What Is Email Bombing?
Email bombs are one of the oldest anonymous attacks. By setting up a machine to send a large number of emails to the same address continuously, the attacker can exhaust the bandwidth of the recipient's network. Because this attack method is simple and easy to use, there are also many tools for sending anonymous emails, and as long as the other party knows your email address, they can attack, so this is the most worthy defense method for everyone.
- When it comes to "bombs", everyone will immediately have a kind of
- The email bomb can be said to be
- EmailKiller
- EmailKiller is relatively troublesome in similar email bombs. It can add the target mailbox address to be attacked in the "Target mailbox" option, but the length of each sent email is limited (depending on the capacity of the target mailbox), and the number of threads depends on the Internet speed. In "Set Letter Content", you can edit the title and content of the sent letter. When sending the letter, it will be filled out with garbled characters and sent automatically. For other options, you can select the SMTP sending server address and fill in the sender's mailbox address. It should be noted that the filled out server must be the same address as the sending server used by the sender's mailbox. Fill in, you can also take the default value.
- MailBomb
- MailBomb is also a relatively common email bomb tool. It can not only send anonymous letters, but also add attachments to the letters to be sent. When using this tool, first fill in the destination address, a known sending server, and then your own mailbox address (usually all fake). However, the server of the sender's mailbox must be consistent with the added server to send successfully. The content of the email can be freely edited, the "ADD" option can be added to the attachment to be sent, and the number of sending can be customized. There are many more options in the "more" option, including: you can set the address of the auto reply message, the subject of the auto reply letter, display the sender's name and other functions. After adding the above options, just change the subject back and forth when sending related emails and press "Send" to launch the attack.
- Red guest messenger
- Red guest messenger can realize mass mailing, and it is a kind of mail bomb for "troubled". Fill in the address of the target mailbox in the mailbox blacklist, press the "+" sign to add the address to be sent to the list, and press the "-" sign to clear the target mailbox in the list. Sending mails with Red Messenger, you can use the default options without adding content. Red Messenger will send some letters like greetings to the target mailbox. If the message sent by Red Messenger is opened, it will occupy the target system source until it crashes. .
- Hard bomb
- Hard disk bombs specifically destroy hard disk data and cause damage to the other party, and can also prevent the target hard disk from booting.
- Jiang Min Bomb
- This is a very dangerous hard disk bomb. After running, it will lock the hard disk head to a certain position in the boot area, causing pseudo-physical damage to the hard disk, causing various systems above DOS 3.3 to fail to start normally.
- The computer will search the order of all logical disks when booting the DOS system. When DOS is booted, it must first find the partition table information of the main boot sector-the OBEH address of the first sector located on the zero and zero cylinders of the hard disk. Where to start-When the starting position of the partition information is 80H, it indicates the primary boot partition, and the rest are extended partitions. The primary boot partition is defined as the logical drive C and the logical drive of the extended partition is defined as the D drive. By analogy, E, F, G ... Jiangmin bomb was started here, modified the normal master boot partition record, pointed the first logical disk of the extended partition to itself, and after DOS found the first logical disk at startup I always find myself by looking for the next logical disk, so an endless loop is formed. This is why the floppy drive, optical drive, and dual hard disks cannot start normally. In fact, the Jiang Min bomb only made use of a small flaw in the DOS startup, which made many people helpless. Knowing the "locking" principle of Jiangmin bombs, it is easier to unlock. If the method of "hot plugging" hard disk power is used to handle: when the system is started, do not plug the power cord into the locked hard disk, wait for the boot to complete, and then "hot plug" the hard disk. At this time, if If the hard disk is not burned out, the system can control the hard disk. This is a very dangerous method. Do not try it easily.
- HDBreaker (Hard Disk Terminator)
- This is an extremely nasty hard disk bomb program. It is a Win32PE program because it uses
- When we are attacked by the "bomb", the first move may be to express extreme indignation towards those who are bored. At the same time, we also want to "treat their bodies with their own ways", so that these "evil ones" can also try The taste of "hitting", so some angry people may think of using the reply and transfer function in e-mail to "play back" the entire bomb to the sender. However, these cunning "evil men" may think that their actions will be scolded and retaliated. In order to avoid the "scourge of death", these people are already preparing for their retreat. They send the sender and the recipient of the email Each address bar has been changed to the email address of the attacked person. If you want to retaliate against them, your "reward" operation will not only be unsuccessful, but they will also make you "lift yourself and hit yourself" To make your mailbox even worse, the emails you send will be returned to you indefinitely.
- Since there is no way to retaliate against these "evil men," we might as well try to prevent these saboteurs from attacking them so that they can take advantage of them. Since the bombers of the saboteurs can be launched anytime, anywhere, this requires that the "anti-missile" defense system we adopt must be able to intercept anytime, anywhere. In order to ensure the complete completion of the interception task, the author recommends several "battle plans" for your reference [3] :
- ISP for help
- Once you find that your mailbox has been bombed, but you have no good way to deal with it, what you should do at this time is to pick up the phone to ask your ISP service provider for Internet access, and say to them one by one. They will take measures to help you clear the E-mail Bomb. When you ask for help, it's best not to email them because it can take a long time to wait! During the waiting period, your Internet speed is more or less affected by the aftermath of these "bombs".
- The default mail system of the Windows system is Outlook, and some people use domestic software such as Foxmail. On the surface, the software's email management methods are somewhat different, but in fact, they are stored in the default path of the software installation, that is, all emails are placed in the same directory. In this way, over time, a large number of accumulated mails not only bring inconvenience to find and manage mails, but also risk of confusion and loss of mails.
- why would you said this
- First, all files are stored in the same directory, which can only be distinguished by file name and user name. However, the headers of many emails are almost the same or even the same, especially many people like to use some popular names, such as: Peter, Jenny, etc. as nicknames. When the emails from two friends with the same nickname are mixed together, the problem arises. It is also very difficult to slowly turn the screen to find a bunch of emails. Even if you use the Find tool, you may get a long list of similar results.
- Second, software management emails are sorted by the date and time of the email. There are many reasons why the marked date of the email you received is wrong-for example, the sender may use some kind of date-limited tool software. You have to fix the date to the year xxxx. Another example is that some people modify their system time because they evade viruses; all these are not the same. If you receive such business information, but you delete it as you think it is old, isn't there a danger of losing data?
- Third, the default path is usually the C drive, which is even more dangerous. Because the C drive is the most frequently attacked by viruses, and many new users of the computer never change the system's default options (when you want to change it, you will not change it). The default file storage path of Microsoft Outlook series and many tools is C drive. Novices usually don't change them. If they are lucky, they will work normally. However, once a system crash caused by a virus, hacking, or misoperation occurs, the email is finished. At that time, I want to cry without tears!
- Fourth, this way of storing emails causes inconvenience to backup emails. Because the path is a deep, complex-named directory tree, it is difficult for users to use the Explorer to enter the directory with normal operations and then copy the mail. For example: In the Windows 98 environment, Outlook's mail storage directory is: C: WINDOWS Application DataIdentitiesMicrosoft Outlook Express Inbox.dbx. Not to mention backup, it's dazzling to look at this string of characters. Although you can use the "Export" function that comes with the software for backup, a fatal weakness of the export function is version incompatibility. When you use other mail management software, or you upgrade to a new version of the original mail management software , The problem may come-when you import again, the inbox is completely blank or some messages are missing-this version does not recognize your import format! I have seen similar problems in many forums and e-magazines of software usage guides, and many people have lost care of many years of data because of the careless use of the import / export function without reserve.
- Adopt filter function
- Installing a filter (such as E-mail notify) in your email software is the most effective precaution. Check the sender's profile before receiving any emails. If you find something suspicious, you can delete it and prevent it from entering your mail system. However, this approach sometimes deletes some useful messages by mistake. If you are worried about someone maliciously destroying your mailbox and sending you a "blockbuster", you can enable filtering in your mail software and set your mail server to automatically delete large messages that exceed your mailbox capacity .
- Forwarding function
- Some mail servers often have an "automatic transfer" function in order to improve the quality of service. Using this function can solve the attack of large-capacity mail to a certain extent. Suppose you have applied for a forwarding mailbox. Using the forwarding function and filtering function of the mailbox, you can filter out all the undesired emails, delete them in the mail server, or transfer spam emails to your other free emails. Or simply abandon the bombed mailbox and apply for a new one.
- Use automatic reply with caution
- The so-called "automatic reply" means that the other party sends a letter to your mailbox and you do not collect it in time. The mail system will automatically reply to the sender a confirmation letter according to your preset settings. This feature originally brought convenience to everyone, but it may also be made into a mail bomb! Imagine if the email account system used by the person who sent you the letter also enabled the automatic reply function, then when you receive a letter from him If it is not collected in time, your system will automatically send him a confirmation letter. Coincidentally, he did not receive the letter in time during this time, so his system will automatically send you a letter confirming the receipt. In this way, this automatic confirmation letter will be sent repeatedly in your system until the mailboxes of both of you are burst!
- How to save mail
- From the analysis above, it can be seen that the default method of managing emails with stacked data is based on the unmodifiable nature of the tool softwareusers cannot adjust and categorize emails in a timely manner, resulting in a series of adverse consequences. Therefore, it is necessary to create another directory and save the mail.
- First, you need to create a directory in the partition other than C to store mail. Then, to create enough subdirectories under this directory, I recommend using a clear name for the directory name, for example: Create the following EMAIL directory on the D drive:
- D: MAIL game
- D: MAIL computer skills
- D: MAIL stock market
- D: MAIL Customer Information
- ...
- For similar names, it is better to put a shortcut on the desktop for future reading. Under these subdirectories, you can create more branches and numbered directories based on the month, and the original subject of the message can be unchanged. In this way, you receive the latest emails in your default inbox Inbox every day. After you read them, you can save the emails you receive by category and date under these branches. The entire email management looks organized and clear However, you can search by time and number without using the Windows "Find" function. In addition, all emails are stored in a common format and are numbered. It is much more convenient to read and process them in another email management software. When you want to delete some expired emails, or put the entire email directory Backup compression is also a breeze.
- I use this method to manage emails. Since all emails have been saved separately, there are only a few newest emails in the inbox every day. It is easy to manage after saving the emails and then deleting and restoring them blank. You wo nt delete a letter by mistake because of the date, or search through a large number of files because of the similar user name or subject of the email. The more emails you have, the more necessary it is to use this method. Of course, the method stated above is suitable for a single user on a single machine to store received mail. If it is a machine shared by multiple people or to manage the mail that has been sent by himself, this method needs to be appropriately changed.
- Deal with special tools
- If your mailbox is unfortunately "hit" and you still want to use this mailbox name, you can use some mail tool software such as PoP-It to remove these spam messages. These removal software can log in to the mail server and use the commands in it to delete unwanted mail and keep useful letters.