server is vulnerable to a relay attack, the e-mail really comes from the vulnerable server and is not just spoofed. Learn how to protect yourself from being used as an unwilling pawn in a spammer's attack.

In Chapter 5: Would the real sender please stand up?, you saw how attackers can easily spoof their e-mail addresses and give the appearance that an e-mail is from someone else. However, the e-mail headers tell the true tale if you know where to look.

In "Chapter 6: Unwilling accomplices" from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, you'll see how a misconfigured e-mail server can take away the advantage of header information. If an e-mail server is vulnerable to a relay attack, the e-mail really comes from the vulnerable server and is not just spoofed.

By hiding behind innocent people, spammers take on less risk, and the innocents pay the price. In this chapter, you'll learn how to protect yourself from being used as an unwilling pawn in a spammer's attack.

Click here to download this free book chapter.

This was last published in April 2005

Dig Deeper on Spam and virus protection

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close