What is the bombing of the e -mail?
E -mail bombing is a form of attacking a service rejection that floods the delivery mail and mail server with messages. If enough messages are sent, the systems can be overloaded and stop working. Many Internet service providers (ISP) consider bombing E -mail as a violation of the service conditions and suspend the accounts of people involved in these attacks.
There are several ways to coordinate the attack on e -mail. One is to send a large number of e -mails directly, often using multiple accounts. The spread of e -mails over many accounts also makes it difficult to assign an attack source and will not discard an ISP that marks a high volume of e -mail from one account. The virus can be written on the kidnapping of email accounts that other people hold and use them to bomb the target. E -mail bombers can also use tactics such as e -mail addresses on the Format website that is easy to pick up robots in the hope that the target will be deligted in spam. However, spam can be filtered and held separately so with withEznam of the list bombers the attractive option because communication from e -mail lists is usually sent directly to the delivery mail.
Using E -mail verification for lists of postal shipments is designed to prevent abuse registration, but the bombing of E -mail may include solutions. For example, a bomber can create a new e -mail address to register, click on the link in the confirmation e -mail, and then set the account to hand over the target. The goal will receive communication from the list of addressees and will not be able to log out because e -mail is not sent directly through the organization.
This type of attack can be low inconvenience, but can also become a serious problem. If the bombing of e -mail is focused on professional or work e -mail, someone may not have access to the e -mails for work. If the server is overloaded or the delivery mail is full, they may be rejectedUTY legitimate e -maly sent to the destination and the goal will not be able to send e -maly. It can also become a security problem if e -mail bombing includes e -mail with built -in viruses, malware or spyware and the sender will happen to open them.
There are a number of techniques that can be used to solve e -mail bombing. It will help you maintain more e -mail addresses for different activities. Protection on the server may include temporary suspension of accounts that seem to be the goal of e -mail bombs while the situation is solved.