Transmission of Unsolicited E-mails with Hidden Sender Identity
Terminal communication systems are often confronted with undesired e-mails, which reach their destination, while cloaking the real sender. Thus, in order to develop appropriate security software, it is necessary to know how to write identity-concealing software. This paper seeks to describe how the identity of undesired e-mail senders can be hidden. The final aim of the work is to detect adequate means of defense against unwanted e-mails, by generating, in the future, strong security (or filtering) algorithms and methodologies, adapted to diverse situations.
KeywordsUnsolicited e-mails Terminal communications Security algorithms
Unable to display preview. Download preview PDF.
- 1.Popescu, M.C., Mastorakis, N.: New Aspect on Wireless Communication Networks. International Journal of Communications 3(1), 34–43 (2009) ISSN:1998-4480, http://www.naun.org/multimedia/NAUN/communications/19-225.pdf Google Scholar
- 2.***, Manual de utilizare PHP, http://php.net/manual/en/function.mail.php
- 4.Zdziarski Jonathan, A.: Ending spam: Bayesian content filtering and the art of statistical language classification. No Starch Press, San Francisco (2005)Google Scholar
- 5.Migga, K.J.: Computer network security. Springer, New York (2005)Google Scholar
- 6.Bajanescu, T.: Comunicatii prin satelit. Ed. Matrix ROM, Bucuresti (2003)Google Scholar
- 7.Resnick P.: Request for comment, http://tools.ietf.org/html/rfc5322
- 8.Hudson, P.: Practical PHP Programming, http://www.tuxradar.com/practicalphp
- 9.Achour, M., et al.: PHP Manual, http://www.php.net/manual/en/index.php