answersLogoWhite

0


Best Answer

configure to only receive messages from its own domain

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What security measure protects your SMTP server from being used as an open relay by spammers?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Communications

What is the purpose of using an exchange server spam filter?

An exchange server spam filter protects mailboxes from spam with collective intelligence protection. Exchange server spam filters are high effective and help administrators who need more control over protection.


What is an ssl encryption and how will it help my business?

SSL encryption is a means of transferring web data from server to pages over a secure connection. Web security experts Symantec have more information on general internet security, passwords, and encryption.


Which is the the best and affordable dedicated server hosting in India?

I found Go4hosting and Dialwebhosting is the best and affordable dedicated server hosting in India because it provides fastest speed, multiple domain creation, increased security.


How do you get spam on your Email?

From mailing lists. Spammers regularily attempt to get the lists of subscribers to mailing lists [some mail servers will give those upon request], knowing that the email addresses are unmunged and that only a few of the addresses are invalid. When mail servers are configured to refuse such requests, another trick might be used - spammers might send an email to the mailing list with the headers Return-Receipt-To: <email address> or X-Confirm-Reading-To: <email address>. Those headers would cause some mail transfer agents and reading programs to send email back to the <email address> saying that the email was delivered to / read at a given email address, divulging it to spammers. A different technique used by spammers is to request a mailing lists server to give him the list of all mailing lists it carries (an option implemented by some mailing list servers for the convenience of legitimate users), and then send the spam to the mailing list's address, leaving the server to do the hard work of forwarding a copy to each subscribed email address. [I know spammers use this trick from bad experience - some spammer used this trick on the list server of the company for which I work, easily covering most of the employees, including employees working well under a month and whose email addresses would be hard to find in other ways.] From web pages. Spammers have programs which spider through web pages, looking for email addresses, e.g. email addresses contained in mailto: HTML tags [those you can click on and get a mail window opened] Some spammers even target their mail based on web pages. I've discovered a web page of mine appeared in Yahoo as some spammer harvested email addresses from each new page appearing in Yahoo and sent me a spam regarding that web page. A widely used technique to fight this technique is the 'poison' CGI script. The script creates a page with several bogus email addresses and a link to itself. Spammers' software visiting the page would harvest the bogus email addresses and follow up the link, entering an infinite loop polluting their lists with bogus email addresses. From various web and paper forms. Some sites request various details via forms, e.g. guest books & registrations forms. Spammers can get email addresses from those either because the form becomes available on the world wide web, or because the site sells / gives the emails list to others. Some companies would sell / give email lists filled in on paper forms, e.g. organizers of conventions would make a list of participants' email addresses, and sell it when it's no longer needed. Some spammers would actually type E-mail addresses from printed material, e.g. professional directories & conference proceedings. Domain name registration forms are a favourite as well - addresses are most usually correct and updated, and people read the emails sent to them expecting important messages.


What is the purpose of a name server?

A name, or DNS (Domain Name Server) server is a server that responds to requests to convert domain names and address types to and from IP addresses.

Related questions

What is the term proxy server's meaning?

A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.


What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


Which server is mainly used for the security?

database server


What has the author Chip Andrews written?

Chip Andrews has written: 'SQL server security' -- subject(s): Computer security, SQL server


3 differences between a desktop OS and a server OS?

1.With server OS we can manage desktop OS. Server Os is higher version of Desktop OS. 2.server OS gives centralised administration for users shared resources higher security. But Desktop OS gives local machine administration only. 3.Server OS is fully covered & managed security. For (ex) Domain Controller application server print server etc. We make server with security. for Desktop OS Normal PC. We make low level security.


Which AF system security instruction contains security requirements for the web server?

Network & Computer security


Where are some good resources to read up on SQL server security?

The following are good resources to read up on SQL server security Technet, Aws Amazon, and Dba Stackexchange. In brief SQL server securities are physical network security,and disaster recovery.


A company has a web server that must be accessible to both external and internal clients Which security policy best practice should be followed to maximize security of the server?

Configure a firewall device to serve as the web server.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


What is client server security threat?

bharat choudhary


Why is the web server informations are hidden in webpages?

Server information needs to be hidden to protect the security of the site.


How do you ensure network security?

To ensure network security, you have to install protective software and have firewalls on your server.