

Instant online reading.
Don't wait for delivery!
Go digital and save!
E-mail Virus Protection Handbook
Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
By: Syngress
Paperback | 6 December 2000
At a Glance
476 Pages
23.32 x 18.8 x 3.02
Paperback
$128.50
or 4 interest-free payments of $32.13 with
orAims to ship in 10 to 15 business days
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.
The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
- Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher
- Focuses on specific safeguards and solutions that are readily available to users
Introduction | p. xxvi |
Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers | p. 1 |
Introduction | p. 2 |
Essential Concepts | p. 3 |
Servers, Services, and Clients | p. 3 |
Authentication and Access Control | p. 3 |
Hackers and Attack Types | p. 4 |
What Do Hackers Do? | p. 4 |
Attack Types | p. 5 |
Overview of E-mail Clients and Servers | p. 7 |
Understanding a Mail User Agent and a Mail Transfer Agent | p. 7 |
The Mail Delivery Agent | p. 9 |
When Are Security Problems Introduced? | p. 10 |
History of E-mail Attacks | p. 10 |
The MTA and the Robert Morris Internet Worm | p. 11 |
MDA Attacks | p. 12 |
Analyzing Famous Attacks | p. 12 |
Case Study | p. 14 |
Learning from Past Attacks | p. 14 |
Viruses | p. 15 |
Worms | p. 15 |
Types of Worms | p. 16 |
Trojans | p. 17 |
Illicit Servers | p. 17 |
Differentiating between Trojans and Illicit Servers | p. 18 |
E-mail Bombing | p. 19 |
Sniffing Attacks | p. 19 |
Carnivore | p. 20 |
Spamming and Security | p. 21 |
Common Authoring Languages | p. 22 |
Protecting Your E-mail | p. 23 |
Protecting E-mail Clients | p. 23 |
Third-party Applications | p. 23 |
Encryption | p. 24 |
Hash Encryption and Document Signing | p. 27 |
Protecting the Server | p. 27 |
Summary | p. 28 |
FAQs | p. 29 |
Securing Outlook 2000 | p. 31 |
Introduction | p. 32 |
Common Targets, Exploits, and Weaknesses | p. 33 |
The Address Book | p. 35 |
The Mail Folders | p. 36 |
Visual Basic Files | p. 37 |
Attacks Specific to This Client | p. 38 |
No Attachment Security | p. 38 |
Default Settings Are Not Secure | p. 38 |
Zone Security | p. 39 |
Word 2000 as the Outlook E-mail Editor | p. 39 |
Security Updates | p. 39 |
Enabling Filtering | p. 42 |
Junk E-mail | p. 42 |
Filtering Keywords | p. 44 |
Mail Settings and Options | p. 44 |
HTML Messages | p. 45 |
Zone Settings | p. 46 |
Attachment Security | p. 48 |
Attachment Security After Applying Outlook E-mail Security Update | p. 51 |
Enabling S/MIME | p. 54 |
Why You Should Use Public Key Encryption | p. 56 |
Installing and Enabling Pretty Good Privacy (PGP) | p. 57 |
Installing PGP | p. 58 |
Understanding Public Key Encryption | p. 62 |
Generating a Key Pair | p. 65 |
Exchanging Keys | p. 67 |
Key Distribution Sites | p. 69 |
Summary | p. 70 |
FAQs | p. 71 |
Securing Outlook Express 5.0 and Eudora 4.3 | p. 75 |
Introduction | p. 76 |
Outlook Express for Windows | p. 76 |
Security Settings | p. 77 |
Secure Mail | p. 78 |
Security Zones | p. 80 |
Attachments | p. 82 |
Outlook Express for Macintosh | p. 85 |
Junk Mail Filter | p. 85 |
Message Rules | p. 88 |
Attachments | p. 89 |
Case Study: Automated Virus Scanning of Mail Attachments | p. 90 |
Eudora for Windows and Macintosh | p. 91 |
Security | p. 91 |
Attachments | p. 91 |
Filtering | p. 93 |
Enabling PGP for both Outlook Express and Eudora | p. 95 |
Sending and Receiving PGP-Secured Messages | p. 96 |
Eudora for Windows | p. 97 |
Outlook Express for Windows | p. 101 |
Eudora for Macintosh | p. 103 |
Outlook Express for Macintosh | p. 105 |
Automatic Processing of Messages | p. 107 |
File Attachments and PGP | p. 108 |
Case Study: Securing File Attachments with PGP | p. 109 |
Summary | p. 113 |
FAQs | p. 115 |
Web-based Mail Issues | p. 119 |
Introduction | p. 120 |
Choices in Web-based E-mail Services | p. 121 |
Why Is Web-based E-mail So Popular? | p. 122 |
The Cost of Convenience | p. 122 |
Specific Weaknesses | p. 124 |
Internet Architecture and the Transmission Path | p. 124 |
Reading Passwords | p. 126 |
Case Study | p. 128 |
Specific Sniffer Applications | p. 131 |
Code-based Attacks | p. 133 |
The PHF Bug | p. 134 |
Hostile Code | p. 135 |
Taking Advantage of System Trusts | p. 135 |
Cracking the Account with a "Brute Force" or Dictionary Application | p. 136 |
Physical Attacks | p. 137 |
Cookies and Their Associated Risks | p. 138 |
Solving the Problem | p. 139 |
Using Secure Sockets Layer (SSL) | p. 139 |
Secure HTTP | p. 139 |
Practical Implementations | p. 140 |
Local E-mail Servers | p. 141 |
Using PGP with Web-based E-mail | p. 141 |
Making Yourself Anonymous | p. 142 |
Summary | p. 143 |
FAQs | p. 144 |
Client-Side Anti-Virus Applications | p. 147 |
Introduction | p. 148 |
McAfee VirusScan 5 | p. 150 |
Availability of VirusScan | p. 151 |
Updates of Virus Definition Files | p. 152 |
Installation of VirusScan 5 | p. 152 |
Configuration of VirusScan 5 | p. 156 |
Norton AntiVirus 2000 | p. 163 |
Availability of Norton AntiVirus 2000 | p. 163 |
Updates of Norton AntiVirus 2000 Definition Files | p. 164 |
Installation of Norton AntiVirus 2000 | p. 165 |
Configuration of Norton AntiVirus 2000 | p. 167 |
Trend Micro PC-cillin 2000 | p. 176 |
Availability of Trend Micro PC-cillin 2000 | p. 176 |
Updates of PC-cillin Virus Definition Files | p. 177 |
Installation of Trend Micro PC-cillin 2000 | p. 178 |
Configuration of Trend Micro PC-cillin 2000 | p. 181 |
Trend PC-cillin 2000 Configuration Settings | p. 185 |
Trend Micro PC-cillin 2000 Links | p. 188 |
Summary | p. 189 |
FAQs | p. 190 |
Mobile Code Protection | p. 195 |
Introduction | p. 196 |
Dynamic E-mail | p. 196 |
Active Content | p. 197 |
Taking Advantage of Dynamic E-mail | p. 197 |
Composing an HTML E-mail | p. 198 |
Inserting Your Own HTML File | p. 198 |
Sending an Entire Web Page | p. 200 |
Dangers | p. 200 |
No Hiding Behind the Firewall | p. 201 |
Mobile Code | p. 201 |
Java | p. 202 |
Security Model | p. 203 |
Playing in the Sandbox | p. 203 |
Playing Outside the Sandbox | p. 205 |
Points of Weakness | p. 205 |
Background Threads | p. 206 |
Hogging System Resources | p. 206 |
I Swear I Didn't Send That E-mail | p. 207 |
Scanning for Files | p. 207 |
How Hackers Take Advantage | p. 207 |
Spam Verification | p. 207 |
Theft of Processing Power | p. 208 |
Unscrupulous Market Research | p. 208 |
Applets Are Not That Scary | p. 208 |
Precautions You Can Take | p. 208 |
JavaScript | p. 211 |
Security Model | p. 211 |
Points of Weakness | p. 212 |
How Hackers Take Advantage | p. 213 |
Web-Based E-mail Attacks | p. 213 |
Are Plug-in Commands a Threat? | p. 213 |
Social Engineering | p. 213 |
Precautions to Take | p. 214 |
ActiveX | p. 215 |
Security Model | p. 215 |
Safe for Scripting | p. 216 |
Points of Weakness | p. 217 |
How Hackers Can Take Advantage | p. 218 |
Preinstalled ActiveX Controls | p. 218 |
Bugs Open the Door | p. 219 |
Intentionally Malicious ActiveX | p. 219 |
My Mistake... | p. 220 |
Trojan Horse Attacks | p. 220 |
Precautions to Take | p. 220 |
VBScript | p. 221 |
Security Model | p. 222 |
Points of Weakness | p. 222 |
VBScript, Meet ActiveX | p. 222 |
How Hackers Take Advantage | p. 223 |
Social Engineering Exploits | p. 223 |
VBScript-ActiveX Can Double Team Your Security | p. 223 |
Precautions to Take | p. 224 |
Summary | p. 225 |
FAQs | p. 226 |
Personal Firewalls | p. 227 |
Introduction | p. 228 |
What Is a Personal Firewall? | p. 228 |
Blocks Ports | p. 230 |
Block IP Addresses | p. 230 |
Access Control List (ACL) | p. 231 |
Execution Control List (ECL) | p. 232 |
Intrusion Detection | p. 233 |
Personal Firewalls and E-mail Clients | p. 234 |
Levels of Protection | p. 235 |
False Positives | p. 235 |
Network Ice BlackICE Defender 2.1 | p. 236 |
Installation | p. 236 |
Configuration | p. 239 |
E-mail and BlackICE | p. 248 |
Aladdin Networks' eSafe, Version 2.2 | p. 248 |
Installation | p. 248 |
Configuration | p. 252 |
E-mail and ESafe | p. 269 |
Norton Personal Firewall 2000 2.0 | p. 269 |
Installation | p. 270 |
Configuration | p. 274 |
ZoneAlarm 2.1 | p. 283 |
Installation | p. 284 |
Configuration | p. 287 |
E-mail and ZoneAlarm | p. 291 |
Summary | p. 292 |
FAQs | p. 292 |
Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services | p. 295 |
Introduction | p. 296 |
Updating the Operating System | p. 296 |
Microsoft Service Packs | p. 296 |
Red Hat Linux Updates and Errata Service Packages | p. 297 |
Disabling Unnecessary Services and Ports | p. 299 |
Windows 2000 Advanced Server--Services to Disable | p. 299 |
The Server Service | p. 300 |
Internet Information Services (IIS) | p. 302 |
Red Hat Linux--Services to Disable | p. 304 |
Inetd.conf | p. 304 |
Rlogin | p. 305 |
Locking Down Ports | p. 305 |
Well-Known and Registered Ports | p. 306 |
Determining Ports to Block | p. 308 |
Blocking Ports in Windows | p. 308 |
Blocking Ports in Linux | p. 310 |
Inetd Services | p. 310 |
Stand-Alone Services | p. 310 |
Maintenance Issues | p. 311 |
Microsoft Service Pack Updates, Hot Fixes, and Security Patches | p. 312 |
Case Study | p. 313 |
Red Hat Linux Errata: Fixes and Advisories | p. 314 |
Case Study | p. 316 |
Windows Vulnerability Scanner (ISS System Scanner) | p. 317 |
Linux Vulnerability Scanner (WebTrends Security Analyzer) | p. 320 |
Logging | p. 325 |
Windows 2000 Advanced Server | p. 325 |
Linux | p. 325 |
Common Security Applications | p. 326 |
Firewall Placement | p. 327 |
Summary | p. 330 |
FAQs | p. 331 |
Microsoft Exchange Server 5.5 | p. 333 |
Introduction | p. 334 |
Securing the Exchange Server from Spam | p. 334 |
Configuring the IMS To Block E-mail Attacks | p. 335 |
Exchange and Virus Attacks: Myths and Realities | p. 341 |
Learning from Recent Attacks | p. 343 |
Case Study: Preparing for Virus Attacks | p. 345 |
Exchange Maintenance | p. 347 |
Service Packs | p. 347 |
Plug-ins and Add-ons | p. 351 |
Third-party Add-ons | p. 351 |
Microsoft Utilities | p. 352 |
Content Filtering | p. 353 |
Case Study: Content Scanning | p. 356 |
Attachment Scanning | p. 357 |
Recovery | p. 359 |
Backing Up Data | p. 360 |
Restoring Data | p. 363 |
Summary | p. 363 |
FAQs | p. 365 |
Sendmail and IMAP Security | p. 367 |
Introduction | p. 368 |
Sendmail and Security: A Contradiction in Terms? | p. 368 |
Sendmail's History | p. 368 |
Threats to SendMail Security | p. 370 |
Anatomy of a Buffer Overflow | p. 370 |
A Buffer Overflow Illustrated | p. 371 |
Sendmail and the Root Privilege | p. 372 |
Fixes | p. 373 |
Stay Current | p. 373 |
Stay Informed | p. 374 |
Protect Your Resources | p. 375 |
Minimize Risk | p. 375 |
Alternatives: Postfix and Qmail | p. 377 |
Postfix | p. 377 |
Qmail | p. 378 |
Comparing Your Options | p. 379 |
Configuring Sendmail | p. 380 |
Internet Message Access Protocol (IMAP) | p. 381 |
The IMAP Advantage | p. 381 |
Understanding IMAP Implementations | p. 383 |
UW IMAP | p. 383 |
Cyrus IMAP | p. 384 |
One IMAP, Many Choices | p. 385 |
Administering the Server | p. 385 |
The Users | p. 385 |
The Mail Store | p. 386 |
Protecting the Messages | p. 387 |
Strengthening Authentication | p. 387 |
Securing Access | p. 388 |
From the Client Side | p. 390 |
IMAP Summary | p. 390 |
Recovery | p. 391 |
Backing Up Data | p. 392 |
Restoring Data | p. 393 |
The Bottom Line on Backup | p. 393 |
Summary | p. 394 |
FAQs | p. 394 |
Deploying Server-side E-mail Content Filters and Scanners | p. 397 |
Introduction | p. 398 |
Overview of Content Filtering | p. 398 |
Filtering by Sender | p. 403 |
Filtering by Receiver | p. 403 |
Subject Headings and Message Body | p. 404 |
Overview of Attachment Scanning | p. 404 |
Attachment Size | p. 407 |
Attachment Type (Visual Basic, Java, ActiveX) | p. 407 |
McAfee GroupShield | p. 408 |
Installation of GroupShield | p. 408 |
Configuration | p. 412 |
Specific Settings | p. 418 |
Trend Micro ScanMail for Exchange Server | p. 419 |
Installation of ScanMail | p. 419 |
Configuration | p. 421 |
Specific Settings | p. 422 |
Additional ScanMail Offerings | p. 424 |
Content Technologies' MAILsweeper for Exchange 5.5 | p. 425 |
Installation of MAILsweeper | p. 425 |
Configuration | p. 427 |
Specific Settings | p. 428 |
Firewall and E-mail Content Scanning | p. 428 |
Content Technologies' MIMEsweeper for CheckPoint's Firewall-1 | p. 429 |
Axent Raptor Firewall | p. 430 |
Attack Detection and System Scanning | p. 431 |
Attacks | p. 431 |
Real-time, Third-party Services | p. 433 |
Evinci | p. 434 |
Securify | p. 434 |
Summary | p. 435 |
FAQs | p. 435 |
Secrets | p. 437 |
Lesser-known Shortcuts | p. 438 |
Under-documented Features and Functions | p. 438 |
Disable an ActiveX Control | p. 440 |
For Experts Only (Advanced features) | p. 441 |
Web Pages on Mobile Code Security Topics | p. 441 |
Outlook Web Access (OWA) | p. 442 |
Using SendMail To Refuse E-mails with the Love Letter Virus | p. 442 |
Troubleshooting and Optimization Tips | p. 444 |
Index | p. 447 |
Table of Contents provided by Syndetics. All Rights Reserved. |
ISBN: 9781928994237
ISBN-10: 1928994237
Published: 6th December 2000
Format: Paperback
Language: English
Number of Pages: 476
Audience: General Adult
Publisher: SYNGRESS MEDIA
Country of Publication: US
Dimensions (cm): 23.32 x 18.8 x 3.02
Weight (kg): 0.82
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In
This product is categorised by
- Non-FictionComputing & I.T.Computer Networking & CommunicationsElectronic Mail or Email for Professionals
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Computer SecurityComputer Viruses