Das Umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm Gmbh, Heidelberg

Total Page:16

File Type:pdf, Size:1020Kb

Das Umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm Gmbh, Heidelberg Stichwortverzeichnis Numerisch Links 95 8Seconds 576 Marketing 56, 189 Netzwerk 189 A Relations 83, 85 Abmeldung 259, 378, 719, 746, 806 AIDA 335 mentale 260, 496, 530 Akkreditierung 836 Above-the-Scroll 118, 682 Aktionstag 237 Absender 681 Aktionstage 237 Auswahl 411 Aktivierung 424 Fälschung siehe Spoofing Alternativhypothese 556 siehe Wechsel 111, 413 Alt-Text Grafik-Alternativtext siehe Abuse Reporting Format siehe ARF America Online AOL AddThis 639 Anbieterauswahl 94 siehe AddToAny 640 Anhang E-Mail-Anhang Adobe AniMake 447 Photoshop 445 Animation 123, 367, 443, 460, 612, 616 Adress Anmeldeformular Harvesting 799 Anrede 137, 235 Miete 78 Auswahlliste 164 Validierung 817 Bezeichner 157 siehe Adressbuch-Eintrag 208, 345, 843 Call-to-Action Handlungsaufforde- Adresse rung Adressbuch 208 Fehlermeldung 164 Alter 196 Geburtsdatum 134, 136, 144, 163 Bestand siehe Verteiler Gruppierung 153 catch-all 814 JavaScript 168 Ermüdung 260 kontextsensitives 130 Gewinnung 74 Lückentext 166 Kauf 175, 186 Optionsfeld 125, 160, 163 Markt 199 Redundanzfreiheit 137 Miete 66, 192 Reihenfolge 154, 159 Qualität 144, 183 Textfeld 148, 161 Quantität 183 Tooltip 161 Quelle 175, 183, 230 Validierung 165 Validierung 217 Video 181 Advanced Research Projects Agency Network Anrede 354 siehe ARPAnet Anzeigenwerbung 79, 180, 192, 308, 565, Affiliate 657, 741 897 © des Titels »E-Mail-Marketing – Das umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm GmbH, Heidelberg. Nähere Informationen unter: http://www.mitp.de/5095 Stichwortverzeichnis AOL 30, 33, 625, 822, 843 Bildpersonalisierung 425 API 92, 110 Bild-zu-Text-Verhältnis siehe Text-zu-Bild- Append siehe Profilanreicherung Verhältnis Apple Blacklist 198, 791 iPad 619 Check 830 iPhone 348, 367, 399, 619 Definition 825 Mail 367, 613 Delisting 831 QuickTime 626 Domain Name Block List (DNSBL) 826 Application Programing Interface siehe API Left-Hand-Side (LHSBL) 825, 826 Application Service Providing 92 Right-Hand-Side (RHSBL) 825, 826, 832 Arcor 625 Uniform Resource Identifier (URIBL) ARF 810, 877 825, 826, 832 ARPAnet 27 Blickverlauf siehe Eye-Tracking ASCII siehe Kodierung Blocking 789, 792 ASCII-Art 334, 397 Blogger Relations 56 Asterisk 135 Bonded Sender 840 Audio 126, 608, 614, 625 Bot-Netz siehe Spam Auftragsdatenverarbeitung 755 Bounce 109, 477, 811 Auskunftsrecht 749, 755 asynchroner 812 Authentifizierung 788, 857 Hard 813 Autoresponder siehe Trigger-E-Mail Management 815 Soft 813, 846 B synchroner 812 B2B 55, 249, 255, 417 Bounce (Webanalyse) 133, 707 B2C 55, 249 Brief 62, 178 Backscatter 781 Business-to-Business siehe B2B Bacn siehe Spam Business-to-Consumer siehe B2C Banner siehe Anzeigenwerbung Barracuda Networks 822, 834 C Barter-Geschäft 184 Callback Verification 817 Base64 siehe Kodierung CamStudio 616 Batch and Blast 53 Capping 792 Bayes 812, 851, 868 CAPTCHA 168, 654, 785 Befragung 82, 232, 253, 264, 290, 634, 644, Catfish Ad siehe Slider 689, 731 Certified Senders Alliance siehe CSA Benchmark 66, 505, 520, 812, 821 Challenge-Response (CR) 836 Betreffzeile 210, 391 Checksum siehe Prüfsumme Erfolgsfaktoren 410 Chiclets 151 kürzen 396 Cinemagramm 615 Re 401 Cisco 822, 833 Signalwort 393, 629 Cleansing siehe Adress-Validierung Stilmittel 401 Closed-Loop-Marketing 60, 283, 710 Symbol siehe Symbol Cloudmark 853 Zeichenzahl 392, 681 Commitment 340, 365, 629 Betrug Complaint siehe Spam, Beschwerde Phishing siehe Phishing CompuServe 30 Provisions- 197, 221 Content Bewertung 238, 284, 285, 642 Employee-generated siehe Mitarbeiter Bilder pro Sekunde (FPS) 613 User-generated 642, 666 898 © des Titels »E-Mail-Marketing – Das umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm GmbH, Heidelberg. Nähere Informationen unter: http://www.mitp.de/5095 Stichwortverzeichnis Conversion pseudonyme 380, 710, 749, 761 Rate 470 Qualität 115, 144, 235 Trichter 470 Quantität 115 Cookie-Sperre 132 Reaktionsdaten 60 Co-Registrierung 184, 195 Schema 110 Co-Sponsoring 186, 195 Sicherheit 147 Cost-Per-Click siehe CPC Skandal 143 Cost-Per-Lead siehe CPL Synchronisation 110 Cost-Per-Sale siehe CPS Typen 108 Cost-Per-View siehe CPV Zuspeicherung 634 Countdown siehe Timer Datenschutzerklärung 754 CPC 80, 197 Datenschutz-Richtlinie 28, 149, 720, 724, CPL 80, 187, 191, 525 756 CPS 80 Datensparsamkeitsgebot 134 CPU-Last 615 Datenvermeidungsgebot siehe Datenspar- CPV 80 samkeitsgebot CRM siehe Kundenbeziehungslebenszyklus DDV 51, 221 Cross-Selling 79, 228, 586 Ehrenkodex 196, 226, 718 CSA 198, 226, 718, 838, 865 Deckungsbeitrag 58, 523 Beschwerdeverfahren 750 Delivery Status Notification (DNS) 826 Spam-Markierungsquote 804 Design CSS 367, 465, 871 Fluides 691 Media Query 692 Responsives 141, 690, 695 CSV 109, 179, 661 Deutsche Dialogmarketing Verband siehe Customer Journey 530, 708 DDV Customer Lifetime Value 58, 526 Dialogmarketing 51 Customer Relationship Management siehe Dialogmethode 51, 335 Kundenbeziehungslebenszyklus Direktmarketing 49 Direktwerbung 52 D Distributed Checksum Clearinghouse (DCC) Darstellungstest 453 853 Data Dictionary 107 DKIM (Domain Keys Identified Mail) 839, Data Mining 251 860 Assoziationsregel 79, 586 DMARC (Domain-based Message Authenti- Entscheidungsbaum 579 cation, Reporting and Conformance) 863 FP-Growth 591 DNS 40 k-Means 596 Lookup 40, 816, 827, 857, 861 Konfidenz 588 MX Record 40, 221, 817, 857 Lift 588 PTR Record 817 Normalisierung 596 Reverse 817 Support 588 SPF Record 857 Daten TXT Record 826, 857, 861, 863 Aktionsdaten 60 Zone 826 anonyme 634, 760 Dnswl.org 842 Grunddaten 60 Domain Name Block List (DNSBL) siehe Hygiene 235 Blacklist Karte 193 Domain-Delegation 818 personenbezogene 719 Domain-Part siehe E-Mail-Adresse Preis 187 899 © des Titels »E-Mail-Marketing – Das umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm GmbH, Heidelberg. Nähere Informationen unter: http://www.mitp.de/5095 Stichwortverzeichnis Double Opt-in 204 Serie 85 Beispiel 209, 212 Syntax 219 Checkmail 725 Transaktionsmails 276, 282 Erinnerungsmails 770 Verbreitung 63 Optimierung 206 Willkommensgruß 278 Pflicht 768 Email on Acid 435, 453 Rate 205, 515 E-Mail-Adresse Drosselung 792 Abuse 809, 829 Drucken 373, 513 Alias 144 at-Zeichen 28 E getaggte 217 Editierabstand 222 Local-Part 29 Editorial 354 Postmaster siehe Postmaster Effekt Quelle 66 Halo 391, 424 Remote-Part 29, 218 Haupt 574 Rollen 219, 809 Multiplikator 631 Rückläufer siehe SMTP (MAIL FROM) Nudge 391 Test 226 EHLO siehe SMTP Wegwerf 218 Einwilligung Wert 525 ausdrückliche 734 E-Mail-Client bewusste 734 Fingerprinting 508 eindeutige 734 Marktanteile siehe Marktanteile elektronische 733 E-Mailing 308 freiwillige 733 Kampagne siehe Kampagne gesonderte 735 E-Mail-Marketing informierte 737 Dashboard 707 konkludente 726, 735 Definition 54 mündliche 774 Image 75 Muster 738 Kosten 62, 78 mutmaßliche 721, 735 Vorteile 61 schriftliche 733, 774 Wirtschaftlichkeit 66 Elektronische Post 28, 721 Ziel 76, 228 Eleven siehe eXpurgate Zielgruppe 55 E-Mail E-Mail-Serie 281 Anhang 84, 319, 608 Emotion 349, 362, 382, 394, 424, 607, 635 Definition 28 Empfehlung 238 Entschuldigungsmails 242, 246 Erfolgsfaktoren 632 Entstehung 27 Motiv 637 Envelope 37 organische 511 Envelope-From siehe MAIL FROM persönliche 630 Envelope-To (RCPT TO) 37 Recht 727 Format 84, 332 Share-with-your-Network (SWYN) 178, Geburtstag 29 512, 630, 669 Header siehe Header (E-Mail) Tell-a-Friend 178, 631, 655, 727 Korrekturmails 246 Entschuldigungsmail 242, 246 Priorität 211, 803 Envelope Sender siehe SMTP MAIL FROM Reaktivierung 293 Envelope siehe E-Mail Schreibweise 26 Equity-Theorie 169 900 © des Titels »E-Mail-Marketing – Das umfassende Praxis-Handbuch« (ISBN 978-3-8266-5095-6) 2013 by Verlagsgruppe Hüthig Jehle Rehm GmbH, Heidelberg. Nähere Informationen unter: http://www.mitp.de/5095 Stichwortverzeichnis Erfahrungsbericht 238 Frequenz siehe Newsletter-Frequenz Erwartung 253 FTAF siehe Empfehlung ESMTP siehe SMTP FTP 110 Evoked Set 77 Fußzeile 377 Excel 105, 534, 560, 600 Fehlertoleranz bestimmen 566 G eXpurgate 869 Gamification 167, 298, 464 Eye-Tracking 315, 322, 335 Gate Eyetracking 119 Homepage 183 Video 182 F Geburtstag siehe Geburtstagsmail Facebook Geburtstagsmail 288 Anzeige 180, 659 Gedenktage 237 Applikation 650 Geo-Lokalisierung siehe Targeting Custom Audience 657 Gesetz Gefällt mir siehe Facebook-Like Bundesdatenschutz 718 Instant Personalization 138, 653 Bürgerliches 718, 721 kommentieren 656 der Ähnlichkeit 154 Like 630, 656 der Geschlossenheit 154 Login 652 der Nähe 153 Registration Plugin 653 der Symmetrie 155 Reiter 648, 660 der Verbundenheit 160 senden 655 gegen unlauteren Wettbewerb 718, 720 teilen 646 Straf 789 Fake-Player siehe Video, Screenshot Telekommunikations 789 False Negative 874 Telemedien 718 False Positive 557, 826, 851, 854, 871 Gestaltung Whitelists 836 Blickverlauf 155, 339 Farbe 320, 613 Data-Pixel 140 Palette 443 Formular 166 Tabelle 448, 613 Gesetze siehe Gesetz FastStone Capture 446 Harmonie siehe Goldener Schnitt Fax 178 Gewinnspiel 179, 186, 742, 744 Feedback-Loop 808 GIF 612 Fehler Animation siehe Animation vorbeugen 243 Animator siehe Ulead GIF Animator Fenster GIF siehe Grafik-Format modales 130, 624, 656 Gimp 449 Ferien 255 Global Message Exchange siehe GMX Fernmeldegeheimnis 789 Glyphe siehe Symbol Fibonacci-Zahlenfolge 156 Gmail 32, 33, 871 Follow-up 483, 502, 585, 658 Contextual Gadget 371, 623 Font siehe Schrift sortierter Eingang (Priority Inbox) 504, Footer siehe Fußzeile 878 Forward-to-a-Friend siehe Empfehlung GMX 316, 419, 625 Frage
Recommended publications
  • ITU Botnet Mitigation Toolkit Background Information
    ITU Botnet Mitigation Toolkit Background Information ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector January 2008 Acknowledgements Botnets (also called zombie armies or drone armies) are networks of compromised computers infected with viruses or malware to turn them into “zombies” or “robots” – computers that can be controlled without the owners’ knowledge. Criminals can use the collective computing power and connected bandwidth of these externally-controlled networks for malicious purposes and criminal activities, including, inter alia, generation of spam e-mails, launching of Distributed Denial of Service (DDoS) attacks, alteration or destruction of data, and identity theft. The threat from botnets is growing fast. The latest (2007) generation of botnets such as the Storm Worm uses particularly aggressive techniques such as fast-flux networks and striking back with DDoS attacks against security vendors trying to mitigate them. An underground economy has now sprung up around botnets, yielding significant revenues for authors of computer viruses, botnet controllers and criminals who commission this illegal activity by renting botnets. In response to this growing threat, ITU is developing a Botnet Mitigation Toolkit to assist in mitigating the problem of botnets. This document provides background information on the toolkit. The toolkit, developed by Mr. Suresh Ramasubramanian, draws on existing resources, identifies relevant local and international stakeholders, and
    [Show full text]
  • M AAWG: Hosting Past, Present & Future
    3 M AAWG: Hosting Past, Present & Future Justin Lane - BlueHost and M3AAWG Hosting Co-Chair Jesse Sowell, PhD and M3AAWG Advisor 5 May 2016 LACNIC 25, La Habana, Cuba www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group Hosting: Not a Big Issue, Right? For many years the Community looked at Hosting Companies like this picture. We where a small area that did not look to be that important. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group A Brief History of Hosting Hosting Companies in the beginning where a small part of the overall environment. Most of the Hosting Companies at the time offered plans that gave their clients 20-50MB of space to use for their websites. ESP’s and ISP’s where much bigger players. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What Hosting Offers Hosting Companies were able to offer all the services needed to get a company online and ready to service their customers. • Email Services • CMS, and Webdesign • Hardware from Dedicated Servers or Colocation Servers to Shared or Virtual Server Space • Bandwidth for your Business, Dedicated Ips and SSL Services • Access to Hardware that most smaller businesses were not able to afford on their own. www.m3aawg.org © 2015 Messaging, Malware and Mobile Anti-Abuse Working Group What is Happening Today? As the community got better at policing ISP’s, ESP’s and other problem areas, the criminal elements began to migrate to the Hosting Platforms. With Hosting Companies these criminal elements were even better positioned to carry out their plans.
    [Show full text]
  • IFIP AICT 394, Pp
    A Scalable Spam Filtering Architecture Nuno Ferreira1, Gracinda Carvalho1, and Paulo Rogério Pereira2 1 Universidade Aberta, Portugal 2 INESC-ID, Instituto Superior Técnico, Technical University of Lisbon, Portugal [email protected], [email protected], [email protected] Abstract. The proposed spam filtering architecture for MTA1 servers is a component based architecture that allows distributed processing and centralized knowledge. This architecture allows heterogeneous systems to coexist and benefit from a centralized knowledge source and filtering rules. MTA servers in the infrastructure contribute to a common knowledge, allowing for a more rational resource usage. The architecture is fully scalable, ranging from all-in- one system with minimal components instances, to multiple components instances distributed across multiple systems. Filtering rules can be implemented as independent modules that can be added, removed or modified without impact on MTA servers operation. A proof-of-concept solution was developed. Most of spam is filtered due to a grey-listing effect from the architecture itself. Using simple filters as Domain Name System black and white lists, and Sender Policy Framework validation, it is possible to guarantee a spam filtering effective, efficient and virtually without false positives. Keywords: spam filtering, distributed architecture, component based, centralized knowledge, heterogeneous system, scalable deployment, dynamic rules, modular implementation. 1 Introduction Internet mail spam2 is a problem for most organizations and individuals. Receiving spam on mobile devices, and on other connected appliances, is yet a bigger problem, as these platforms are not the most appropriate for spam filtering. Spam can be seen as belonging to one of two major categories: Fraud and Commercial.
    [Show full text]
  • Blocklist Babel: on the Transparency and Dynamics of Open Source Blocklisting
    1 Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting Alvaro´ Feal, Pelayo Vallina, Julien Gamba, Sergio Pastrana, Antonio Nappa, Oliver Hohlfeld, Narseo Vallina-Rodriguez, and Juan Tapiador Abstract—Blocklists constitute a widely-used Internet security are protecting an estimated 3,126,410,000 user mailboxes [1]. mechanism to filter undesired network traffic based on IP/domain Similarly, MISP (Malware Intelligence Sharing Platform [2]), reputation and behavior. Many blocklists are distributed in open a popular open source threat intelligence platform, reports that source form by threat intelligence providers who aggregate and process input from their own sensors, but also from third- it is used by more than 6,000 organizations worldwide. Beyond party feeds or providers. Despite their wide adoption, many blocklists, other feeds can be used by applications to block or open-source blocklist providers lack clear documentation about restrict access. One example are feeds of Tor exit node IPs, their structure, curation process, contents, dynamics, and inter- e.g., used by Wikipedia to block users of the Tor anonymity relationships with other providers. In this paper, we perform network from editing Wikipedia due to abuses in the past [3]. a transparency and content analysis of 2,093 free and open source blocklists with the aim of exploring those questions. To Blocklists can be proprietary (i.e., commercial) or open that end, we perform a longitudinal 6-month crawling campaign source. The former are often available through rate-limited, yielding more than 13.5M unique records. This allows us to shed license-based, or pay-per-use mechanisms and are maintained light on their nature, dynamics, inter-provider relationships, and by for-profit companies specialized in threat intelligence.
    [Show full text]
  • 9 Things Every Marketer Must Know About Email
    THINGS EVERY MARKETER MUST KNOW ABOUT EMAIL with Greg Kraios & Chris Arrendale Inbox Pros TABLE OF CONTENTS CHAPTERS 1 Deliverability Branding 3 2 Shared IP vs. Dedicated IP 7 3 Feedback Loops 13 4 No-Reply's 18 5 Setting Subscriber Expectations 21 6 Single Opt-In vs. Double Opt-In 29 7 Permission Marketing 37 8 Email Authentication 44 9 Email Throttling 50 250ok.com | InboxPros.com 2 Your domain is your identity. Write that down on a Post-It Note and stick it to your monitor. Now repeat after us, “my domain is my identity.” DELIVERABILITY It’s the identity that your customers, the recipients of your marketing and transactional messages, have come to trust, or believe they can. It’s this trust that you must BRANDING: YOUR guard as if your business depends on it because it often DOMAIN IS YOUR does. How so? In the 2015http://www.pardot.com/blog/the-2015-email-marketing-landscape/ State of Marketing Report, the Salesforce survey of 5,000 marketers revealed 20% of IDENTITY the audience reported their business primary revenue source is directly linked to email operations. Those people saying email is dead? Tell them to put that stat in their pipe and smoke it (in locations where that’s legal, of course). So, in an eort to get your identity in order, we are going to focus on the Display Name or Friendly From, From Address, and the links used within the email. EMAIL, STILL NOT DEAD 3 1 | DELIVERABILITY BRANDING THE INBOX EXPERIENCE The Friendly From, subject line, and preview text are the In a perfect world, an intuitive and consistent first connections your message has with a subscriber.
    [Show full text]
  • Contents Software Description:
    Swift Email Processor v2.0 www.webemailverifier.com Support: www.webemailverifier.com/supportsuite/ Contents Software Description: ................................................................................................................................... 3 Program GUI Screenshots: ............................................................................................................................ 4 Program Features: ........................................................................................................................................ 9 Chapter 1: Installation and Settings Configuration ..................................................................................... 11 Configuration and Settings: .................................................................................................................... 12 Chapter 2: Using the Proxy Servers Module ............................................................................................... 31 Chapter 2.1: X-Originating-IP email header & Proxy Acceptable Usage Policy .......................................... 35 Chapter 3: Sending Messages using the Sender Module ........................................................................... 36 3.1: Unsubscribe link placements ........................................................................................................... 49 3.2: Installing and using the MySQL/MariaDB CRUD API script or application ...................................... 50 3.2.1 Installing MySQL API on Linux Server running
    [Show full text]
  • Messaging, Malware and Mobile Anti-Abuse Working Group M3AAWG Best Current Practices for Building and Operating a Spamtrap Version 1.2.0 Updated August 2016
    Messaging, Malware and Mobile Anti-Abuse Working Group M3AAWG Best Current Practices For Building and Operating a Spamtrap Version 1.2.0 Updated August 2016 Table of Contents INTRODUCTION .............................................................................................................................................. 1 SPAMTRAP GOALS/PURPOSE ........................................................................................................................ 2 SPAMTRAP ADDRESSES .................................................................................................................................. 2 ISSUES WITH ADDRESSES ............................................................................................................................................................. 3 IMPLEMENTATION CONSIDERATIONS .................................................................................................... 3 ANALYSIS ............................................................................................................................................................ 4 SECURITY ........................................................................................................................................................... 5 INFORMATION SHARING .............................................................................................................................. 5 HINTS AND PITFALLS ....................................................................................................................................
    [Show full text]
  • Modul 42 Spam
    Modul 42 Spam Studienbrief 1: Grundlagen Studienbrief 2: Spam-Techniken Studienbrief 3: Anti-Spam Techniken Studienbrief 4: Rechtslage Autoren: Christopher Wolf Sebastian Uellenbeck 1. Auflage Ruhr-Universität Bochum © 2013 Ruhr-Universität Bochum Universitätsstraße 150 44801 Bochum 1. Auflage (17. Juli 2013) Didaktische und redaktionelle Bearbeitung sowie Produktion: Romy Rahnfeld (M. A. Germanistik Sprachwissenschaft/Erziehungswis- senschaft) Das Werk einschließlich seiner Teile ist urheberrechtlich geschützt. Jede Ver- wendung außerhalb der engen Grenzen des Urheberrechtsgesetzes ist ohne Zustimmung der Verfasser unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspe- icherung und Verarbeitung in elektronischen Systemen. Inhaltsverzeichnis Seite3 Inhaltsverzeichnis Einleitung zu den Studienbriefen6 I. Abkürzungen der Randsymbole und Farbkodierungen.......6 II. Zu den Autoren..............................7 III. Modullehrziele..............................8 Studienbrief 1 Grundlagen9 1.1 Lernziele..................................9 1.2 Einleitung.................................9 1.2.1 E-Mail...............................9 1.2.2 Spam................................ 11 1.2.3 RFC (Request for Comments).................. 15 1.2.4 Gliederung............................ 16 1.2.5 Kontrollaufgaben......................... 16 1.3 Internet................................... 17 1.4 E-Mail-Infrastruktur........................... 17 1.4.1 Kommunikationsmodell..................... 18
    [Show full text]
  • Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities PH.D THESIS Antonio Nappa Copyright c February 2016 by Antonio Nappa DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ Defending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor en Inform´atica Author: Antonio Nappa Advisor Dr. Juan Caballero February 2016 Jury: Somesh Jha, Professor of Computer Sciences - University of Wisconsin-Madison Lorenzo Cavallaro, Senior Lecturer of Computer Sciences - Royal Holloway University of London Juan Manuel Est´evez Tapiador, Profesor Titular de Universidad - Universi- dad Carlos III de Madrid Victor A. Villagr´a, Profesor Titular de Universidad - Universidad Polit´ecnica de Madrid Boris K¨opf, Assistant Research Professor - IMDEA Software Institute Carmela Troncoso, Researcher - IMDEA Software Institute Manuel Carro, Profesor Titular de Universidad - Universidad Polit´ecnica de Madrid Resumen de la tesis Esta tesis se centra en el an´alisisde dos aspectos complementarios de la ciberdelin- cuencia (es decir, el crimen perpetrado a trav´esde la red para ganar dinero). Estos dos aspectos son las m´aquinasinfectadas utilizadas para obtener beneficios econ´omicosde la delincuencia a trav´esde diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utiliza- dos para gestionar estas m´aquinas(por ejemplo, C & C, servidores explotadores, servidores de monetizaci´on,redirectores). En la primera parte se investiga la exposici´ona las amenazas de los orde- nadores victimas.
    [Show full text]
  • M3AAWG Complaint Feedback Loop Best Current Practices
    Messaging Anti-Abuse Working Group (MAAWG) Complaint Feedback Loop Best Current Practices April 2010 Introduction Complaint Feedback Loops similar to those described herein have existed for more than a decade, resulting in many de facto standards and best practices. This document is an attempt to codify, and thus clarify, the ways that both providers and consumers of these feedback mechanisms intend to use the feedback, describing some already-common industry best practices. This paper is the result of cooperative efforts within the Messaging Anti-Abuse Working Group. MAAWG is the largest global industry association working against Spam, viruses, denial-of-service attacks and other online exploitation. It members include ISPs, network and mobile operators, key technology providers and volume sender organizations. It represents over one billion mailboxes worldwide and its membership contributed their expertise in developing this description of current Feedback Loop practices. Table of Contents Glossary of Standard Terms ...................................................................................................................................................2 Overview.................................................................................................................................................................................5 Mailbox Providers and Feedback Providers ..........................................................................................................................6 Benefits of Providing Feedback
    [Show full text]
  • Mail Assure Admin Guide
    Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Monday, February 11, 2019 ----------- ©2019 CONTENTS Getting Started 1 Useful Links 1 Accessing Mail Assure 1 User Permissions 3 Timeout Settings 4 Supported Web Browsers 4 Multi-admin control panel access and audit trail 4 Retrieve Log-in Link 6 Existing Account - Forgotten Password 7 Create New Email Account via the Retrieve Log-in Link 7 Send User Customized Link to Reset Password 7 Admin Level Control Panel 7 What do you want to do? 7 Domain Level Control Panel 8 Accessing the Domain Level Control Panel 8 Email Level Control Panel 8 Accessing the Email Level Control Panel 9 What do you want to do? 9 Using the 'Login as' Feature 9 Log in as a Domain user. 9 Log in as an Email User 10 Finish Login as Session 11 Start a Free 30-day Trial with Mail Assure 11 Application Overview 12 Navigating Mail Assure 12 Customize Dashboard 12 Mail Assure Edit Dashboard Panel Group 13 Add a Widget 13 Reset to Default Dashboard Setting 13 Features Preview 14 List of features in Preview mode 14 API Logs (Preview) 14 Archive Usage (Preview) 15 Email Scout Report Templates (Preview) 16 Create Email Scout Report Template 17 View Incoming/Outgoing Reports from a Particular Template 25 On-demand Archive Index 26 What's New 27 New Navigation/Dashboard Feature Mapping 36 Admin Level Mappings 36 Domain Level Mappings 41 Email Level Mappings 45 FAQs 47 Troubleshooting Tips 49 Incoming mail is wrongly blocked 49 Incoming spam is getting through 49 Outgoing mail is wrongly blocked 50 Report Security
    [Show full text]