10 tips in 10 minutes: Phishing exposed

A must read for programmers and administrators responsible for system security, this collection of 10 tips from Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks of the trade that phishers and spammers use and how to fight back.

A must read for programmers and administrators responsible for system security, this collection of 10 tips from...

Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks of the trade that phishers and spammers use and how to fight back.

To begin, you'll discover how the e-mail delivery process works, including how phishers and spammers take advantage of weaknesses in SMTP design to manipulate and forge e-mail headers and settings. You'll also explore how phishers and spammers use open relays and proxy servers to cover their tracks, and tools and techniques they use to harvest e-mail addresses, bypass spam filters and send bulk mail to your users.


10 tips in 10 minutes: Phishing exposed

 Home: Introduction
 Tip 1: E-mail basics
 Tip 2: Mail delivery process
 Tip 3: Anonymous e-mail
 Tip 4: Forging headers
 Tip 5: Open relays and proxy servers
 Tip 6: Proxy chaining, onion routing, and mixnets
 Tip 7: Harvesting e-mail addresses
 Tip 8: Hackers and insiders
 Tip 9: Sending spam
 Tip 10: The anti-antispam


This chapter excerpt from Phishing Exposed, Lance James, is printed with permission from Syngress Publishing, Copyright 2005. Click here for the chapter download.

Dig Deeper on Phishing and Email Fraud Protection

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close