Index_C

 < Day Day Up > 



B

backorifice, 41

baiting scammers, 242–254

bandwidth, 324–327

bank accounts, phishing for, 231–238

Base64 encoding, 180–184

Bayes, Thomas, 168, 215

Bayesian filters

how to beat, 215–220

overview, 166–167

and random noise detection, 209, 213

role in filtering spam, 166–169

Spam Assassin use, 170

Berkeley Internet Name domain (BIND), 223

BGP (Border Gateway Protocol), 40, 64–68

blackboxhosting.com, 40

blacklists. See also real-time black hole lists (RBLs)

defined, 165

Spam Assassin use, 170

vs. whitelists, 165

blank e-mail, 358

Border Gateway Protocol (BGP), 40, 64–68

Botnets

for hosting content, 116

in perfect spam example, 313, 314, 318

for sending spam, 41–47

bounty hunters, 274

Britain, spam in, 273

brute force, 87–94

bulk mailing lists

purchasing, 83–86

targeted, 85

bulletproofhosting.com, 116

business, spam as, 14–16. See also corporations

Business Software Alliance (BSA), 128



 < Day Day Up > 



Inside the SPAM Cartel(c) Trade Secrets From the Dark Side
Inside the SPAM Cartel: By Spammer-X
ISBN: 1932266860
EAN: 2147483647
Year: 2004
Pages: 79

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net