Home Page

Firewalls

Email & Spam

Security Terminology

Security Topics

VPN & Cryptography

Wireless

 

Email Security and Spam Terminology

Zero Day Window

BATV

Bayesian Algorithm

Content and Connection control

Directory Harvesting Attacks

Email Encryption

Email Archiving

File attachments

Image scanning

Email Load balancing

Port forwarding and MX records

Reputation filters

Encrypted attachments

Grey Listing

Email Monitoring

Internal Email Security

Open Relay

Outbound email filtering

Per user quarantine area

Reverse DNS lookup & SPF

RFC Compliant emails

SMTP IMAP4 or POP3

Spoofed email

Stopping spam for Networks guide

Email Throttling

What is Spam

Which Spam filter

Whitelists and Blacklists

 

Security Products Guide

Which Anti-Virus Software?

Which Firewall?

Which Spam Filter?

Which Internet Security Suite?

 

What is Guide

What is a Firewall?

What is a Virus?

What is Spam?

 

Essential Security Guides

Securing Windows XP Guide

Securing Windows Vista Guide

A Guide to Wireless Security

 

Other

Top 8 Internet Security Tips

Why both, Firewall and Anti Virus?

Free or purchased security - Which one?

 

 

 

 

Email File Attachments

 

Breaking down files

Files such as spreadsheets, presentations and word documents make it easier to hide malicious code. A spam proxy firewall should be capable of completely breaking these down, analysing all components and identifying all threats. Most spam firewalls offer deep recursive analysis technology to break down all container files, analysing each one independently and taking appropriate action via content blocking policies.

 

Compressed attachments

Commonly used are zipped attachments. Zipped files can contain any type of file, possibly including file types not allowed through the spam proxy firewall. So being able to unzip a file no matter how deeply nested it is, and checked for all of its content is crucial. Also attachments such as Word documents can contain malicious embedded objects such as macros, html links, java scripts, other scripts and so spam proxy firewalls should be able to check this type of content as well.

Further Reading

Wikipedia's guide to Email Attachments