| < Day Day Up > |
|
Raca, Joseph, 239
Radio Frequency Identification (RFID), 346–349
random data
detecting with noise filters, 205–213
gibberish, 361
in “Mort gageQuotes” spam example, 292
numbers, 115, 177, 178
role in sending spam, 197–201
words, 113–115, 123, 305–312
Razor, spam-hashing application, 160–161, 170
RBLs. See real-time black hole lists (RBLs)
Re, using in spam message subject line, 100, 306
real-time black hole lists (RBLs)
attacking, 189–191
compromised mail server example, 31
as Exchange 2003 feature, 384–387
host and network-based filtering, 157–161
insecure proxy server example, 22
list of providers, 385–387
overview, 102, 384
Spam Assassin use, 170
testing random hosts, 157
refresh tags, HTML, 107, 123
registration, domain, 81–83, 281
relay ACLs, 157
relays, e-mail, 36–39
rendered HTML pages, 191–195
reply addresses
legitimate-looking, 175–176
top spoofed domains, 338–340
reselling pornography, 18–21
revenue, 130–132
RFID (Radio Frequency Identification), 346–349
rich text (RTF), 105
rot-13 encoding, 180
routers, 64, 65
RPC-based Messenger spam, 50–53
RTF (rich text format), 105
rule-based spam filters
as method of spam detection, 161–170
tips for defeating, 171–201
| < Day Day Up > |
|