Modern Operating Systems
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation with CD-ROM
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation with CD-ROM
Writing Apache Modules with PERL and C
Writing Apache Modules with PERL and C
PERL in a Nutshell
Security Warrior
Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
Inside the spam cartel
Hi-index | 0.00 |
Unsolicited commercial email (UCE, spam), scam and phishing emails make up for more than 90% of all emails sent world-wide. Most anti spam methods known rely on filtering emails. Meanwhile, even web browsers check URLs against blacklists to avoid fraud. However, all those methods are reactive, ergo they are only able to deal with known attack patterns. A preventive approach is to stop spammers from collecting mail addresses with their harvesters. Beside obfuscation of email addresses, HTTP tar pits have proven their efficiency in catching harvesters. This paper presents a method to use HTTP tar pits to identify harvesters and how to use this knowledge to dynamically block their access to regular web pages.