Article

10 tips in 10 minutes: Phishing exposed

Staff

A must read for programmers and administrators responsible for system security, this collection of 10 tips from Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks of the trade that phishers and spammers use and how to fight back.

To begin, you'll discover how the e-mail delivery process works, including how phishers and spammers take advantage of weaknesses in SMTP design to manipulate and forge e-mail headers and settings. You'll also explore how phishers and spammers use open relays and proxy servers to cover their tracks, and tools and techniques they use to harvest e-mail addresses, bypass spam filters and send bulk mail to your users.

    Requires Free Membership to View


10 tips in 10 minutes: Phishing exposed

 Home: Introduction
 Tip 1: E-mail basics
 Tip 2: Mail delivery process
 Tip 3: Anonymous e-mail
 Tip 4: Forging headers
 Tip 5: Open relays and proxy servers
 Tip 6: Proxy chaining, onion routing, and mixnets
 Tip 7: Harvesting e-mail addresses
 Tip 8: Hackers and insiders
 Tip 9: Sending spam
 Tip 10: The anti-antispam


This chapter excerpt from Phishing Exposed, Lance James, is printed with permission from Syngress Publishing, Copyright 2005. Click here for the chapter download.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: