January 2005
Security: Solutions for Enterprise Security Leaders;Jan2005, Vol. 42 Issue 1, p28
Trade Publication
The article discusses security from computer spams and viruses. Richmond, Virginia Based Circuit City Stores Inc. operates more than 600 Superstores and five mall-based stores in the U.S. Like many major companies, Circuit City was experiencing an ever-increasing amount of spam directed at its corporate e-mail users. In evaluating alternative anti-spam solutions, the company decided to give antispam and anti-virus managed services. The trial was very successful at eliminating spam from employee inboxes. The greatest benefits from the service stemmed from its ability to prevent directory harvest attacks (DHA). DHAs are designed to net spammers' lists of valid e-mail addresses at specific companies, to which they can then send additional spam or sell to other spammers.


Related Articles

  • Is spam a threat and how can I block it?  // Computer Weekly;9/16/2003, p62 

    Spam is the biggest consumer of unnecessary bandwidth on the Internet. There is a risk that users receiving huge amounts of unsolicited e-mail may become even more complacent than they are at the moment. Social engineers thrive on end-user complacency and worm outbreaks such as "I Love You" and...

  • Squash the Creepy Web Crawlers. Pelletier, Sue // Insurance Conference Planner;Nov/Dec2003, Vol. 39 Issue 6, p26 

    Presents suggestions from Corbin Ball of Corbin Ball Associates on protecting personal computers and e-mail. Tips on dealing with spam; Information on how spammers send spams to several e-mail adresses; Computer viruses that affect computers.

  • E-mail Authentication Aims to Kill Spam. Emerson, Jim // Direct;9/15/2004, Vol. 16 Issue 12, p38 

    Discuses the compliance of several e-mail security service companies with the Sender ID e-mail authentification specifications of Microsoft Corp. as of September 2004. Functions of Sender ID; Factors needed to solve the epidemic of unsolicited electronic mail messages.

  • CAUGHT IN THE CROSSFIRE. Neuborne, Ellen // Inc.;Aug2003, Vol. 25 Issue 8, p37 

    Reports that several legitimate e-mail marketing messages have been blocked by anti-spam filters in the U.S., as of 2003. Percentage of legitimate, permission-based e-mail which have been blocked by spam filters; Impact of the block on small companies which rely on e-mail marketing; Decision of...

  • Spam Patterns in 2006 and Predictions for '07. Margolis, Daniel // Certification Magazine;May2007, Vol. 9 Issue 5, p8 

    The article provides an overview of the results of an annual intelligence report on spam activity in the U.S. in 2006, released by MessageLabs. According to the author, the report revealed that the average spam level for the year accounted to 86.2 percent of electronic mail, or e-mail traffic....

  • Sender Policy Framework.  // Network Dictionary;2007, p431 

    A definition of the term "Sender Policy Framework" (SPF) is presented. It refers to an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby, discouraging spam mailers from practicing e-mail spoofing. SPF and other anti-spoofing...

  • Make spammers pay. Allman, Eric // eWeek;11/10/2003, Vol. 20 Issue 45, p55 

    The article discusses Internet security and the threat of spam. Even e-mail marketers agree that it could make the e-mail medium effectively useless. The main problem with spam is economic: sending a message is nearly free, but receiving it costs money in the form of network bandwidth, disk...

  • The Spam Stops Here. D.J. // Working Mother;May2000, p30 

    Answers queries about spam. How to keep email inbox junk free; Ending unsolicited email messages.

  • Spam 102. Oriez, Charles // Information Executive;Jan2000, Vol. 4 Issue 1, p3 

    Presents tactics on how to prevent customers from spamming electronic mail messages. Responsibility of the internet service providers; Basics of complaining about spam; The spam fighting tools.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics