AFAIK An acronym for “As Far As I Know” Anonymous FTP FTP is the

Document Sample
AFAIK An acronym for “As Far As I Know” Anonymous FTP FTP is the Powered By Docstoc
					AFAIK           An acronym for “As Far As I Know”

Anonymous FTP   FTP is the File Transfer Protocol. It is used for transferring information
                from one machine to another. FTP normally requires a username and
                password to control access to the system. However, sometimes the
                owner of the FTP server doesn’t want to control access to their server.
                In this case, the user enters “anonymous” as their username and by
                convention, their email address as the password. Unscrupulous
                spammers use this facility to obtain unsuspecting user’s email
                addresses.

AOL             America On-Line – The name of a large Internet Service Provider

APNIC           APNIC provides allocation and registration services that support the
                operation of the Internet globally.
                APNIC performs activities primarily for the benefit of organisations in
                the Asia Pacific region, comprising 62 economies.

Blacklist       In Spam terms, a blacklist is list of email addresses, users’ machines
                or networks that you do not want to receive email from.

Browser         A browser is the generic term for systems that are used to view pages
                on the world wide web. The most common browsers are Internet
                Explorer, Netscape Navigator and Opera.

Dictionary      An email address is made of two parts. The part in front of the “@”
Spamming        symbol is known as the username and the part after the “@” symbol is
                known as the domain name. Typically, the username identifies the
                recipient (person) and the domain name identifies their ISP, company
                or organisation. Dictionary spamming assumes that the username can
                be derived by guessing – john.smith@ jsmith@ j_smith@ j-smith@
                smithj@ … emma.jones@ ejones@ e_jones@ e-jones@ jonese@
                etc
                Another means is known as “brute force” and simply tries every
                combination of letters - a@ b@ c@ ….z@ aa@ ab@ … az@
                ba@ bb@ etc.

Domain Name     In the real world, you usually identify a building by an address. You
                could also identify it by the grid reference on a map or by latitude and
                longitude. Latitude and Longitude references have many advantages:
                They are constant, they never change, and they are unique. They also
                have one major disadvantage: People find them incredibly difficult to
                use and remember.
                The Internet is similar: an IP address is a set of four numbers that
                uniquely identify a computer, just like latitude and longitude can
                identify a building. The equivalent of an address or postcode in the
                 Internet is the Domain Name.
                 For example, typing http://195.33.103.40 and http://www.gov.uk on
                 the address line of a browser will return the same result. However
                 http://www.gov.uk tells us so much more: It’s a web site, in the UK
                 and it’s related to government.

Email Server     An email server acts like a Royal Mail sorting office. It collects mail
                 from post boxes, delivers mail to your letterbox and forwards mail to
                 other sorting offices for on-ward delivery.

False Negative   A False Negative is an email that was not identified as spam but is
                 spam.

False Positive   A False Positive is an email that was identified as spam but is not
                 spam.

Filter           A device that separates email that is likely to be wanted from email
                 that is likely to be spam.

Firewall         A firewall is a device that controls access to and from the Internet. Its
                 primary purpose is to stop potentially dangerous traffic reaching your
                 machine.

Flaming          Flaming is the term given to sending argumentative or aggressive
                 messages to someone across the Internet.

FTP              Acronym for File Transfer Protocol. It is used to transfer files between
                 machines across the Internet.

Hacker           A person who attempts to compromise the integrity of a computer or a
                 network

Harvesting       The process of gathering email addresses

Header           See Mail Header

Hormel           Although we use spam to refer to junk e-mail, the word comes from a
                 product by Hormel Foods Corporation, USA.

HTML             HyperText Mark-up Language is the language used to create or
                 describe Web pages.

IANA             Now defunct – Responsibilities were taken over by ICANN

ICANN            The Internet Corporation for Assigned Names and Numbers (ICANN)
                 is the non-profit corporation that was formed to assume responsibility
                 for the IP address space allocation, protocol parameter assignment,
                 domain name system management, and root server system
                 management functions previously performed under U.S. Government
                 contract by IANA and other entities

ICQ              ICQ is an on-line chat system. (Pronounced “I seek you”)
IM                  IM is an acronym for Instant Messaging. It is another term for chat.

IMAP                IMAP is a protocol used transfer mail between servers and clients.

IMHO                An acronym for “In My Honest Opinion”

Instant Messaging   Instant Messaging is another term for chat.

Invisible Hosting   A technique that makes finding the true origin of a web-site or spam
                    email very difficult.

IP Address          In the real world, you usually identify a building by an address. You
                    could also identify it by the grid reference on a map or by latitude and
                    longitude. Latitude and Longitude references have many advantages:
                    They are constant, they never change, and they are unique. They also
                    have one major disadvantage: People find them incredibly difficult to
                    use and remember.
                    The Internet is similar: an IP address is a set of four numbers that
                    uniquely identify a computer, just like latitude and longitude can
                    identify a building. The equivalent of an address or postcode in the
                    Internet is the Domain Name.
                    For example, typing http://195.33.103.40 and http://www.gov.uk on
                    the address line of a browser will return the same result. However
                    http://www.gov.uk tells us so much more: It’s a web site, in the UK
                    and it’s related to government.

IRC                 IRC is an acronym for Internet Relay Chat. and is one of the chat
                    systems available on the Internet.

ISP                 Acronym for Internet Service Provider. The organisation that connects
                    users to the internet.

ISP Filter          An ISP filter is a mail filter that is operated by an ISP on behalf of its
                    customers.

Mail Filter         A Mail Filter is piece of software that tries to determine whether
                    incoming mail is spam or junk email. They work by a number of
                    approaches. Some read the content looking for keywords. Other use
                    blacklists of known spammers, sites that originate spam or ISPs that
                    allow spammers to operate

Mail Header         Just as an ordinary letter has two parts, the letter and the envelope,
                    an e-mail consists of two parts. One part contains the user information
                    and the other part, called the mail header, contains the information
                    that the mail systems need, such as the address.

Mailto:             A Mailto: is a special instruction embedded in a web page that when
                    clicked, opens an email screen and addresses it to the appropriate
                    person
MLM              An acronym for Multi Level Marketing

MMF              An acronym for Make Money Fast

MTA              Mail Transfer Agent

MUA              Mail User Agent

Munging          Munging is the process of making email addresses difficult for
                 spammers to harvest automatically.

NANAE            An acronym for the newsgroup news.admin.net-abuse.email. It is a
                 forum for discussing abuse of internet mail facilities.

NANAS            An acronym for the newsgroup News.admin.net-abuse.sightings It is a
                 forum for reporting sightings of net abuse, including spam.

Netiquette       Just as society has rules that dictate what is sociably acceptable
                 (etiquette), the Internet has rules regarding what is and is not
                 acceptable behaviour.

Newsgroup        A discussion area on the Usenet system.

NSLOOKUP         Nslookup is a tool that converts domain names into IP addresses

Phishing         A type of spam that lures people to web-sites that look like legitimate,
                 often brand-name business, that then demand money or personal
                 details.

Ping             Ping is a tool that proves two computer can talk to each other across
                 the Internet

POP              POP is an acronym for Post Office Protocol. It is used to transfer
                 emails from a server to a mail program on the user’s computer.

Privacy Policy   A statement of what information an organisation will request from you,
                 how it will hold that information, how it will use that information and
                 details of the circumstances under which it will release the information
                 to third parties.

proxy server     A proxy server allows an internet user to appear to be working from
                 another IP address. In real world terms, it is like using a PO Box
                 number to stop people calling at you premises.

RIPE             RIPE NCC provides allocation and registration services that support
                 the operation of the Internet globally.
                 The RIPE NCC performs activities primarily for the benefit of
                 organisations in Europe, the Middle East, Central Asia and African
                 countries located north of the equator.

Robot            In the context of spam, a robot is a computer programme that
                 attempts to discover people’s email address.

sendmail         Sendmail is a powerful, highly configurable mail server used by many
              ISPs and organisations.

SMTP          Simple Mail Transfer Protocol is the language that mail systems use
              to talk to each other.

Spam

Spambot       A spambot is a computer programme that attempts to discover
              people’s email address.

Spammer       The name given to someone or an organisation that sends spam

Spammer       A person who sends emails that were not requested and are not
              wanted

Target        See Victim

Traceroute    Traceroute is a computer program that shows the route computer
              information takes through an Internet. It can be used to help identify
              the sources of spam.

Trojan

UBE           Unsolicited Bulk E-mail – Email that has not been requested and is
              generally un-welcome. A typical example would be a chain letter or a
              joke file

UCE           Unsolicited Commercial E-mail – Email that has not been requested
              and is generally un-welcome that serves some commercial purpose.

Unix          Unix is an operating system that is used by more technically aware
              people.

URL           Acronym for Uniform Resource Locator. A URL is the address of
              piece of information on the internet. The address line in a browser is
              an example of a URL

Usenet        Usenet is an internet discussion system that allows people with similar
              interests to communicate with each other. It can be accessed via a
              news reader from your computer.

UXE           Unsolicited (anything) Email – Unsolicited E-mail from any source and
              for any purpose.

Victim        The recipient of unwanted email

Virus         A virus is a piece of computer that embeds itself in a computer and
              performs actions that the user has not request and does not want.
              Many are destructive and will destroy files and systems. They are
              often spread by email.

Web Crawler   A WebCrawler is a program that automatically reads web pages
              looking for links to other pages and sites and searching for specific
              information. Spammers use them obtain people’s email addresses.
Webmaster   A person who creates or maintains a web site

Whitelist   In Spam terms, a whitelist is list of email addresses, users’ machines
            or networks that you want to receive email from.

				
DOCUMENT INFO