What is an e -mail bomb?
e-mail or e-mail, abbreviation for e-mail is a software system developed from a system that originated at the age of 60. The e-mail is used to send, store, receive and transmit text messages-A often annex-in computer network based on packets. Several conditions for specific approaches to e -mail have received metaphorical nicknames. Two of them are e -mail blast and e -mail bomb Although these two terms are similarly evoke an image of the explosion, in fact it actually differs somewhat.
E -mail explosion simply refers to a very large amount of e -mail sent at once. E -mail explosion can be either spam or completely legitimate activity, depending on the circumstances. If the e-mail sends e-mail to users who have decided to be on the list of addressees, or otherwise break the Canspam law (control of the attack of non-provided pornography and marketing) from 2003, the e-mail explosion will be considered spam. If e -mail is a very large number ofE -mail users whose addresses have legitimately acquired and, for example, offer coupon or information about the upcoming sales, can be perfectly legitimate explosion. On the other hand, the e -mail bomb - despite a similar name - has no legitimate use.
Email bomb is a type of attack of Denial-of Service (DOS). DOS attack is an attempt to destroy a person or organization's approach to a specific source or service. It can be focused on a stunning network, interrupt communication between the user and the server, to try to disrupt the overall service of a targeted person or organization, or try to prevent a person or organization from entering a specific service. E -mail bomb is an example of a final type, aimed specifically on the deterioration of a person or organization.
There are two overall types of e -mail bombs. In the first type of e -mail bombs is a person or organization bombed a hugeThe number of e -mails sent to the appropriate e -mail address, which the system amazes. In the second type of e -mail bombs called e -mail bombing subscription E -Mail targets are added to a large number of list lists that are selected because they send more messages daily. The bombing of the e -mails can also affect those that are out of the target due to sufficient operation. If the source of e -mail bombs can be determined, the router can be configured to block the attack, and one should contact Internet service providers (ISP) at least.