IBM AH0QXML User Guide - Page 17
spammer can create. They can deliberately send empty attachments, bad, headers, looping addresses
![]() |
View all IBM AH0QXML manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
Mail trying to entice you to visit certain sites, often pornographic, or of very questionable nature. - Mail of this nature is often directly to the point. "Wanna see more of me? Click here." or "I can't believe it, you have to see this! Click here." This type of spam is often paid for by the site in question. Advertising rates for big commercial sites are very high, for the simple reason that a great many people will see them. - If an unscrupulous site can demonstrate through an independent source that they have a very large hit rate, they will entice advertisers hoping to sell products or services via their site. The more people who innocently click on the link, the higher the hit counter will soar. Many spammers also take advantage of the fact that HTML mail can contain moving images. For instance, "Click on the Monkey to win $10,000" and when you click on the monkey then you are sent to the site the spammer intended. Malicious mail designed to interrupt regular Internet traffic or flood mailboxes or mail routers. - This last category is the type of spam the average person will be least likely to come across. It consists of malformed messages designed to disrupt mail services, often by attempting to crash SMTP routers. There are an infinite number of possible combinations of mail messages that a spammer can create. They can deliberately send empty attachments, bad headers, looping addresses, incorrect control characters within critical routing fields, or any of a myriad of other things to attempt to cause mail blockages. - Mail routing applications such as Lotus Domino have very robust SMTP defenses in place to avoid and prevent these types of attacks. Defensive code included in the product will reject malformed messages which could have provoked error conditions. Normally, mail needs to conform to a strict standard in order to be accepted. If not, the SMTP router will simply reject it. However, hackers, crackers, and malicious spammers are constantly changing the methods they use to attempt to disrupt services. Inevitably, an unprotected system will eventually fall prey to this type of message. For more information about what constitutes spam, see the publicly available RFCs located here: RFC2505 (http://www.ietf.org/rfc/rfc2505.txt?number=2505) RFC2635 (http://www.ietf.org/rfc/rfc2635.txt?number=2635) Chapter 1. Introduction 5
![](/manual_guide/products/ibm-ah0qxml-user-guide-c7a8df4/17.png)