| < Day Day Up > |
|
hackers, relationship to spammers, 72–76
harvesting
data from responses to spam, 107–110
e-mail addresses, 76–86
hash-based spam filters, 171–201, 318
hash databases, 159–161, 170
headers, fake, 184–189
HELO command
creativity in selecting host addresses, 88–89, 152, 175
in “Mort gageQuotes” example, 295
overview, 88–89
in perfect spam example, 314
in random word example, 309
in sexual performance enhancer example, 303, 304
hexadecimal encoding, 180, 235
hijacking Web pages, 119–124
holidays, 343
home directories, 118
host-based spam filtering
as method of spam detection, 151–161
tips for evading, 171–174
hosting spam content
legal liability, 282–283
overview, 115–118
using HTML injection and hijacking techniques, 119–124
Hotmail.com, 92–94
HTML (Hypertext Markup Language)
hiding messages, 192
hijacking Web pages, 119–124
injection techniques, 119–124
in perfect spam example, 314, 315, 318
vs. plaintext, 103–104
pros and cons, 105
refresh tags, 107, 123
rogue content, 119–124
sample spam e-mail message, 105–107
in sexual enhancement spam example, 299
and spam filter evasion techniques, 191–197
| < Day Day Up > |
|