What is a postal bomb?
e -mail bomb or simply a postal bomb is an act of harmful net abuse, in which the e -mail account is intentionally flooded with data or messages, which makes the account inaccessible. The account can be down for hours or for days, and may lead to Internet service provider (ISP) that interrupts the victim's victim service. This is because the postal bomb can cause the ISPS post server to collapse, which affects not only the victim but all ISP clients. When the postal server is below, no one who subscribes to this ISP can send or receive e -mail through the provider. This is considered an infantile form of intervening, a simplistic and gross attack that carelessly affects much more people than the perpetrator's goal. There are several methods for sending a postal bomb, an overview here in general. E -mail Accounts is based on a mail server or computers with software designed to send and receive mail. The receiving mail server has allocated space for virtual mailboxesassigned to their clients. For example, ISP may have 100,000 customers and 300,000 mailboxes (many people have more than one e -mail address). It is easy to see that even a relatively small postal server, as shown in the example, can potentially process hundreds of thousands of e -mails every day.
When the postal server becomes flooding mail, available sources of computer are consumed and the system overloads to the fall point. The postal bomb could consist of a single compressed file that decompresses into a very large set filled with recurring data that converts and hangs the system. In other cases, the perpetrator will use the “Botnet” (robotic network) to perform dirty work.
Botnet is a network of inficed computer, secretly under the remote control of the perpetrator. The botnet controller can send one command that reaches all computers in the botnet. These can be hundreds, thousands or even moree than a million computers.
ISP Botnet does not capture the attack because each computer sends only one or two messages. As a result, a targeted e -mail account will receive a potentially millions of e -mails at a time. This may be expensive for the ISP that receives a postal bomb because bringing a postal server back to obtain a legitimate mail when blocking incoming messages from a postal bomb with a botnet can be a difficult task. This type of postal bomb is known as an attack by Distributed Denial of Service (DDOS).
Another method is to use the e -mail addresses of the party to sign up for more lists of e -mails. The list of addressees is a discussion forum that spreads e -mail. One must subscribe to the list to get on it, and sign out the session will stop receiving the list messages. All subscribers will receive all the messages sent to the list. If the list is popular, this can lead to dozens of messages a day. Copy postal bomb occurs when the victim is automatically enrolledShena to hundreds of lists of postal shipments without his knowledge or permission. The victim must then manually unsubscribe from each list or change his e -mail address and close the old account.
Postal bomb is a serious crime and is against the conditions of the service of all providers of Internet services. One way to protect yourself from a postal bomb is to save the e -mail address of your Internet service provider for private use and to provide it only to trusted friends and family. You can use a free web e-mail address to register on the website, participate in web forums or online gaming. If a postal bomb is sent to this address, the site will have to deal with the attack and you can lose your free account. However, you will still have your ISP, your private e -mail address, and you can create a new, free address on another site.