Everything you didn't want to know about spam

Gibbs, Mark
April 1999
Network World;04/05/99, Vol. 16 Issue 14, p30
Trade Publication
Examines how the Simple Mail Transfer Protocol (SMTP) computer network protocol relaying makes it difficult to detect spamming. Functions of SMTP as the sending side of e-mail; Mechanism in which SMTP processes e-mail.


Related Articles

  • Opinions! Steele, John; Frost, Michael; Flanagan, William; Geary, Kevin // Network World;11/29/2004, Vol. 21 Issue 48, p40 

    Presents letters to the editors published in the November 29, 2004 issue of "Network World." "By a Whisker," that examines the presence of zinc whiskers in data centers; "Pursuing Other Options," which comments on the implementation of Window XP's TCP/IP; "Stop Spam at the Source," that explores...

  • IS E-MAIL A FRIEND OR FOE OF E-BUSINESS? Tinnirello, Paul C. // eWeek;11/06/2000, Vol. 17 Issue 45, p84 

    Suggests technological solutions to curb unwanted e-mails or spams. Improvement in protocols used to classify e-mail as it is sent and received; Authentication of e-mail senders; Parsing of relevant content with a key encryption method.

  • New Bits.  // Network World;7/5/2004, Vol. 21 Issue 27, p6 

    Reports on developments in the computer industry in the U.S. as of July 2004. Warning given by voice over Internet protocol (VoIP) management vendor Qovia regarding the inevitable arrival of audio spam that clogs VoIP customers' voice mailboxes; Role of Microsoft's Hotmail service customers in...

  • SPIT on VoIP. Anderberg, Ken // Communications News;Jan2005, Vol. 42 Issue 1, p4 

    This article discusses the spam over Internet telephony (SPIT). SPIT is one of the challenges organizations will face as they migrate toward converged voice and data networks. There are others, such as ensuring voice quality over a data network and maintaining call availability, but SPIT is sure...

  • News in Brief.  // IEEE Internet Computing;Jul/Aug2002, Vol. 6 Issue 4, p10 

    Presents news briefs concerning the Internet industry as of July 2002. Decision of the European Parliament to approve a directive that calls for an opt-in system in an effort to protect the public from unsolicited commercial pitches; Plans of NTT DoCoMo for offering an i-mode service in Taiwan...

  • Aladdin rubs out content-based threats. Sturdevant, Cameron // eWeek;8/11/2003, Vol. 20 Issue 32, p62 

    Aladdin Knowledge Systems Ltd.'s eSafe 4 is a security tool for managing content-based threats that are carried in HTTP or FTP traffic. eSafe 4, which shipped in June and is priced at $18,600 per 1,000 users, is a nice compromise between fast, highly secure appliances such as those available...

  • Internet spam from industrial networks? It's possible.  // Machine Design;8/21/2008, Vol. 80 Issue 16, p38 

    The article discusses the possibilities of the prevalence of Internet spams through industrial networks in the U.S. According to the author, the use of file transfer protocol (FTP) format can hide the characteristics and location of the attacker as well and increase its vulnerabilities and...

  • MOBILE CLIENTS VULNERABLE TO VIRUS, SPAM ATTACKS. Kobielus, James // Network World;07/03/2000, Vol. 17 Issue 27, p45 

    Comments on the impact of mobile-phone virus attacks on the Wireless Application Protocol market. Virus-driven spam attack on Spain-based Timofonica; Deprivation of data and voice services; Vulnerability of wireless electronic mail clients; Need to incorporate mail antivirus and other...

  • Countering Unsolicited Calls in the Internet Telephony: An anti-SPIT Architecture. Stamatiou, Panos; Gritzalis, Dimitris // Hellenic Open University Journal of Informatics;2009, Vol. 2 Issue 1, p49 

    Internet Telephony (Voice over Internet Protocol, VoIP), a telephony service which is based in packet transmission through IP networks, is becoming increasingly popular. Besides the obvious advantages of VoIP technology, in terms of cost reduction, user portability, and sophisticated end-user...

  • Ameritrade leaks and more Wi-Fi theft. Gibbs, Mark // Network World;6/4/2007, Vol. 24 Issue 22, p42 

    The article shares the author's insights regarding the issues about stock spam and unauthorized Wi-Fi access. According to him, a client of TD Ameritrade Art Medlar has encountered a stock-pumping spam. Medlar has asserted that he never used any web site except where he entered on the profile...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics