Inside the SPAM Cartel: By Spammer-X

 < Day Day Up > 


R

Raca, Joseph, 239

Radio Frequency Identification (RFID), 346–349

random data

detecting with noise filters, 205–213

gibberish, 361

in “Mort gageQuotes” spam example, 292

numbers, 115, 177, 178

role in sending spam, 197–201

words, 113–115, 123, 305–312

Razor, spam-hashing application, 160–161, 170

RBLs. See real-time black hole lists (RBLs)

Re, using in spam message subject line, 100, 306

real-time black hole lists (RBLs)

attacking, 189–191

compromised mail server example, 31

as Exchange 2003 feature, 384–387

host and network-based filtering, 157–161

insecure proxy server example, 22

list of providers, 385–387

overview, 102, 384

Spam Assassin use, 170

testing random hosts, 157

refresh tags, HTML, 107, 123

registration, domain, 81–83, 281

relay ACLs, 157

relays, e-mail, 36–39

rendered HTML pages, 191–195

reply addresses

legitimate-looking, 175–176

top spoofed domains, 338–340

reselling pornography, 18–21

revenue, 130–132

RFID (Radio Frequency Identification), 346–349

rich text (RTF), 105

rot-13 encoding, 180

routers, 64, 65

RPC-based Messenger spam, 50–53

RTF (rich text format), 105

rule-based spam filters

as method of spam detection, 161–170

tips for defeating, 171–201


 < Day Day Up > 

Категории