The principle and prevention method of e-mail bomb attack

Source: Internet
Author: User
Keywords Attacks emails bombs
The free world of the internet has led some people with ulterior motives to use network flaws to attack netizens. One of the most common means of attack today is the "mail Bomb", which is one of the most noticeable areas of our personal users in cyber security. What is the mail bomb, what is its harm, know how to deal with the e-mail bombs, to avoid the "plot" of illegal users? The answer to these questions, I believe that after reading this article, must be very clear. The concept of mail bombs talking about "bombs", the mind will soon appear a war scene, and the so-called e-mail bombs, the damage is the same as the bomb, but is electronic, mail bombs specifically, refers to the sender of the mail, using special e-mail software, In a short period of time, the mail was sent to the same recipient, and the Inbox was certainly overwhelmed by tens of millions of large-capacity letters, which eventually exploded. We tend to confuse the mail bomb with the spaming, which is actually different. Spaming refers to the sender to send the same e-mail to thousands of different users (or to newsgroups) at the same time, mainly the way some companies advertise their products, a way that does not usually cause much harm to the recipient. Mail bomb damage mail bombs can be said to be the current network of the most "popular" a prank, and the special program used to make mischief is also known as e-mail bomber. A good person can launch an attack by doing something that makes a good person dissatisfied. This attack not only interferes with the normal use of the user's e-mail system, it can also affect the security of the server system where the mail system resides, causing the whole network to be paralyzed, so the mail bomb has great harm. Mail bombs can consume a lot of network resources, often resulting in network traffic jams, so that a large number of users can not work properly. Typically, the capacity of a network user's mailbox is limited, and in a limited space, if users receive thousands of emails in a short time, the total volume of e-mail after a bombing of a mail bomb can easily overwhelm the user's limited position. So that the user's mailbox will not have extra space to accept new mail, then the new mail will be lost or returned, and the user's mailbox has been lost; In addition, the bulk of the information that the mail bombs carry on the network, it is easy to plug the bandwidth is not rich transmission channel, This can increase the workload of the server and slow down the processing of other users ' emails, resulting in a delay in the entire process. Measures to prevent bomb attacks after the "bomb" attack, the first move may be to those who are bored to express extreme indignation, but also want to "give a good dose", so that these "villains" also taste "shot" taste, So the aggrieved person may think of the reply and the function of the letter in the email to "replay" the whole bomb to the sender. andAnd these crafty "villains" may think that their actions will be reviled. Retaliation, in order to avoid the "fatal", these people have already been ready to retreat, they put the e-mail sender and the recipient's two address bar are replaced by the attacker's e-mail address, if you want to revenge their words, your "return" Not only do actions not succeed, but they also make you "take your own foot" and make your email "worse", and the e-mail you send will return to you endlessly. The responsible editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 give force (0 votes) to be tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) The original text: Email bomb attack principle and prevention method returns to the column Recycle Bin homepage
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.