Sponsored Content
Full Discussion: spam and protection?
Special Forums Cybersecurity spam and protection? Post 31121 by Neo on Friday 1st of November 2002 12:24:58 PM
Old 11-01-2002
As I understand the poster, he is not talking about relaying (one problem) he is talking about the "Reply-To" field where spammers are using his valid email address in their spam "Reply-To" field.

This is a common technique by spammers and you can't filter on source address or you could block 'the good guys' (people like you receiving spam).

It is like when a spammer sends me email and my email address is in the 'Reply To' field... I certainly don't like blocking me from myself Smilie and the scenarios go on and on. There are many variations of this spam technique.

However, if the email is being bounced, you can easily filter your server to just blackhole all mail from "mailer-daemon" and similar source addresses from bounced mail. You must examine the mail and set up appropriate filters.

You might find this paper of interest:

http://www.silkroad.com/papers/html/bomb/

the paper describes email bombs, countermeasures and filtering basics.

I'm finding programs like Mailwasher more and more useful: www.mailwasher.net but this gem runs only on MS products; so I queue mail on linux and wash with Mailwasher first thing in the morning (like brushing my teeth) or whenever I've been away for a long time; after washing I read with my standard mail user agent. Smilie The developer of Mailwasher is very responsive (Nick) and he has added a couple of features at my request in the past month.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Override protection.....

I am having this problem......when I run this script: print -n "Enter file name to be deleted: " read answer if then rm $name else echo "No such file with the name: $name exists" fi I was trying to test my script for errors, and basically when the user had files with the rights: 400,... (1 Reply)
Discussion started by: Makaveli.2003
1 Replies

2. Filesystems, Disks and Memory

protection schemes

Consider a system that supports 5,000 users. Suppose you want 4,990 of these users to be able to access one file How would you specify this protection scheme in UNIX (4 Replies)
Discussion started by: mattyboy
4 Replies

3. Linux

file security/protection

Hi All I am working on a site to help newbie to learn linux for free. demo.freelinuxconsole.info there is only one file index.php its been able to rename or deleted. Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies

4. Shell Programming and Scripting

Password protection in unix

How to create a file in UNIX which is password protected ? Thanks and Regards, Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies

5. IP Networking

Protection against arp spoofing

Hi, I'm trying to find a way to protect my network against arp spoofing. What it is: An attacker sends fake arp packets in the network, identifying himself as the router. All network traffic is then redirected to this attacker. How to protect myself: In my opinion, the best possible... (2 Replies)
Discussion started by: chrisperry
2 Replies

6. Shell Programming and Scripting

Script protection against changes

Hi everyone, I´m trying to protect the scripts I have made from changes. At my office I´m the one who research improvements on daily tasks, and I´ve done many scripts, that I share with my partners.I´m tired because they take my scripts and make their owns with new features that don´t share... (4 Replies)
Discussion started by: dover07
4 Replies

7. Homework & Coursework Questions

Protection and special characters

I am learning from the class how to protect the special characters and the script that I wrote here does not work when I am trying to pick up a single quote. It would complaint about parentheses problem. Please, someone could enlighten me. Thanks in advance, Scopiop Input file Hi, * ?... (2 Replies)
Discussion started by: scopiop
2 Replies
HMINE(1)																  HMINE(1)

NAME
hmine - a mail message header analyzer. SYNOPSIS
hmine [-vDa] [FILE] hmine -V DESCRIPTION
hmine reads a mail message from FILE or STDIN and outputs a variety of information found in the message headers. The message is expected in Internet mail format (RFC 821,822,2821,2822 or variations thereof). The body is not inspected. EXIT STATUS
On success, hmine returns 1. In case of a problem, hmine returns zero. OPTIONS
-a Print mailboxes and groups found in various header fields, one per line, preceded by the field name. Actual email addresses are always enclosed in '<' and '>' for easy parsing, ie anything not within these delimiters is not part of an email address. Beware that not every line need contain an email address. -D Debug output. -V Print the program version number and exit. USAGE
An invocation looks like this: % hmine email.txt SOURCE
The source code for the latest version of this program is available at the following locations: http://www.lbreyer.com/gpl.html http://dbacl.sourceforge.net BUGS
At present, hmine parses messages but doesn't output anything useful. AUTHOR
Laird A. Breyer <laird@lbreyer.com> SEE ALSO
dbacl(1), mailcross(1), mailfoot(1), mailinspect(1), mailtoe(1), regex(7) Version 1.12 Bayesian Classification Tools HMINE(1)
All times are GMT -4. The time now is 09:01 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy