No credit card required
1 SMTP is the standard protocol for mail transmission over the Internet.
2 Botnets can be used to carry out a plethora of malicious activities; they are discussed in greater detail in Chapter 7.
3 A more detailed exposition on pharming can be found in the text edited by Jakobsson and Myers .
4 A rootkit is a component that uses various stealthing techniques to mask its presence on a machine. Rootkits are discussed in greater detail in Chapter 8.
5 Informally, the attack surface of a system refers to the different mechanisms by which an attacker can attack (and potentially compromise or damage) the system.
* Parts of this chapter appeared in  and parts have been adapted from