Back to Results
First PageMeta Content
Anti-spam techniques / Email spam / Spam / Malware / DNSBL / The Spamhaus Project / Zombie / Computer worm / CAN-SPAM Act / Spamming / Internet / Computing


1 Spam Zombies And Inbound Flows To Compromised Customer Systems Joe St Sauver, Ph.D. ([removed]) MAAWG Senior Technical Advisor
Add to Reading List

Document Date: 2005-02-27 20:32:38


Open Document

File Size: 183,42 KB

Share Result on Facebook

Company

Dell / Cisco / Panda Software / Information About Who Is Using Zombied Customer Systems / Netoptics / the Washington Post / AOL / IDC / Microsoft / All About / CNN / MSNBC / /

Country

China / /

Currency

USD / /

/

Facility

store SYN / Blocking port / /

IndustryTerm

end-user systems / upstream network carrier / software tools / machinery / end user systems / infected customer systems / mainstream media / Online Safety Study / electronics / /

MarketIndex

Top 40 / /

OperatingSystem

Microsoft Windows / /

Organization

World Health Organization / AOL/National Cyber Security Alliance / swiss army / We Can / /

Person

Ron Guilmette / /

Position

MAAWG Senior Technical Advisor MAAWG General / counsel / editor / collector / manager / General / author / journalist / forward / Private / /

PublishedMedium

Virus Bulletin / the family PC / the Washington Post / /

Technology

XML / broadband / operating system / html / fiber optic / pdf / DNS / proxy server / peer to peer / HTTP / ISP / gigabit / flash / /

URL

http /

SocialTag