These servers can be classified as open relay or open proxy servers and are freely accessible for spreading spam. They also penetrate poorly configured servers and use them for their spamming activities. One of the methods adopted by spammers is direct mailing from rented servers. This includes servers or even personal computers. In the second stage of spamming, platforms that would facilitate the mailing of spam are identified and put into use. spammers also gather e-mail ids from websites, chat rooms and other forums. In spoofing, spammers use random combination of words to speculate the e-mail address of an Internet user. spammers use different techniques to obtain e-mail addresses of Internet users, the common method being spoofing. Very often the addresses obtained are classified into various target groups. The first step in spamming involves collecting and verifying recipient e-mail addresses. The methods they employ keep changing from time to time but the processes involved in spamming remains much the same. Spammers try relentlessly to find ways and means of surpassing spam filters.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |