A must read for programmers and administrators responsible for system security, this collection of 10 tips from...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks of the trade that phishers and spammers use and how to fight back.
To begin, you'll discover how the e-mail delivery process works, including how phishers and spammers take advantage of weaknesses in SMTP design to manipulate and forge e-mail headers and settings. You'll also explore how phishers and spammers use open relays and proxy servers to cover their tracks, and tools and techniques they use to harvest e-mail addresses, bypass spam filters and send bulk mail to your users.
10 tips in 10 minutes: Phishing exposed
Tip 1: E-mail basics
Tip 2: Mail delivery process
Tip 3: Anonymous e-mail
Tip 4: Forging headers
Tip 5: Open relays and proxy servers
Tip 6: Proxy chaining, onion routing, and mixnets
Tip 7: Harvesting e-mail addresses
Tip 8: Hackers and insiders
Tip 9: Sending spam
Tip 10: The anti-antispam
This chapter excerpt from Phishing Exposed, Lance James, is printed with permission from Syngress Publishing, Copyright 2005. Click here for the chapter download.