Spam Glossary


404 Compliant
404 Compliant Website that has been terminated for spamming. Refers to a Page not found error (404 error).
up arrow back to top


Abuse Desk
The department at an ISP which is responsible for handling and acting on net abuse complaints.
up arrow back to top


Address Harvester
Specialised browsing software that examines sources of online information for anything that might provide a valid email address.
up arrow back to top


Anonymizer Proxy
Service set up to prevent websites from obtaining information such as your e-mail address or your current IP address from your browser.
up arrow back to top


APNIC
Asia-Pacific Network Information Center. APNIC registers and maintains the registration information for domains in Asia, Australia, etc.
up arrow back to top


ARIN
American Registry of Internet Numbers.
up arrow back to top


AUP Acceptable Use Policy
Part of an ISP’s contract with its customers that usually defines what is considered net abuse. AUPs state which activities are allowable and which activities may get your account terminated.
up arrow back to top


Auto-Ack
Response from an Autoresponder
up arrow back to top


Autoresponder
Program which automatically responds to mail. Commonly used by abuse desks to acknowledge spam complaints.
up arrow back to top


Backbone
Primary provider of infrastructure such as trunk lines, dial-ups and cabling for the Internet. The “backbone” providers are the ultimate upstream providers.
up arrow back to top


Bandwidth
A measure of data transfer proportional to the amount of data transferred in a given time. Most common measurements seen by users are bits per second (bps). Larger, more complex files require more bandwidth.
up arrow back to top


Bayesian Filtering
Bayesian spam filters use a statistical theory developed by English philosopher Thomas Bayes. They calculate the probability of a message being spam, based both on its content and on past results, to separate genuine emails from spam.
up arrow back to top


BCC: Field
Blind Carbon Copy field in an e-mail that is normally not visible to the recipients. Used by spammers to conceal their mailing lists.
up arrow back to top


Bit Bucket
Electronic trash can for mail servers.
up arrow back to top


Black Hat
ISP that is non-responsive to spam complaints.
up arrow back to top


Blacklist (or Block List)
A list of outside email addresses not allowed to send messages to the email server.
up arrow back to top


Bot
Program used to perform a repetitive task automatically. Most common bots are designed to monitor IRC channels and search webpages or newsgroups for e-mail addresses.
up arrow back to top


Bounce
Rejection of mail from the receiving e-mail server.
up arrow back to top


CAUCE
Coalition Against Unsolicited E-mail.
up arrow back to top


Dejanews
Usenet news posting and archival service. Now known as Deja.com
up arrow back to top


Dev/Null
From the UNIX “null device.” Colloquialism for deleting mail (especially to abuse desks) without reading it. See bit bucket.
up arrow back to top


DIG (Domain Internet Groper)
Advanced DNS tool that returns all of the available Resource Records for a given domain or host.
up arrow back to top


DNS Domain Name System
Locations on the Internet are identified by IP addresses. Allows users to type in domain names by translating domain names into the IP addresses.
up arrow back to top


Domain Name
Canonical (simple or registered) name of a given IP address.
up arrow back to top


DoS Attack Denial of Service Attacks
Attack on an individual or server that is aimed at preventing normal use of the net. DoS attacks include mailbombing, smurf attacks, etc.
up arrow back to top


Drop Box
E-mail address used by a spammer to gather responses to spam.
up arrow back to top


Email Header
Every email message consists of two parts, the body and the header. The header can be thought of as the envelope of the message, containing the address of the sender, the recipient, the subject and other information. The body contains the actual text and the attachments. Some header information usually displayed by your email program includes:

  • From: – The sender’s name and email address.
  • To: – The recipient’s name and email address..
  • Date: – The date when the message was sent. .
  • Subject: – The subject line.

up arrow back to top


Filter
Program which can be configured to allow only data meeting certain criteria to pass.
up arrow back to top


Firewall
Security program or programs that protect the system or network from unauthorized use or access.
up arrow back to top


Greylist
A list of email addresses that have attempted to send messages, and have been sent a reply asking them for information to confirm that their email is not spam.
up arrow back to top


Harvesting
The act of gathering e-mail addresses from newsgroups or websites, usually through the use of a bot.
up arrow back to top


IP Spoofing
Forging an IP address of a trusted server into the packets of information sent to a server in place of the real IP address. Because the IP address appears to be that of an authorized sender, the receiving server will act on commands it receives.
up arrow back to top


LART
Valuable anti-spammer weapon. Stands for Luser Attitude Readjustment Tool – tool of choice is often a clue-by-four.
up arrow back to top


Listwashing
The process of removing email addresses from a mailing list at the request of individuals. This leaves a clean list of people who do not mind receiving messages. This may require the cooperation of ISPs to forward email complaints to companies.
up arrow back to top


Mailbombing
Sending a large quantity of e-mail to an address in an attempt to prevent legitimate mail to get through. A form of DoS attack.
up arrow back to top


Mailing List
Organized group of users, which have agreed to receive regular mailings on a particular subject. Most legitimate mailing lists will require the subscriber to confirm by responding to an initial e-mail.
up arrow back to top


MAPS
Mail Abuse Prevention System
up arrow back to top


MX Record
Short for mail exchange record, an entry in a domain name database that identifies the mail server that is responsible for handling e-mails for that domain name. When more than one MX record is entered for any single domain name that is using more than one mail server, the MX record can be prioritized with a preference number that indicates the order in which the mail servers should be used. This enables the use of primary and backup mail servers.
up arrow back to top


Open Relay
An email server processing mail where sender and receiver are not local users. Such servers are often open to attack, and are sometimes seized by hackers who use them to send large amounts of spam. An Open Relay Mail Server allows mail to be forwarded from the originating server through it to the destination server.
up arrow back to top


Opt-in
Procedure by which users must make a request to be on a mailing list.
up arrow back to top


Opt-out
Procedure by which users must make a request not to be on a mailing list.
up arrow back to top


ORBS
Open Relay Behaviour-Modification System. Database which tracks SMTP mail servers which permit third party relaying of e-mail. Confirmation that the relay has been used by spammers is not required, making ORBS somewhat controversial. Database can be used as a filter to prevent a mail server from receiving mail from a listed domain.
up arrow back to top


POP
Point of Presence. Point of access to the Internet. Commonly associated with modem banks used for dial-up access to an ISP.
up arrow back to top


Port
Location for connection to a device. Ports may be physcial, such as a parallel port or logical.
up arrow back to top


Port 25
Logical port associated with an SMTP mail server.
up arrow back to top


RBL
Realtime Blackhole List. Filtering system that prevents ISPs from receiving mail from listed IP addresses.
up arrow back to top


rDNS
Reverse Domain Name System. Provides the domain name for a given IP address.
up arrow back to top


Redlist
List of email addresses not contributing to the whitelist, and who are not considered local, even if email is received locally.
up arrow back to top


Relay
Forward e-mail through a mail server.
up arrow back to top


Relay Check
To test a server to determine if it allows third party relaying
up arrow back to top


RIPE
Regional Internet Registry for Europe and surrounding areas.
up arrow back to top


Rogue
An Internet Service Provider (ISP) that does not enforce its Terms of Serice Agreement or AUP.
up arrow back to top


RRSS
Radparker Relay Spam Stopper – is a list of open email relays which have been used to send spam. Database can be used as a filter to prevent a mail server from receiving mail from a listed domain.
up arrow back to top


Spam
Terms that refers to the same thing over and over. Originally applied to massive Usenet crossposting, but now expanded to include most forms of net abuse. The term “spam” is most commonly used to refer to unsolicited e-mail and usenet abuse.
up arrow back to top


SMTP
SMTP Simple Mail Transfer Protocol. TCP/IP protocol typically used for sending e-mail.
up arrow back to top


Tarpitting
The use of traffic monitoring to identify remote IP addresses sending too many emails. Access to the mail system from those IP addresses is then temporarily suspended.
up arrow back to top


UBE
Unsolicited Bulk E-mail
up arrow back to top


UCE
Unsolicited Commercial E-mail
up arrow back to top


White Hat
ISP that will terminate a net abuser immediately and without mercy.
up arrow back to top


Whitelist
A list of outside email addresses allowed to send to the email server
up arrow back to top

Leave a Comment

Your email address will not be published. Required fields are marked *