TITLE

Mail Relaying

PUB. DATE
March 2007
SOURCE
Network Dictionary;2007, p299
SOURCE TYPE
Book
DOC. TYPE
Reference Entry
ABSTRACT
A definition of the term "Mail Relaying" used in relation to computer security is presented. It refers to a method used by spammers for sending junk mail. They use other people's machines to relay the emails in order to disguise the source. Therefore, the machines sending the messages are not the actual email senders.
ACCESSION #
31667768

 

Related Articles

  • Running Mail Through a Gauntlet. Harbaugh, Logan G. // InfoWorld;5/29/2006, Vol. 28 Issue 22, p40 

    The article talks about the need for e-mail security. It involves much more than anti-spasm or anti-virus filtering. Firms also face the threat of losing corporate secrets or intellectual property through e-mail. E-mail security appliances including the IronPort C-Series and the Mirapoint...

  • SLAMMING SPAM . . . AND MORE. A. C. K., Amanda C. // Entrepreneur;Apr2004, Vol. 32 Issue 4, p35 

    One can get anti-spam, antivirus, URL blocking, electronic mail security and malicious-code defense all in one convenient package with Computer Associates' eTrust Secure Content manager. Prices start from $55 per user, volume pricing is also available. An integrated solution like this one can...

  • 'Certified e-mail' plans draw mixed reactions. Fontana, John // Network World;2/13/2006, Vol. 23 Issue 6, p19 

    The article examines mixed reactions toward certified electronic (e)-mail plans. In an effort to restore confidence in e-mail systems, companies such as certification vendor Goodmail Systems and a start-up working behind the Web address Karma sphere.com, are planning to introduce authorization,...

  • Socializing with 8,000 friends a day. Musthaler, Linda // Network World;3/17/2008, Vol. 25 Issue 11, p22 

    The article reports on the problems taking place in some of the information technology (IT) applications and services, including electronic mail messages (e-mail) and instant messaging. According to the author, some of the people do not use such applications anymore because of the increasing...

  • Take Control Of E-mail. Appleman, Jack E. // OfficePro;Jan/Feb2012, Vol. 72 Issue 1, p32 

    The article provides information on how to mitigate e-mail. It cites research which claims that employees spend about 75 days a year doing e-mail, most of which is unproductive. It suggests avoiding sending spam mail to many colleagues and simply using the reply to me only option, being able to...

  • ENSURING DELIVERY OF ASSOCIATION E-MAILS. Bonney, Chris // Association Management;Sep2005, Vol. 57 Issue 9, p20 

    Offers tips on how to make electronic mail less susceptible to bogus filtering in the U.S. Need to keep the subject line very simple; Inclusion of an unsubscribe option at the bottom of electronic mail text; Use of an electronic mail delivery system with alternative text option.

  • Things We Hate About E-mail. Adubato, Steve // njbiz;10/4/2004, Vol. 17 Issue 40, p14 

    Answers several questions about the negative aspects of e-mail. Biggest mistakes people make with e-mail; Characterization of a spam mail; Disadvantage of using slang.

  • DATABIT.  // BizEd;Jul/Aug2005, Vol. 4 Issue 5, p54 

    Reports on the approval of the implementation of CAN-SPAM Act by the U.S. Congress, with the intention to reducing the amount of unwanted junk electronic mail.

  • Snare Spammers in Tarpit. Mimoso, Michael S. // Information Security;Jul2006, Vol. 9 Issue 7, p15 

    The article focuses on the practice of coding in small delays called tarpitting which can slow down the transmission of bulk e-mail messages that can reduce the flow of unsolicited e-mail messages. Several strategies adopted by spammers to maintain the viability of their trade are cited....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics