Chapter 5: Would the real sender please stand up?

This chapter from Canning Spam, by Jeremy Poteet, describes techniques attackers use to impersonate users or mask their identities, and how to detect these spoofs.

This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers can use to impersonate other users or mask their identities, and how you can detect these spoofs.

In addition, you'll learn about some of the problems that can crop up when you use certain common techniques to combat e-mail impersonation. For some people, the cure can be worse than the disease. So this chapter covers ways you can deal with this problem in a fashion appropriate for your e-mail usage patterns.

Click here to download this free book chapter.

Dig Deeper on Lotus Notes Domino Antispam Software and Spam Filtering

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

SearchContentManagement

Close