- Shopping Bag ( 0 items )
From the Author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW."
For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. "Inside the SPAM Cartel" offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.
* Spam makes up now 64% of all email sent and it is said to be the most annoying part of being online.
* You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running.
* Authored by a former spammer, this is a methodical, technically explicit expose of the innerworkings of the SPAM economy.
Posted November 23, 2004
First up, let me say that the writing style is a little rough, and the book was not well proof read. But the anonymous author gives a piercing inside look at many aspects of spamming. He explains how there is a specialisation of skills. Some have a product (like fake Viagra) to sell. Others clandestinely acquire lists of email addresses (of you and me). While some actually craft messages to evade the ever-smarter antispam filters used by ISPs and individuals. The author is in the latter group of spammers. He gives a fascinating technical description of his skills. While include finding open relays to inject spam into the Internet. We see how this is a dynamic process, as such relays are often then fingered as spam sources, necessitating their sysadmins to close the openness. There are unsettling insights as to the vulnerability of many web sites to being unwitting open relays. An excellent example is an HTML web page that lets the reader fill a form. If you press the submit button, your browser then sends the data you wrote to an address at that web site. So what? Well, sometimes that address is hardwired into the static web page, as [eg] email@example.com. This lets him write a simple script to mimic the page, but change the recipient to an arbitrary address!! In other words, he can shovel his spam to everyone on his mailing list, while hiding his trail. Complaints from recipients will go to that web site. His method is disquietingly easy to do, for someone of moderate skill. Worse, he shows how to search for such vulnerable pages by using Google to find pages that are likely to be forms. He then goes to the Google results, until he finds those he can use. He claims this often works. Probably so. If you are a sysadmin who is installing or maintaining antispam filters, you should probably get several recent books on those. And I have reviewed many of those. But also get this book. None of those explain the problem from his side of the fence, and explain it this well.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.