O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

E-Mail Virus Protection Handbook

Book Description

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.

The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

  • Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher
  • Focuses on specific safeguards and solutions that are readily available to users

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. solutions@syngress.com
  5. Copyright
  6. Acknowledgments
  7. From Global Knowledge
  8. Contributors
  9. Technical Editor
  10. Technical Reviewer
  11. Introduction
  12. Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers
    1. Introduction
    2. Essential Concepts
    3. Overview of E-mail Clients and Servers
    4. When Are Security Problems Introduced?
    5. History of E-mail Attacks
    6. Viruses
    7. Worms
    8. Trojans
    9. Illicit Servers
    10. E-mail Bombing
    11. Sniffing Attacks
    12. Spamming and Security
    13. Common Authoring Languages
    14. Protecting Your E-mail
    15. Summary
  13. Chapter 2: Securing Outlook 2000
    1. Introduction
    2. Common Targets, Exploits, and Weaknesses
    3. Security Updates
    4. Enabling Filtering
    5. Mail Settings and Options
    6. Summary
  14. Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3
    1. Introduction
    2. Outlook Express for Windows
    3. Outlook Express for Macintosh
    4. Eudora for Windows and Macintosh
    5. Enabling PGP for both Outlook Express and Eudora
    6. Summary
  15. Chapter 4: Web-based Mail Issues
    1. Introduction
    2. Why Is Web-based E-mail So Popular?
    3. The Cost of Convenience
    4. Solving the Problem
    5. Summary
  16. Chapter 5: Client-Side Anti-Virus Applications
    1. Introduction
    2. Summary
  17. Chapter 6: Mobile Code Protection
    1. Introduction
    2. Mobile Code
    3. Java
    4. JavaScript
    5. ActiveX
    6. VBScript
    7. Summary
  18. Chapter 7: Personal Firewalls
    1. Introduction
    2. What Is a Personal Firewall?
    3. Network Ice BlackICE Defender 2.1
    4. Aladdin Networks’ eSafe, Version 2.2
    5. Norton Personal Firewall 2000 2.0
    6. ZoneAlarm 2.1
    7. Summary
  19. Chapter 8: Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services
    1. Introduction
    2. Updating the Operating System
    3. Disabling Unnecessary Services and Ports
    4. Locking Down Ports
    5. Maintenance Issues
    6. Firewall Placement
    7. Summary
  20. Chapter 9: Microsoft Exchange Server 5.5
    1. Introduction
    2. Exchange Maintenance
    3. Third-party Add-ons
    4. Summary
  21. Chapter 10: Sendmail and IMAP Security
    1. Introduction
    2. Sendmail and Security: A Contradiction in Terms?
    3. Internet Message Access Protocol (IMAP)
    4. Recovery
    5. Summary
  22. Chapter 11: Deploying Server-side E-mail Content Filters and Scanners
    1. Introduction
    2. Overview of Content Filtering
    3. Overview of Attachment Scanning
    4. McAfee GroupShield
    5. Trend Micro ScanMail for Exchange Server
    6. Content Technologies’ MAILsweeper for Exchange 5.5
    7. Firewall and E-mail Content Scanning
    8. Attack Detection and System Scanning
    9. Summary
  23. Appendix: Secrets
  24. Index