What is an e -mail bomb?

e-mail or e-mail, abbreviation for e-mail is a software system developed from a system that originated at the age of 60. The e-mail is used to send, store, receive and transmit text messages-A often annex-in computer network based on packets. Several conditions for specific approaches to e -mail have received metaphorical nicknames. Two of them are e -mail blast and e -mail bomb Although these two terms are similarly evoke an image of the explosion, in fact it actually differs somewhat.

E -mail explosion simply refers to a very large amount of e -mail sent at once. E -mail explosion can be either spam or completely legitimate activity, depending on the circumstances. If the e-mail sends e-mail to users who have decided to be on the list of addressees, or otherwise break the Canspam law (control of the attack of non-provided pornography and marketing) from 2003, the e-mail explosion will be considered spam. If e -mail is a very large number ofE -mail users whose addresses have legitimately acquired and, for example, offer coupon or information about the upcoming sales, can be perfectly legitimate explosion. On the other hand, the e -mail bomb - despite a similar name - has no legitimate use.

Email bomb is a type of attack of Denial-of Service (DOS). DOS attack is an attempt to destroy a person or organization's approach to a specific source or service. It can be focused on a stunning network, interrupt communication between the user and the server, to try to disrupt the overall service of a targeted person or organization, or try to prevent a person or organization from entering a specific service. E -mail bomb is an example of a final type, aimed specifically on the deterioration of a person or organization.

There are two overall types of e -mail bombs. In the first type of e -mail bombs is a person or organization bombed a hugeThe number of e -mails sent to the appropriate e -mail address, which the system amazes. In the second type of e -mail bombs called e -mail bombing subscription E -Mail targets are added to a large number of list lists that are selected because they send more messages daily. The bombing of the e -mails can also affect those that are out of the target due to sufficient operation. If the source of e -mail bombs can be determined, the router can be configured to block the attack, and one should contact Internet service providers (ISP) at least.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?