| < Day Day Up > |
|
backorifice, 41
baiting scammers, 242–254
bandwidth, 324–327
bank accounts, phishing for, 231–238
Base64 encoding, 180–184
Bayes, Thomas, 168, 215
Bayesian filters
how to beat, 215–220
overview, 166–167
and random noise detection, 209, 213
role in filtering spam, 166–169
Spam Assassin use, 170
Berkeley Internet Name domain (BIND), 223
BGP (Border Gateway Protocol), 40, 64–68
blackboxhosting.com, 40
blacklists. See also real-time black hole lists (RBLs)
defined, 165
Spam Assassin use, 170
vs. whitelists, 165
blank e-mail, 358
Border Gateway Protocol (BGP), 40, 64–68
Botnets
for hosting content, 116
in perfect spam example, 313, 314, 318
for sending spam, 41–47
bounty hunters, 274
Britain, spam in, 273
brute force, 87–94
bulk mailing lists
purchasing, 83–86
targeted, 85
bulletproofhosting.com, 116
business, spam as, 14–16. See also corporations
Business Software Alliance (BSA), 128
| < Day Day Up > |
|