Advisor

How Spammers Harvest E-Mails and How We Can Protect Ourselves

Posted April 19, 2006 | | Amplify

It may seem difficult to understand how spammers think and act. Nevertheless, based on the "principles" of the act of spamming, we can identify three basic actions of a spammer:

About The Author
Charalampos Patrikakis
Charalampos Z. Patrikakis is a Professor in the Department of Electrical and Electronic Engineering at the University of West Attica (UniWA), Greece. He is also Director of UniWA’s Computer Networks & Services Research (CoNSeRT) Lab. Dr. Patrikakis has more than 100 publications in book chapters, international journals, and conferences and has made two contributions to national legis­lation. He is a senior member of IEEE, Associate Editor… Read More
Anastasios Pallas
Anastasios A. Pallas is an IT professor in secondary education in Greece. He is currently finishing his M.Sc. in IT at the University of Paisley, Scotland, in collaboration with the Technological Educational Institution of Pireaus, Greece. Mr. Pallas's research focuses on investigating the spam phenomenon in Greece and evaluating the effectiveness of comparatively unexploited techniques such as spam traps. He has experience consulting on and… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.