Chapter Download: Would the real sender please stand up?

This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers can use to impersonate other users or mask their identities, and how you can detect these spoofs.

This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers can use to impersonate other users or mask their identities, and how you can detect these spoofs.

In addition, you'll learn about some of the problems that can crop up when you use certain common techniques to combat e-mail impersonation.

For some people, the cure can be worse than the disease. So this chapter covers ways you can deal with this problem in a fashion appropriate for your e-mail usage patterns.

Click here to download this free book chapter.

This was last published in April 2005

Dig Deeper on Spam and virus protection

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close