Identification of Spoofed E-mail
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 3
Abstract
Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.
Authors and Affiliations
Hiral Vegda, Chirag Darji
Supply Networks: An Overview
This study intends to offer a planned overview of source systems for academics and management interested in the subject. It does not try to provide a complete overview of the vast and rapidly expanding review , but it do...
Solar Charger Design for Electric Vehicles
As countries and car makers focus on goals like "going green," combating climate change, and so on, the present worldwide trend toward electric vehicles is expanding. The design of electric vehicles is an important aspec...
Study the Surface of Chitosan Which Produces an Electric Potential
The research aims to study the surface of chitosan/CNDs which produces an electric potential applied to electrical energy. 20 samples were taken to examine the results regarding energy potential and its application to el...
An Analysis of Fuel Cell Systems for Maritime Applications
Limits on contamination emanations are being fixed, constraining boat proprietors to decrease their activities' ecological effect. Energy components might be a suitable arrangement since they are eco-friendly and dischar...
Artificial Intelligence Verification Platform using Block Chain with Distributed Ledger Technology
Developments in (AI) or (DLT) are now provoking lively debate in practice and academia. AI uses data to achieve goals that were previously believed to be only possible for humans. In an unsettled context, distributed led...