Inside the SPAM Cartel: By Spammer-X / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$42.72
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (15) from $1.99   
  • New (4) from $19.91   
  • Used (11) from $1.99   

Overview

Authored by a former spammer, this is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld.

From the Author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW."

For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. "Inside the SPAM Cartel" offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.

* Spam makes up now 64% of all email sent and it is said to be the most annoying part of being online.

* You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running.

* Authored by a former spammer, this is a methodical, technically explicit expose of the innerworkings of the SPAM economy.

Read More Show Less

Product Details

  • ISBN-13: 9781932266863
  • Publisher: Elsevier Science
  • Publication date: 11/13/2004
  • Edition number: 1
  • Pages: 434
  • Product dimensions: 7.44 (w) x 9.69 (h) x 0.88 (d)

Table of Contents

Who I am and why I SPAM: How SPAM works and Revenue behind it: The art of SPAMMING: Spam and Phishing: Legal Efforts against SPAM: Analyzing SPAM: Statistics behind SPAM: The future of SPAM
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 23, 2004

    The other side of the fence

    First up, let me say that the writing style is a little rough, and the book was not well proof read. But the anonymous author gives a piercing inside look at many aspects of spamming. He explains how there is a specialisation of skills. Some have a product (like fake Viagra) to sell. Others clandestinely acquire lists of email addresses (of you and me). While some actually craft messages to evade the ever-smarter antispam filters used by ISPs and individuals. The author is in the latter group of spammers. He gives a fascinating technical description of his skills. While include finding open relays to inject spam into the Internet. We see how this is a dynamic process, as such relays are often then fingered as spam sources, necessitating their sysadmins to close the openness. There are unsettling insights as to the vulnerability of many web sites to being unwitting open relays. An excellent example is an HTML web page that lets the reader fill a form. If you press the submit button, your browser then sends the data you wrote to an address at that web site. So what? Well, sometimes that address is hardwired into the static web page, as [eg] report@website.com. This lets him write a simple script to mimic the page, but change the recipient to an arbitrary address!! In other words, he can shovel his spam to everyone on his mailing list, while hiding his trail. Complaints from recipients will go to that web site. His method is disquietingly easy to do, for someone of moderate skill. Worse, he shows how to search for such vulnerable pages by using Google to find pages that are likely to be forms. He then goes to the Google results, until he finds those he can use. He claims this often works. Probably so. If you are a sysadmin who is installing or maintaining antispam filters, you should probably get several recent books on those. And I have reviewed many of those. But also get this book. None of those explain the problem from his side of the fence, and explain it this well.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)