Realizzazione Di Un Server Di Posta (Pop3, Imap E Smtp) Con Particolare Attenzione Ai Filtri Antispam

Total Page:16

File Type:pdf, Size:1020Kb

Realizzazione Di Un Server Di Posta (Pop3, Imap E Smtp) Con Particolare Attenzione Ai Filtri Antispam UNIVERSITA’ DEGLI STUDI DI PAVIA SEDE DISTACCATA DI MANTOVA FACOLTA’ DI INGEGNERIA Corso di Laurea in Ingegneria Informatica Tesi di Laurea REALIZZAZIONE DI UN SERVER DI POSTA (POP3, IMAP E SMTP) CON PARTICOLARE ATTENZIONE AI FILTRI ANTISPAM Laureando: Mariella Franciosi Relatore: Prof. Giuseppe Federico Rossi Anno Accademico 2004/2005 RINGRAZIAMENTI Un particolare ringraziamento desidero porgerlo al Professor Giuseppe Federico Rossi per la disponibilità e l’aiuto offerto per lo svolgimento del mio progetto. Ringrazio inoltre Emanuele Goldoni e Luca Capisani per l’appoggio e il prezioso supporto. Infine un grazie anche alla mia famiglia, a Davide e a tutti i miei amici e compagni di studi che mi sono stati vicini per raggiungere questo importante traguardo. 2 INDICE Pag. 1. Introduzione alla posta elettronica………..………………………………………………….. 6 1.1. Composizione…………………….…….…………………………………………………. 6 1.2. Funzionamento………………….…….…………………………………………………... 8 1.3. Formato dei messaggi di posta e MIME…….……………………………………………. 8 1.4. Protocolli…………………………………………………………………………………. 14 1.4.1. Il protocollo SMTP……………………………………………………………….. 14 1.4.2. Il protocollo POP…………………………………………………………………. 19 1.4.3. Il protocollo IMAP………………………………………………………………... 22 1.4.4. Posta elettronica basata sul web – HTTP…………………………………………. 28 2. Introduzione allo Spam………………………………………………………………………. 30 2.1. Tipologie di posta indesiderata e di spammer….………………………………………… 31 2.2. Spam in percentuale……………………………………………………………………… 31 2.3. Categorie di spam………………………………………………………………………... 32 2.4. Costi…………………………………………………………………………………….... 33 2.5. Spamming permesso, opt-in/opt-out……………………………………………………... 34 2.6. Provvedimenti legislativi………………………………………………………………… 36 3. Tecniche con cui lo spammer recupera indirizzi…………………………………………... 39 3.1. Dictionary Attack……….………………………………………………………………... 39 3.2. Liste di indirizzi………….……………………………………….………………………. 39 3.3. Spambot………………….…………………….…………………………………………. 39 3.4. Cavalli di Troia………….……………………………………….……………………….. 41 3.5. Web Bug……………….………………………………………….……………………… 41 3.6. Dialer………………….………………………………………….………………………. 42 4. Cosa fare quando si riceve spam.…………………………………………………………… 43 5. Regole e trucchi per la prevenzione………………………………………………………… 45 5.1. Consigli utili……………….………………………………………….…………………. 45 5.2. Address munging…………..………………………………………….…………………. 47 5.2.1. Usare Javascript…………………………………………………………………. 48 5.2.2. Codificare l’indirizzo……………………………………………………………. 49 5.2.3. Hiveware Enkoder Form………………………………………………………… 49 6. Come ricavare l’indirizzo dello spammer.………………………………………………… 51 6.1. Analisi delle intestazioni….…………..……………………………..………………….. 51 6.1.1. Database WHOIS on-line……………………………………………………….. 53 3 6.1.2. Sender Policy Framework…….………………………………………………… 54 6.2. Analisi dei siti dello spammer……………………………………………........................ 54 6.2.1. Siti click-through……………………………………………………………….. 54 6.2.2. Siti nascosti in routine Javascript….…………………………………………… 55 7. Tecniche di falsificazione e occultamento dell’indirizzo IP……..….…………………...... 56 7.1. Falsificazione degli header “Received”………..………………………………………... 56 7.2. Remailer anonimo…………..………….………………….............................………….. 57 7.2.1 Remailer di tipo 0, Pseudo-Anonymous………………………………………….. 57 7.2.2 Remailer di tipo 1, Cypherpunk……….………………………………………….. 57 7.2.3 Remailer di tipo2, Mixmaster………….………………………………………….. 57 7.3. IP Spoofing………………………………………..…………………………………….. 58 7.4. Proxy insicuri……………………………….…………..……………………………….. 59 7.5. Relay aperti………………………………………….……..……………………………. 59 7.5.1 Relay multihop………………………………………………..…………………… 60 7.6. Direct-to-MX………..…………………………….……………….…………………….. 62 7.7. URL camuffate..………………………………………….……………………………… 62 8. Come reclamare e a chi………………………………………….…….…………………… 64 8.1. Cosa dovrebbe fare un provider.…………………………………….…………………… 66 9. Metodi per limitare lo spam……………………………………..…………….…………… 67 9.1. Liste di blocco(white/black list)…………………………………….……………………. 67 9.1.1 Tipi di liste di blocco…….........……………………………….……………….... 68 9.1.2 Alcune liste di blocco disponibili….………………….…….….………………... 69 9.2. Filtri antispam.…………………………………………………………………………… 71 9.2.1 Tipi di filtraggio…..……………….…………………….…………………....… 73 9.2.2 Funzionamento…..………………………………………….………..……….… 74 9.2.3 Un particolare tipo di filtri: i filtri bayesiani…………..…………………….….. 74 10. Tools, strumenti software……………………………………………………………………. 79 10.1. SpamAssassin…………………………………………………………………………… 79 10.2. Spam Terminator……………………………………………………….……………….. 82 10.3. Mail Washer ……………………………………………………………………………. 84 10.4. Sam Spade……………………………………………………………….……………… 84 10.5. SpamPal………………………………………………………………….……………… 85 10.6. Spamihilator…………………………………………………………….………………. 85 11. Server di posta per Linux a confronto……………………………………………………… 87 4 11.1. Sendmail……..…………………………………………………….………….……… 87 11.2. Postfix…….….……………………………………………………….……………… 89 11.3. Qmail..……….………………………………………….……………………………. 93 11.4 Exim………….……………………………………………………….………………. 95 12. Client di posta per Linux a confronto…………….………………………………………. 97 12.1 KMail…………………………………………………………………………………. 97 12.2 Mozilla Thunderbird………………………………………………………………….. 98 12.3 Evolution…………………………………………………………………………….... 98 12.4 Sylpheed………………………………………………………………………………. 99 12.5 Pine……………………………………………………………………………………. 99 12.6 Mutt……………………………………………………………………………………. 99 13. Nuovi sviluppi……………………………………….………………………………………101 14. Sperimentazione presso il Laboratorio Reti……….……………………………………...103 14.1 MTA: Postfix………………………………………………………………………….104 14.1.1 Installazione………………………………………………………………….104 14.1.2 Configurazione di base………………………………………………………105 14.1.3 Attivazione…………………………………………………………………...109 14.1.4 Comandi di amministrazione………………………………………………...112 14.1.5 Configurazione antispam e controllo sulle connessioni……………………..114 14.1.6 Alias dei domini locali……………………………………………………….118 14.1.7 Domini di posta virtuali……………………………………………………...119 14.1.8 Raccolta di e-mail dal server (POP/IMAP): Dovecot…………………..……120 14.2 Software antispam: SpamAssassin………………………………………………….121 14.2.1 Installazione…………………………………………………………………..121 14.2.2 Integrazione con Postfix: Procmail…………………………………………...123 14.2.3 Configurazione………………………………………………….…………….125 14.2.4 Allenare i filtri bayesiani……………………………………….……………..127 14.3 Client di posta: KMail………………………………………………………………130 14.3.1 Configurazione.……………………………………………………………….130 14.4 Prove di funzionamento.…………………………………………………………….134 15. Conclusioni……...…...…………………………..…………….……….…………….…….152 16. Appendice A - Provvedimento del Garante della privacy……….……………………….153 17. Appendice B - Files di configurazione principali….…………….……………………......163 18. Riferimenti bibliografici….……………………………………….………………………..193 5 1. INTRODUZIONE ALLA POSTA ELETTRONICA La posta elettronica rappresenta ormai il mezzo di comunicazione asincrono più diffuso. I motivi di tale successo sono da ricondursi essenzialmente alla sua estrema facilità d’uso, velocità, accessibilità ed economicità. Permette di inviare messaggi a più persone contemporaneamente attraverso l’uso delle mailing list, di allegare documenti e consente lo scambio di informazioni multimediale: è possibile spedire, infatti, messaggi contenenti immagini, suoni, video, hyperlink, testo in formato HTML e applet Java. Tuttavia anche la posta elettronica presenta dei limiti. Fra questi l’impossibilità di stabilire un contatto diretto con il destinatario, di avvisare dell’arrivo di un’e-mail, di garantire sicurezza nell’invio e soprattutto la difficoltà nell’identificazione del mittente. Questi ultimi due problemi sono stati in parte superati con l’introduzione della ricevuta di ritorno e con le applicazioni di firma elettronica. Il tallone d’Achille resta comunque la sicurezza. Lo scopo di questa tesi è quello di analizzare il funzionamento della posta elettronica e la sua principale debolezza che è rappresenta dalla minaccia che da diversi anni sta affliggendo gli utenti virtuali: lo spamming. Si focalizzerà quindi l’attenzione su questo fenomeno che sta diventando sempre più attuale per poi fornire un esempio pratico per provare a limitarlo. Prima di tutto, spieghiamo in modo più approfondito come è composta e come funziona la posta elettronica. 1.1 COMPOSIZIONE La posta elettronica si basa su un’architettura client-server con due ruoli: spedizione e ricezione. In particolare racchiude tre componenti principali, come si può osservare in figura: • Il client Æ Mail User Agent (MUA); • Il server Æ Mail Transfer Agent (MTA); • Il protocollo SMTP (Simple Mail Transfer Protocol). 6 I MUA, anche chiamati mail reader, permettono agli utenti di leggere, inoltrare, salvare e comporre messaggi. In questi ultimi tempi si sono sviluppati soprattutto agenti dell’utente con GUI (Graphical User Interface), i quali attraverso interfacce grafiche permettono la composizione di messaggi multimediali. Tra questi i più diffusi sono Eudora, Notes, Microsoft Outlook, Netscape’s Messenger. I MTA, detti anche mail server, gestiscono la ricezione della posta dei loro utenti. Ogni utente ha una casella di posta (mailbox) che risiede nel server di posta. Inoltre l’MTA può effettuare lo smistamento verso altri server (relaying) cercando di evitare lo spamming. Oltre a contenere una mailbox per ogni utente il mail server si compone anche di una coda di messaggi (message queue) che contiene i messaggi da spedire agli altri server. I messaggi spediti e ricevuti sono memorizzati quindi sul server. Il server di posta deve essere sempre attivo, collegato ad internet e condiviso con altri utenti; è gestito dall’ISP (Internet Service Provider) che fornisce l’accesso
Recommended publications
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Antivirus Software Before It Can Detect Them
    Computer virus A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[1][2] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software), including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious.
    [Show full text]
  • Technical and Legal Approaches to Unsolicited Electronic Mail†
    35 U.S.F. L. REV. 325 (2001) Technical and Legal Approaches to Unsolicited Electronic Mail† By DAVID E. SORKIN* “Spamming” is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called “spam,”2 causes or contributes to a wide variety of problems for network administrators, † Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999–2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. The author is grateful for research support furnished by The John Marshall Law School and by sponsors of the Center for Education and Research in Information Assurance and Security. Paul Hoffman, Director of the Internet Mail Consortium, provided helpful comments on technical matters based upon an early draft of this Article. Additional information related to the subject of this Article is available at the author’s web site Spam Laws, at http://www.spamlaws.com/. 1. Spamming: Hearing Before the Subcomm. on Communications of the Senate Comm. on Commerce, Sci. & Transp., 105th Cong. 2 (1998) (prepared statement of Sen. Burns), available at 1998 WL 12761267 [hereinafter 1998 Senate Hearing]. 2. The term “spam” reportedly came to be used in connection with online activities following a mid-1980s episode in which a participant in a MUSH created and used a macro that repeatedly typed the word “SPAM,” interfering with others’ ability to participate.
    [Show full text]
  • Image Spam Detection: Problem and Existing Solution
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 Image Spam Detection: Problem and Existing Solution Anis Ismail1, Shadi Khawandi2, Firas Abdallah3 1,2,3Faculty of Technology, Lebanese University, Lebanon ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Today very important means of communication messaging spam, Internet forum spam, junk fax is the e-mail that allows people all over the world to transmissions, and file sharing network spam [1]. People communicate, share data, and perform business. Yet there is who create electronic spam are called spammers [2]. nothing worse than an inbox full of spam; i.e., information The generally accepted version for source of spam is that it crafted to be delivered to a large number of recipients against their wishes. In this paper, we present a numerous anti-spam comes from the Monty Python song, "Spam spam spam spam, methods and solutions that have been proposed and deployed, spam spam spam spam, lovely spam, wonderful spam…" Like but they are not effective because most mail servers rely on the song, spam is an endless repetition of worthless text. blacklists and rules engine leaving a big part on the user to Another thought maintains that it comes from the computer identify the spam, while others rely on filters that might carry group lab at the University of Southern California who gave high false positive rate. it the name because it has many of the same characteristics as the lunchmeat Spam that is nobody wants it or ever asks Key Words: E-mail, Spam, anti-spam, mail server, filter.
    [Show full text]
  • Factors Involved in Estimating Cost of Email Spam
    Factors involved in estimating cost of Email spam Farida Ridzuan, Vidyasagar Potdar, Alex Talevski Anti Spam Research Lab, Digital Ecosystems and Business Intelligence Institute, Curtin University of Technology. [email protected], {v.potdar, a.talevski}@curtin.edu.au Abstract. This paper analyses existing research work to identify all possible factors involved in estimating cost of spam. Main motivation of this paper is to provide unbiased spam costs estimation. For that, we first study the email spam lifecycle and identify all possible stakeholders. We then categorise cost and study the impact on each stakeholder. This initial study will form the backbone of the real time spam cost calculating engine that we are developing for Australia. Keywords: spam cost, email spam, spam lifecycle 1 Introduction Spamming in email refers to sending unwanted, irrelevant, inappropriate and unsolicited email messages to a large number of recipients. Sending email is fast, convenient and cheap; making it as an important means of communication in business and personal. This is supported by the report from Radicati Group saying that there is a growth of email users from time to time [1]. Dependencies on email usage throughout the whole world provide a huge opportunity to the spammers for spamming. Spamming activities starts from spammers (who create and send spam), but its impacts goes far beyond them, involving Internet Service Provider (ISP), company, and users (spam email recipients) since they represent the key stakeholders. It is undeniable that each stakeholders involved in this activity has to bear some costs associated with spam. Throughout our study, there are a few papers discussing on the costs of email spam, but most of them focuses only on one stakeholder, which is the user.
    [Show full text]
  • NIST SP 800-44 Version 2
    Special Publication 800-44 Version 2 Guidelines on Securing Public Web Servers Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Theodore Winograd NIST Special Publication 800-44 Guidelines on Securing Public Web Version 2 Servers Recommendations of the National Institute of Standards and Technology Miles Tracy, Wayne Jansen, Karen Scarfone, and Theodore Winograd C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2007 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James Turner, Acting Director GUIDELINES ON SECURING PUBLIC WEB SERVERS Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-44 Version 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-44 Ver.
    [Show full text]
  • Anti-Spam Methods
    INTRODUCTION Spamming is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi- legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender. There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems. Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Email spams typically cost users money out-of-pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.
    [Show full text]
  • How Do Spammers Harvest Email Addresses ?
    11/26/12 How do spammers harv est email addresses ? How do spammers harvest email addresses ? By Uri Raz There are many ways in which spammers can get your email address. The ones I know of are : 1. From posts to UseNet with your email address. Spammers regularily scan UseNet for email address, using ready made programs designed to do so. Some programs just look at articles headers which contain email address (From:, Reply-To:, etc), while other programs check the articles' bodies, starting with programs that look at signatures, through programs that take everything that contain a '@' character and attempt to demunge munged email addresses. There have been reports of spammers demunging email addresses on occasions, ranging from demunging a single address for purposes of revenge spamming to automatic methods that try to unmunge email addresses that were munged in some common ways, e.g. remove such strings as 'nospam' from email addresses. As people who where spammed frequently report that spam frequency to their mailbox dropped sharply after a period in which they did not post to UseNet, as well as evidence to spammers' chase after 'fresh' and 'live' addresses, this technique seems to be the primary source of email addresses for spammers. 2. From mailing lists. Spammers regularily attempt to get the lists of subscribers to mailing lists [some mail servers will give those upon request],knowing that the email addresses are unmunged and that only a few of the addresses are invalid. When mail servers are configured to refuse such requests, another trick might be used - spammers might send an email to the mailing list with the headers Return- Receipt-To: <email address> or X-Confirm-Reading-To: <email address>.
    [Show full text]
  • Spam and Spam Prevention
    SPAM AND SPAM PREVENTION 1 WHAT IS SPAM? • Classic definition: • Any kind of unsolicited bulk messages, unwanted by the receiver • Cambridge dictionary: • Email that is sent to a lot of people, esp. email that is not wanted • To send someone an advertisement that they do not want by email 2 WHAT IS SPAM? • According to Finn Brunton: “Spamming the project of leveraging information technology to exploit existing gatherings of attention” • Other definitions: • Breakfast meat sold in tin cans • Abbreviation for Special Processed American Meat 3 MEANINGS OF SPAM • Is spam a noun, adjective or a verb? • It refers to exploitation, malfeasance, and bad behavior. • Spam terminology has branched out into specific subdomains like: “Phishing spam”, “419 spam”, splogs, linkfarms, floodbots, content farms. 4 HISTORY OF SPAM • The three epochs of spam: 1. The first from 1970s – 1995 • During this time spam in this context was loud annoying messages 2. The second phase from 1995 – 2003 • Privatization of network • Passage of CAN-SPAM Act in the United States 3. The most recent phase from 2003 – present day • Algorithms and human attention • Adoption of powerful spam filters 5 SPAM STATISTICS • Out of the emails that people receive daily, about 85% are spam That is about 122.3 billion email spam messages • The most common source: • 10.85% come from IPs based in the United States • 23.52% originated from Russia (largest source of spam unsolicited emails sent) 6 SPAM STATISTICS 2019 VS 2020 2019: 2020: • 50,37% of emails were spam (6,14 • Most common spam: Nigerian Prince spam decrease) • Americans faced a fatality of $703,000 to this • Most originated from Russia (21,27%) type of fraud.
    [Show full text]
  • Studienbriefe-Spam.Pdf
    Spam [Spam] Autoren: Dr. Christopher Wolf Sebastian Uellenbeck Ruhr-Universität Bochum Modul Spam [Spam] Studienbrief 1: Grundlagen Studienbrief 2: Spam-Techniken Studienbrief 3: Anti-Spam-Techniken Autoren: Dr. Christopher Wolf Sebastian Uellenbeck 1. Auflage Ruhr-Universität Bochum © 2017 Ruhr-Universität Bochum Universitätsstraße 150 44801 Bochum 1. Auflage (30. Mai 2017) Didaktische und redaktionelle Bearbeitung: Bärbel Wolf-Gellatly Das Werk einschließlich seiner Teile ist urheberrechtlich geschützt. Jede Ver- wendung außerhalb der engen Grenzen des Urheberrechtsgesetzes ist ohne Zustimmung der Verfasser unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspei- cherung und Verarbeitung in elektronischen Systemen. Um die Lesbarkeit zu vereinfachen, wird auf die zusätzliche Formulierung der weiblichen Form bei Personenbezeichnungen verzichtet. Wir weisen des- halb darauf hin, dass die Verwendung der männlichen Form explizit als geschlechtsunabhängig verstanden werden soll. Das diesem Bericht zugrundeliegende Vorhaben wurde mit Mitteln des Bun- desministeriums für Bildung, und Forschung unter dem Förderkennzeichen 16OH12026 gefördert. Die Verantwortung für den Inhalt dieser Veröffentli- chung liegt beim Autor. Inhaltsverzeichnis Seite3 Inhaltsverzeichnis Einleitung zu den Studienbriefen5 I. Abkürzungen der Randsymbole und Farbkodierungen......... 5 II. Zu den Autoren.............................. 6 III. Modullehrziele.............................. 7 Studienbrief 1 Grundlagen9
    [Show full text]
  • Based on May 2011 Occupational Standards
    Ethiopian TVET-System INFORMATION TECHNOLOGY SUPPORT SERVICE Level I Based on May 2011 Occupational Standards October, 2019 Module Title: Protecting Application or System Software TTLM Code: ICT ITS1 TTLM1019 v1 This module includes the following Learning Guides LG33: Ensure User Accounts are Controlled LG Code: ICT ITS1 M09LO1LG33 LG34: Detect and Remove Destructive Software LG Code: ICT ITS1 M09 LO2LG34 LG35: Identify and Take Action to Stop Spam LG Code: ICT ITS1 M09 LO3 – LG35 Version:01 ICT ITS1 Page No.2 Copyright: Ethiopia Federal TVET Agency Instruction Sheet LG33: Ensure User Accounts are Controlled This learning guide is developed to provide you the necessary information regarding the following content coverage and topics – User Account Control User Account Configuration Notifications Displayed at Logon Utilities Used to Check Strength of Passwords Accessing Information Services This guide will also assist you to attain the learning outcome stated in the cover page. Specifically, upon completion of this Learning Guide, you will be able to – Modify default user settings to ensure that they conform to security policy Previously created user settings are modified to ensure they conform to updated security policy Ensure legal notices displayed at logon are appropriate Appropriate utilities are used to check strength of passwords and consider tightening rules for password complexity Emails are monitored to uncover breaches in compliance with legislation information services are accessed to identify security gaps and take appropriate action using hardware and software or patches Learning Instructions: 1. Read the specific objectives of this Learning Guide. 2. Follow the instructions described below 3 to 6. 3.
    [Show full text]
  • Spam Issues in Developing Countries”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2005), “Spam Issues in Developing Countries”, OECD Digital Economy Papers, No. 99, OECD Publishing. http://dx.doi.org/10.1787/232156241342 OECD Digital Economy Papers No. 99 Spam Issues in Developing Countries OECD Unclassified DSTI/CP/ICCP/SPAM(2005)6/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 26-May-2005 ___________________________________________________________________________________________ _____________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE ON CONSUMER POLICY Unclassified DSTI/CP/ICCP/SPAM(2005)6/FINAL COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Task Force on Spam SPAM ISSUES IN DEVELOPING COUNTRIES English - Or. English JT00185109 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/CP/ICCP/SPAM(2005)6/FINAL FOREWORD The OECD Task force on Spam discussed this document during its meeting in March 2005, and recommended it for declassification to the CCP and ICCP Committees through a written procedure, which was completed on 6 May 2005. The report was prepared by Mr. Suresh Ramasubramanian, Consultant to the OECD. It is published under the responsibility of the Secretary-General of the OECD. Copyright OECD, 2005. Applications for permission to reproduce or translate all or part of this material should be made to: Head of publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16,
    [Show full text]