Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: How Spam Works
Figure 2.1: The Reseller Main Page (This Picture has been Edited to Protect the Real Site)
Figure 2.2: Dark Mailer in Action: Watch that Spam Fly
Figure 2.3: The Results of 10,000 Spam After 12 Hours
Figure 2.4: 24 Hours Later
Figure 2.5: 72 Hours Later: The Final Statistics
Chapter 3: Sending Spam
Figure 3.1: Proxy Servers
Figure 3.2: My Favorite Proxy Resource Site
Figure 3.3: A Chain of Proxy Servers
Figure 3.4: A Small Botnet Located on an IRC Network (Note the Cryptic Usernames of Each Zombie)
Figure 3.5: ICQ's Spam Prevention
Figure 3.6: Everywhere You Look, There It Is
Figure 3.7: Net Send on a Large Scale
Figure 3.8: The Spam Arrives
Figure 3.9: CGI Injection Example #2
Chapter 4: Your E-mail: Digital Gold
Figure 4.1: Opt-in list
Figure 4.2: Jungshik and AmirBehzad: Fancy Some Viagra?
Figure 4.3: NNTP Message Example
Figure 4.4: Newsgroup Harvesting in Action
Figure 4.5: whois Extractor in Action
Figure 4.6: 1st E-mail Address Harvester
Figure 4.7: Verified and Ready for Spam
Figure 4.8: Corporate Spammers
Chapter 5: Creating the Message and Getting It Read
Figure 5.1: Yes, Yes, I Wish I Was There
Figure 5.2: Hmm, What Sorry? An Example of Poorly Constructed Spam
Figure 5.3: More Pills
Figure 5.4: The Making of aewxin qoekflg oepwe 19272 Jane Shaw
Figure 5.5: An upload.cgi Just Asking to Host My Content
Figure 5.6: Attention All Offers: There is a Hijacking in Progress in Chapter 5
Figure 5.7: The Final Product
Chapter 6: Getting Paid as a Spammer
Figure 6.1: An ePassporte Card
Figure 6.2: Neteller Debit Card
Chapter 7: Spam Filters: Detection and Evasion
Figure 7.1: Sample Architecture of How a Message Checksum Database Works
Figure 7.2: SpamArrest in Action
Figure 7.3: The Rendered Page: Clean and Readable
Figure 7.4: HTML Character Obfuscation – Rendered Version
Chapter 9: Phishing and Scam Spam
Figure 9.1: Calling All Citibank Users
Figure 9.2: Help Me and My Poor Money
Figure 9.3: The Passport of Our Scammer
Chapter 10: Spam and the Law
Figure 10.1: A Misleading “Phar-macy” Message
Figure 10.2: A Fully Compliant Message
Chapter 11: Analyzing Spam
Figure 11.1: The Message
Figure 11.2: Past Statistics of 24.42.xx.xxx
Figure 11.3: RBL Checking in Dark Mailer
Figure 11.4: The Composed Message
Chapter 13: Statistics of Spam
Figure 13.1: Top Spam-Sending Countries
Figure 13.2: Types of Spam Sent
Figure 13.3: Top Spoofed Spam Domains
Figure 13.4: Spam Trends
Figure 13.5: Yearly Spam Trends
Appendix A: Combating Spam with Exchange Server and Outlook
Figure A.1: Outlook 2003 Options Screen
Figure A.2: Junk E-Mail Filter Warning
Figure A.3: Junk E-Mail Options
Figure A.4: Safe Senders List
Figure A.5: Safe Recipients List
Figure A.6: Blocked Senders List
Figure A.7: The Security Options Tab
Figure A.8: Automatic Picture Download Settings
Figure A.9: The Exchange System Manager
Figure A.10: The Connection Filtering Tab
Figure A.11: Connection Filtering Rule
Figure A.12: Return Status Code
Figure A.13: An SMTP Address Exception List
Figure A.14: The Global Accept List
Figure A.15: The Global Deny List
Figure A.16: Filtering Rule Warning
Figure A.17: Default SMTP Virtual Server in System Manager
Figure A.18: Properties of Default SMTP Virtual Server
Figure A.19: Advanced Properties
Figure A.20: Identification
Figure A.21: The Recipient Filtering Tab
Figure A.22: The Sender Filtering Tab
< Day Day Up >
Previous page
Table of content
Next page
Inside the SPAM Cartel: By Spammer-X
ISBN: 1932266860
EAN: 2147483647
Year: 2004
Pages: 79
Authors:
Spammer-X
,
Jeffrey Posluns (Editor)
,
Stu Sjouwerman (Foreword)
BUY ON AMAZON
FileMaker Pro 8: The Missing Manual
Editing Whats in Your Fields
The Importance of the Layout
Sorting Records
Printing
Extended Privileges
Java How to Program (6th Edition) (How to Program (Deitel))
Introduction
Case Study: Card Shuffling and Dealing Simulation
Internet and Web Resources
Generics and Inheritance: Notes
Reading a File on a Web Server
Introduction to 80x86 Assembly Language and Computer Architecture
Procedures
Bit Manipulation
Floating-Point Arithmetic
Input/Output
Appendix C MASM 6.11 Reserved Words
Junos Cookbook (Cookbooks (OReilly))
Including the Facility and Severity in Messages
Introduction
Setting an IP Address for the Router
Configuring an Interface Description
Load-Balancing Traffic Flows
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Voice of the Customer (VOC)
Variation Analysis
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Expense Accounting and Earned Value
Quantitative Time Management
Special Topics in Quantitative Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies