Chapter 6: Unwilling accomplices
In Chapter 5: Would the real sender please stand up?
, you saw how attackers can easily spoof their e-mail addresses and give the appearance that an e-mail is from someone else. However, the e-mail headers tell the true tale if you know where to look.
In this chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, you'll see how a misconfigured e-mail server can take away the advantage of header information. If an e-mail server is vulnerable to a relay attack, the e-mail really comes from the vulnerable server and is not just spoofed.
By hiding behind innocent people, spammers take on less risk, and the innocents pay the price. In this chapter, you'll learn how to protect yourself from being used as an unwilling pawn in a spammer's attack.
Click here to download this free book chapter.
This was first published in July 2004
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.