In <[email protected]>,
on 09/20/2012
at 12:21 PM, "McKown, John" <[email protected]> said:
>Spoofing email is rather simple.
FSVO spoofing. It's trivial to generate your own From header field,
but anybody that knows how to read headers can easily tell where it
really came from.
>Now, if somebody is really paying attention, they can detect this by
>looking at all the headers. And it is even possible to get around
>this, if the hacker can connect to the receipt ant's ISP using the
>SMTP port.
They can just as easily connect to the webmail servers HTTP port. That
won't enable them to get through authentication, in either case; they
need to know the password.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
Atid/2 <http://patriot.net/~shmuel>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN