Everything Starts Here
Reasons For Email Bombing
11/05/2015 15:56
Email bombing is the procedure of sending out a great deal of mails right into someone's mailbox, with an intent to influence the os of a computer system or a network. It is also described as email flooding, as the targeted mailbox is swamped with a barrage of mails. When your mail box is flooded with unwanted and also junk emails, your mail box storage capacity will obtain worn down as well as you will not be able to receive any type of mails even more. This activity stops you from reading the reputable mails. It can even be utilized to completely overload any company's mail server. It is done deliberately with an intent to influence the DOS (Disk Operating System) of a computer system.
The strength of email bombing could also lead to crashing of the os and also the mail web servers. It has the ability to take in the entire system. By limiting the customer quota to a specific storage capacity, it can aid to limit its overflow. The cyberpunk intends to shut down the internet site of a target, by sending email bombs. The very first well-known case of email battle was done by Tamil guerrilla groups versus the Sri Lankan government. Tamil guerrillas overloaded the system of Sri Lankan consular offices with an email including the story ~ "We are the Net Black Tigers and also we're doing this to interrupt your communications".

Overloading of the network link
Loss of connectivity
Denial of service
Consumption of all system sources
Syslog entries
Preventive Measures
Use Proxy Servers
If the email bombs are incoming from several IP addresses, it's challenging to spam as well as filter every single mail from those addresses. In this case, utilizing proxy web servers will assist to minimize the issue. The computer systems in a certain network, will be linked to a proxy web server, which is another computer. The client computers request for details and sources of other computer systems, to the proxy server. The proxy server addresses the demand and sends the details, after filtering the messages which is done according to the filtering system policies of the proxy. It look for malware content and also filters the messages from suspicious IP addresses and protocols prior to transferring it to its customers. This way, proxy web servers, shield the network and also tackle the complexity of the local area network.
—————
