Advertisement

Transmission of Unsolicited E-mails with Hidden Sender Identity

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 195)

Abstract

Terminal communication systems are often confronted with undesired e-mails, which reach their destination, while cloaking the real sender. Thus, in order to develop appropriate security software, it is necessary to know how to write identity-concealing software. This paper seeks to describe how the identity of undesired e-mail senders can be hidden. The final aim of the work is to detect adequate means of defense against unwanted e-mails, by generating, in the future, strong security (or filtering) algorithms and methodologies, adapted to diverse situations.

Keywords

Unsolicited e-mails Terminal communications Security algorithms 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Popescu, M.C., Mastorakis, N.: New Aspect on Wireless Communication Networks. International Journal of Communications 3(1), 34–43 (2009) ISSN:1998-4480, http://www.naun.org/multimedia/NAUN/communications/19-225.pdf Google Scholar
  2. 2.
    ***, Manual de utilizare PHP, http://php.net/manual/en/function.mail.php
  3. 3.
    Sven, G.: Data management and query processing in semantic web databases. Springer, Heidelberg (2011)MATHGoogle Scholar
  4. 4.
    Zdziarski Jonathan, A.: Ending spam: Bayesian content filtering and the art of statistical language classification. No Starch Press, San Francisco (2005)Google Scholar
  5. 5.
    Migga, K.J.: Computer network security. Springer, New York (2005)Google Scholar
  6. 6.
    Bajanescu, T.: Comunicatii prin satelit. Ed. Matrix ROM, Bucuresti (2003)Google Scholar
  7. 7.
    Resnick P.: Request for comment, http://tools.ietf.org/html/rfc5322
  8. 8.
    Hudson, P.: Practical PHP Programming, http://www.tuxradar.com/practicalphp
  9. 9.
    Achour, M., et al.: PHP Manual, http://www.php.net/manual/en/index.php

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Department of Computer Science“Vasile Goldis” Western University of AradAradRomania

Personalised recommendations