Chapter Download: Would the real sender please stand up?

This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers can use to impersonate other users or mask their identities, and how you can detect these spoofs.

This chapter from the book Canning Spam: You've Got Mail (That You Don't Want), by Jeremy Poteet, describes some simple techniques attackers can use to impersonate other users or mask their identities, and how you can detect these spoofs.

In addition, you'll learn about some of the problems that can crop up when you use certain common techniques to combat e-mail impersonation.

For some people, the cure can be worse than the disease. So this chapter covers ways you can deal with this problem in a fashion appropriate for your e-mail usage patterns.

Click here to download this free book chapter.

This was last published in April 2005

Dig Deeper on Exchange Server setup and troubleshooting

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close