+612 9045 4394
 
CHECKOUT
Canning Spam : You've Got Mail (That You Don't Want) - Jeremy Poteet

Canning Spam

You've Got Mail (That You Don't Want)

Paperback Published: 23rd May 2004
ISBN: 9780672326394
Number Of Pages: 256

Share This Book:

Paperback

RRP $69.99
$56.50
19%
OFF
Ships in 7 to 10 business days

We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever happened. Now there is a way to stop the madness! Canning Spam: You've Got Mail (That You Don't Want) is your remedy to inbox clutter and infected computers. Learn how spammers get your e-mail address and how to stop them, how viruses are transmitted through attachments, how spammers can mask their true identity and how to ultimately block unwanted e-mails. Next time you log in to your e-mail account, be happy to hear those three little words: “You've Got Mail!”

Introductionp. 1
Stealing Candy from a Babyp. 5
You Get What You Ask Forp. 6
How the Attack Worksp. 7
An Ounce of Preventionp. 10
A Pound of Curep. 11
Checklistp. 12
Be Careful What You Sayp. 13
How the Attack Worksp. 14
An Ounce of Preventionp. 17
A Pound of Curep. 19
Checklistp. 20
Pick a Number Between 1 and 100p. 21
How the Attack Worksp. 21
An Ounce of Preventionp. 23
A Pound of Curep. 23
Checklistp. 24
Email Addresses: Not Just for Email Anymorep. 25
How the Attack Worksp. 25
An Ounce of Preventionp. 27
A Pound of Curep. 28
Checklistp. 28
With Friends Like Thesep. 29
How the Attack Worksp. 29
An Ounce of Preventionp. 36
A Pound of Curep. 37
Checklistp. 38
Summaryp. 38
Neither Confirm nor Denyp. 39
Do You Know What's in Your Email?p. 42
How the Attack Worksp. 42
An Ounce of Preventionp. 46
A Pound of Curep. 47
Checklistp. 47
Click Here to Get More Spamp. 48
How the Attack Worksp. 48
An Ounce of Preventionp. 49
A Pound of Curep. 49
Checklistp. 50
So You're on Vacationp. 51
How the Attack Worksp. 51
An Ounce of Preventionp. 52
A Pound of Curep. 53
Checklistp. 53
The Shell Gamep. 54
How the Attack Worksp. 54
An Ounce of Preventionp. 54
A Pound of Curep. 55
Checklistp. 55
Indirect Email Accessp. 56
How the Attack Worksp. 57
An Ounce of Preventionp. 59
A Pound of Curep. 60
Checklistp. 60
Summaryp. 61
Bad Things Come in Small Packagesp. 63
The Trusted, the Innocent, and the Seductivep. 64
How the Attack Worksp. 66
An Ounce of Preventionp. 68
A Pound of Curep. 68
Checklistp. 69
All Dressed Up, with Nowhere to Gop. 70
How the Attack Worksp. 71
An Ounce of Preventionp. 73
A Pound of Curep. 74
Checklistp. 75
Not What I Say, But What I Dop. 76
How the Attack Worksp. 76
An Ounce of Preventionp. 78
A Pound of Curep. 78
Checklistp. 79
Beware of Email Bearing Giftsp. 80
How the Attack Worksp. 81
An Ounce of Preventionp. 82
A Pound of Curep. 84
Checklistp. 84
Summaryp. 84
Using Email Clients for Good and Evilp. 87
Your Little Black Bookp. 88
How the Attack Worksp. 88
An Ounce of Preventionp. 89
A Pound of Curep. 90
Checklistp. 91
No Action Requiredp. 92
How the Attack Worksp. 92
An Ounce of Preventionp. 93
A Pound of Curep. 94
Checklistp. 94
One Spark Can Start a Firep. 95
How the Attack Worksp. 95
An Ounce of Preventionp. 96
A Pound of Curep. 97
Checklistp. 99
Avoiding the Epidemicp. 100
How the Attack Worksp. 100
An Ounce of Preventionp. 101
A Pound of Curep. 102
Checklistp. 102
Summaryp. 102
Would the Real Sender Please Stand Up?p. 103
I'm Not Who I Say I Amp. 105
How the Attack Worksp. 108
An Ounce of Preventionp. 110
A Pound of Curep. 114
Checklistp. 114
John Doe Emailingp. 115
How the Attack Worksp. 115
An Ounce of Preventionp. 116
A Pound of Curep. 116
Checklistp. 117
Block Me If You Canp. 118
How the Attack Worksp. 118
An Ounce of Preventionp. 120
A Pound of Curep. 120
Checklistp. 121
Summaryp. 121
Unwilling Accomplicesp. 123
Blocked Because of Relayp. 124
How the Attack Worksp. 124
An Ounce of Preventionp. 125
A Pound of Curep. 126
Checklistp. 126
Knowing Where to Lookp. 127
How the Attack Worksp. 127
An Ounce of Preventionp. 129
A Pound of Curep. 129
Checklistp. 130
The Syndicatep. 131
How the Attack Worksp. 132
An Ounce of Preventionp. 132
A Pound of Curep. 133
Checklistp. 134
Return to Senderp. 135
How the Attack Worksp. 135
An Ounce of Preventionp. 136
A Pound of Curep. 137
Checklistp. 137
Summaryp. 137
Separating the Wheat from the Chaffp. 139
Like a Kid in a Candy Storep. 140
How the Attack Worksp. 140
An Ounce of Preventionp. 142
A Pound of Curep. 143
Checklistp. 144
Configuring Filtersp. 145
How the Attack Worksp. 145
An Ounce of Preventionp. 146
A Pound of Curep. 148
Checklistp. 149
Throwing Out the Baby with the Bath Waterp. 150
How the Attack Worksp. 150
An Ounce of Preventionp. 151
A Pound of Curep. 152
Checklistp. 152
If At First You Don't Succeedp. 153
How the Attack Worksp. 153
An Ounce of Preventionp. 154
A Pound of Curep. 155
Checklistp. 155
Summaryp. 155
Don't Send Us a Postcardp. 157
The Party Linep. 159
How the Attack Worksp. 160
An Ounce of Preventionp. 161
A Pound of Curep. 163
Checklistp. 163
The Keys to the Kingdomp. 164
How the Attack Worksp. 164
An Ounce of Preventionp. 165
A Pound of Curep. 166
Checklistp. 166
It's Your Problem Nowp. 167
How the Attack Worksp. 167
An Ounce of Preventionp. 168
A Pound of Curep. 169
Checklistp. 169
At the Corep. 170
How the Attack Worksp. 171
An Ounce of Preventionp. 171
A Pound of Curep. 172
Checklistp. 172
Summaryp. 173
You've Got Some Email in My Web Sitep. 175
Row-based Securityp. 176
How the Attack Worksp. 176
An Ounce of Preventionp. 178
A Pound of Curep. 179
Checklistp. 180
Cross-site Scriptingp. 181
How the Attack Worksp. 181
An Ounce of Preventionp. 183
A Pound of Curep. 184
Checklistp. 184
SQL Injectionp. 185
How the Attack Worksp. 185
An Ounce of Preventionp. 188
A Pound of Curep. 189
Checklistp. 189
Authentication and Authorization with Cookiesp. 190
How the Attack Worksp. 190
An Ounce of Preventionp. 191
A Pound of Curep. 192
Checklistp. 192
Error Message Reasoningp. 193
How the Attack Worksp. 193
An Ounce of Preventionp. 196
A Pound of Curep. 196
Checklistp. 196
Summaryp. 197
The Bigger They Are, the Harder They Fallp. 199
I'm So Stuffed, I Couldn't Eat Another Thingp. 200
How the Attack Worksp. 201
An Ounce of Preventionp. 201
A Pound of Curep. 202
Checklistp. 202
Line's Busyp. 203
How the Attack Worksp. 203
An Ounce of Preventionp. 204
A Pound of Curep. 204
Checklistp. 204
Open at Your Own Riskp. 205
How the Attack Worksp. 205
An Ounce of Preventionp. 206
A Pound of Curep. 207
Checklistp. 207
Hit You Where It Hurtsp. 208
How the Attack Worksp. 209
An Ounce of Preventionp. 210
A Pound of Curep. 211
Checklistp. 211
Summaryp. 212
Appendixes
Email Protocolsp. 213
POP3p. 213
Authorizationp. 213
Transactionp. 214
Updatep. 214
IMAPp. 214
SMTPp. 215
Text Emailp. 216
MIMEp. 216
Email Toolsp. 219
Antivirusp. 219
Email Programsp. 219
Filtersp. 220
Blacklistsp. 220
Firewallsp. 221
Email Legal Issuesp. 223
General Issuesp. 223
State Lawsp. 223
Federal Laws (CAN-SPAM)p. 224
Indexp. 225
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9780672326394
ISBN-10: 0672326396
Audience: Professional
Format: Paperback
Language: English
Number Of Pages: 256
Published: 23rd May 2004
Publisher: Pearson Education (US)
Country of Publication: US
Dimensions (cm): 22.23 x 15.24  x 1.91
Weight (kg): 0.34