404 Compliant
404 Compliant Website that has been terminated for spamming. Refers to a Page not found error (404 error).
back to top
Abuse Desk
The department at an ISP which is responsible for handling and acting on net abuse complaints.
back to top
Address Harvester
Specialised browsing software that examines sources of online information for anything that might provide a valid email address.
back to top
Anonymizer Proxy
Service set up to prevent websites from obtaining information such as your e-mail address or your current IP address from your browser.
back to top
APNIC
Asia-Pacific Network Information Center. APNIC registers and maintains the registration information for domains in Asia, Australia, etc.
back to top
ARIN
American Registry of Internet Numbers.
back to top
AUP Acceptable Use Policy
Part of an ISP’s contract with its customers that usually defines what is considered net abuse. AUPs state which activities are allowable and which activities may get your account terminated.
back to top
Auto-Ack
Response from an Autoresponder
back to top
Autoresponder
Program which automatically responds to mail. Commonly used by abuse desks to acknowledge spam complaints.
back to top
Backbone
Primary provider of infrastructure such as trunk lines, dial-ups and cabling for the Internet. The “backbone” providers are the ultimate upstream providers.
back to top
Bandwidth
A measure of data transfer proportional to the amount of data transferred in a given time. Most common measurements seen by users are bits per second (bps). Larger, more complex files require more bandwidth.
back to top
Bayesian Filtering
Bayesian spam filters use a statistical theory developed by English philosopher Thomas Bayes. They calculate the probability of a message being spam, based both on its content and on past results, to separate genuine emails from spam.
back to top
BCC: Field
Blind Carbon Copy field in an e-mail that is normally not visible to the recipients. Used by spammers to conceal their mailing lists.
back to top
Bit Bucket
Electronic trash can for mail servers.
back to top
Black Hat
ISP that is non-responsive to spam complaints.
back to top
Blacklist (or Block List)
A list of outside email addresses not allowed to send messages to the email server.
back to top
Bot
Program used to perform a repetitive task automatically. Most common bots are designed to monitor IRC channels and search webpages or newsgroups for e-mail addresses.
back to top
Bounce
Rejection of mail from the receiving e-mail server.
back to top
CAUCE
Coalition Against Unsolicited E-mail.
back to top
Dejanews
Usenet news posting and archival service. Now known as Deja.com
back to top
Dev/Null
From the UNIX “null device.” Colloquialism for deleting mail (especially to abuse desks) without reading it. See bit bucket.
back to top
DIG (Domain Internet Groper)
Advanced DNS tool that returns all of the available Resource Records for a given domain or host.
back to top
DNS Domain Name System
Locations on the Internet are identified by IP addresses. Allows users to type in domain names by translating domain names into the IP addresses.
back to top
Domain Name
Canonical (simple or registered) name of a given IP address.
back to top
DoS Attack Denial of Service Attacks
Attack on an individual or server that is aimed at preventing normal use of the net. DoS attacks include mailbombing, smurf attacks, etc.
back to top
Drop Box
E-mail address used by a spammer to gather responses to spam.
back to top
Email Header
Every email message consists of two parts, the body and the header. The header can be thought of as the envelope of the message, containing the address of the sender, the recipient, the subject and other information. The body contains the actual text and the attachments. Some header information usually displayed by your email program includes:
- From: – The sender’s name and email address.
- To: – The recipient’s name and email address..
- Date: – The date when the message was sent. .
- Subject: – The subject line.
back to top
Filter
Program which can be configured to allow only data meeting certain criteria to pass.
back to top
Firewall
Security program or programs that protect the system or network from unauthorized use or access.
back to top
Greylist
A list of email addresses that have attempted to send messages, and have been sent a reply asking them for information to confirm that their email is not spam.
back to top
Harvesting
The act of gathering e-mail addresses from newsgroups or websites, usually through the use of a bot.
back to top
IP Spoofing
Forging an IP address of a trusted server into the packets of information sent to a server in place of the real IP address. Because the IP address appears to be that of an authorized sender, the receiving server will act on commands it receives.
back to top
LART
Valuable anti-spammer weapon. Stands for Luser Attitude Readjustment Tool – tool of choice is often a clue-by-four.
back to top
Listwashing
The process of removing email addresses from a mailing list at the request of individuals. This leaves a clean list of people who do not mind receiving messages. This may require the cooperation of ISPs to forward email complaints to companies.
back to top
Mailbombing
Sending a large quantity of e-mail to an address in an attempt to prevent legitimate mail to get through. A form of DoS attack.
back to top
Mailing List
Organized group of users, which have agreed to receive regular mailings on a particular subject. Most legitimate mailing lists will require the subscriber to confirm by responding to an initial e-mail.
back to top
MAPS
Mail Abuse Prevention System
back to top
MX Record
Short for mail exchange record, an entry in a domain name database that identifies the mail server that is responsible for handling e-mails for that domain name. When more than one MX record is entered for any single domain name that is using more than one mail server, the MX record can be prioritized with a preference number that indicates the order in which the mail servers should be used. This enables the use of primary and backup mail servers.
back to top
Open Relay
An email server processing mail where sender and receiver are not local users. Such servers are often open to attack, and are sometimes seized by hackers who use them to send large amounts of spam. An Open Relay Mail Server allows mail to be forwarded from the originating server through it to the destination server.
back to top
Opt-in
Procedure by which users must make a request to be on a mailing list.
back to top
Opt-out
Procedure by which users must make a request not to be on a mailing list.
back to top
ORBS
Open Relay Behaviour-Modification System. Database which tracks SMTP mail servers which permit third party relaying of e-mail. Confirmation that the relay has been used by spammers is not required, making ORBS somewhat controversial. Database can be used as a filter to prevent a mail server from receiving mail from a listed domain.
back to top
POP
Point of Presence. Point of access to the Internet. Commonly associated with modem banks used for dial-up access to an ISP.
back to top
Port
Location for connection to a device. Ports may be physcial, such as a parallel port or logical.
back to top
Port 25
Logical port associated with an SMTP mail server.
back to top
RBL
Realtime Blackhole List. Filtering system that prevents ISPs from receiving mail from listed IP addresses.
back to top
rDNS
Reverse Domain Name System. Provides the domain name for a given IP address.
back to top
Redlist
List of email addresses not contributing to the whitelist, and who are not considered local, even if email is received locally.
back to top
Relay
Forward e-mail through a mail server.
back to top
Relay Check
To test a server to determine if it allows third party relaying
back to top
RIPE
Regional Internet Registry for Europe and surrounding areas.
back to top
Rogue
An Internet Service Provider (ISP) that does not enforce its Terms of Serice Agreement or AUP.
back to top
RRSS
Radparker Relay Spam Stopper – is a list of open email relays which have been used to send spam. Database can be used as a filter to prevent a mail server from receiving mail from a listed domain.
back to top
Spam
Terms that refers to the same thing over and over. Originally applied to massive Usenet crossposting, but now expanded to include most forms of net abuse. The term “spam” is most commonly used to refer to unsolicited e-mail and usenet abuse.
back to top
SMTP
SMTP Simple Mail Transfer Protocol. TCP/IP protocol typically used for sending e-mail.
back to top
Tarpitting
The use of traffic monitoring to identify remote IP addresses sending too many emails. Access to the mail system from those IP addresses is then temporarily suspended.
back to top
UBE
Unsolicited Bulk E-mail
back to top
UCE
Unsolicited Commercial E-mail
back to top
White Hat
ISP that will terminate a net abuser immediately and without mercy.
back to top
Whitelist
A list of outside email addresses allowed to send to the email server
back to top |