Undergraduate
Essay
Miscellaneous
Pages 6 (1506 words)
Download 0
According to Australian legislation about Spam policies, spam has been defined as "unsolicited commercial electronic messaging", embracing email, mobile text messaging (SMS) and some other electronic messaging.1
The methods employed by spammers to exploit the e-mail differentiate…

Introduction

It was not allowed to authenticate users, verify the identity; no guarantee of message privacy or integrity was made. The only way recipients could determine the source of spam was to rely on the "From:" field and "Received:" headers. (Internet Engineering Taskforce, 2001) A sample, taken from Stopping Spam, is shown below:
The "From:" field is the most noticeable way to identify the sender, but it is also a very unpredictable way. It can be easily thought out by the message sender. (Lentczner, 2003) Spammers not often use an address they can be found at in the "From:" field, and usually, the address has either been forged or is the e-mail address of someone else. The "Received:" headers are a more obvious way of disguising spammers. A "Received:" header is added by each host that relays the message from its source to its eventual destination. Each of these headers contains the name and address of a system that relayed the message, as well as the name and address of the system that just passed it the message. Spammers are not abe to prevent intermediary systems from adding these headers while the headers provide only minimal protection because a thorough examination of the "Received:" header will be required to identify the real source of the message.
There are two popular techniques used by spammers to puzzle message recipients: using open relay sites (Yahoo! Anti-Spam Resource Center, 2004) to send mes ...
Download paper
Not exactly what you need?

Related papers

Supply Chain Management An Overview
According to a recent research that has been conducted by Accenture, it has been revealed that optimization of supply chain has become a key component for high performance levels (accenture). It can be noticed that, many retailers even today are not very successful in providing their customers with the right product always. This fact is true despite their huge amount of investments…
Spam Overview
It was not allowed to authenticate users, verify the identity; no guarantee of message privacy or integrity was made. The only way recipients could determine the source of spam was to rely on the "From:" field and "Received:" headers. (Internet Engineering Taskforce, 2001) A sample, taken from Stopping Spam, is shown below:…
Performance and HRD: an overview
These are part of an unending cycle that may be represented as:…
Personal Science Overview
Science has different meanings to it and is vast. Keeping it general and not making it very complex, the things we observe with our ears relates to science; science describes how sound waves strike your eardrum and then the process gets complex. Science describes it all, and if there are answers to our everyday questions, science stands the only capable subject to fulfill the blank answer spaces.…
An overview of Operation Management
The notion includes the process of delivering the services to the customers with the products. With the changing time the aspects covered are increasing, the process now also includes R&D, value creation, marketing management, sales activities, accounting and finance.…
First Amendment Protection for Spam
The concern for spam is however growing all around the globe. Around forty percent of bulk e-mail consuming is posing problem for the internet users along with internet service providers. They complain of having their mailboxes full of annoying e-mails or mails that are offensive. However, a number of users refer spamming to the commercial advertising. 3…
Italian textile industry: An overview
Since then the whole world market has been glutted with the Chinese products.…