ebook img

Blocking Spam and Spyware for Dummies (ISBN - 0764575910) PDF

387 Pages·2021·2.9 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Blocking Spam and Spyware for Dummies (ISBN - 0764575910)

by Peter Gregory and Michael A.Simon Blocking Spam & Spyware FOR DUMmIES ‰ 01_575910 ffirs.qxd 3/15/05 3:46 PM Page i 01_575910 ffirs.qxd 3/15/05 3:46 PM Page ii by Peter Gregory and Michael A.Simon Blocking Spam & Spyware FOR DUMmIES ‰ 01_575910 ffirs.qxd 3/15/05 3:46 PM Page i Blocking Spam & Spyware For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at www.wiley.com/ go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REP- RESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CON- TENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CRE- ATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CON- TAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FUR- THER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFOR- MATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. For general information on our other products and services, please contact our Customer Care Department within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit www.wiley.com/techsupport. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Control Number: 2005923217 ISBN-13: 978-0-7645-7591-4 ISBN-10: 0-7645-7591-0 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/QR/QU/QV/IN 01_575910 ffirs.qxd 3/15/05 3:46 PM Page ii About the Authors Peter Gregory, CISA, CISSP, is a career IT guy who has worn just about every hat that could be worn in the Data Processing/Information Systems/Information Technology business. Peter has IT experience in government, banking, non- profit, legalized gambling, and telecommunications. The Usenet-E-mail- Internet bug bit him in the mid 1980s. He has spent the past eleven years in two wireless telecom companies, working in positions where he develops security policy, security architecture, and security emergency response teams, and is a security consultant in general. His passion for computers is matched only by his dedication to helping people know how to use information systems — from personal computers to mainframes — more effectively and safely. He achieves this through his speaking appearances at security conferences, in ComputerWorld and other online publications, and through a security consulting company that he co- founded in 2002. Peter lives at Alki Beach in West Seattle, Washington, and enjoys antique shopping; driving his old German car on twisty, tree-lined roads; movies; looking for beach glass; and relaxing with friends in local coffee houses. Michael A. Simon works as a computer security consultant in the Seattle area and the northwestern U.S. with clients in banking, e-commerce, health care, and biotechnology. Mike has been working in IT security for around 20 years and wrote his first programs on punched cards for an IBM mainframe in the early 1980s. Although he doesn’t get much chance to exercise his skills in COBOL or Fortran these days, he keeps a deck of blank IBM punch cards around just in case. For the last 10 years, Mike has been working for the company that he co- founded with Corwin Low when the Internet was more innocent, and convinc- ing people of security’s importance was a difficult task. Mike keeps busy assessing new threats for his clients, lecturing at Seattle University and the University of Washington, and advancing the public service goals of Northwest Security Institute, a non-profit that he helped to found. When he steps away from the structured electron flows, Mike can be found roaming around the Olympic Peninsula or the Oregon coast with his wife, Dawn, and dog, Coda. 01_575910 ffirs.qxd 3/15/05 3:46 PM Page iii 01_575910 ffirs.qxd 3/15/05 3:46 PM Page iv Dedications Peter Gregory dedicates this book to Laney, Lexie, and Regan. I dearly love and miss you all. Michael A. Simon dedicates this book to Dawn. Authors’ Acknowledgments Peter Gregory would first like to thank Melody Layne, acquisitions editor at Wiley, for her vision, guidance, and drive. Mike and I are likewise grateful for Rebecca Huehls, our project editor who knows the For Dummies brand and how to produce a top-notch For Dummies book. We are also highly apprecia- tive of all the copy editors — Barry Childs-Helton, Virginia Sanders, and Jean Rogers — who suggested hundreds of valuable changes in the manuscript. Special thanks also go to Satnam Purewal for thorough tech editing, and to Wiley’s graphics team for their great illustrations. Just as I got this book started, a number of cataclysmic events happened in my life that made writing this book extraordinarily difficult. Melody and Rebecca were sympathetic and supportive, but we had a book to finish. We agreed that we needed to find a co-author; a local friend and security expert, Mike Simon, graciously agreed to take this project on. Mike brought great insight and experience, which improved the book markedly. Nalleli Lopez Hosek and Janice Winsor read the entire draft manuscript and made numerous productive suggestions to make the book easier to read and understand. And finally, I would like to thank Art, Bob, Michael, Kate, Rietta, Paul, Ron, Tina, Jennifer, Michele, and especially Elizabeth for your support in 2004. Michael A. Simon would like to thank Corwin Low, Sara Boddy, Mark Schulstad, and Raymond Pompon, the staff at Conjungi who put up with my occasional physical or mental absence while I wrote on a deadline. I would like to thank Peter Gregory for dealing with a co-author that hadn’t written a book in 10 years, and for thinking of me when he needed some help. Last, but perhaps most importantly I would like to thank my family, who sup- port me in everything I do, even when they have no idea what I’m doing. If I do something good, it’s because you all make it possible. 01_575910 ffirs.qxd 3/15/05 3:46 PM Page v Publisher’s Acknowledgments We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/. Some of the people who helped bring this book to market include the following: Acquisitions, Editorial, and Media Development Project Editor: Rebecca Huehls Acquisitions Editor: Melody Layne Copy Editors: Jean Rogers, Barry Childs-Helton, Virginia Sanders Technical Editor: Satnam Purewal Editorial Manager: Leah Cameron Media Development Manager: Laura VanWinkle Media Development Supervisor: Richard Graves Editorial Assistant: Amanda Foxworth Cartoons: Rich Tennant, www.the5thwave.com Composition Services Project Coordinator: Erin Smith Layout and Graphics: Carl Byers, Andrea Dahl, Joyce Haughey, Barry Offringa, Lynsey Osborn, Heather Ryan, Mary Gillot Virgin Proofreaders: Leeann Harney, Jessica Kramer, Joe Niesen, Carl William Pierce Indexer: TECHBOOKS Production Services Publishing and Editorial for Technology Dummies Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher Mary Bednarek, Executive Acquisitions Director Mary C. Corder, Editorial Director Publishing for Consumer Dummies Diane Graves Steele, Vice President and Publisher Joyce Pepple, Acquisitions Director Composition Services Gerry Fahey, Vice President of Production Services Debbie Stailey, Director of Composition Services 01_575910 ffirs.qxd 3/15/05 3:46 PM Page vi Contents at a Glance Introduction ................................................................1 Part I: Understanding the Problem ................................9 Chapter 1: Spam and Spyware: The Rampant Menace ...............................................11 Chapter 2: The Spyware Who Loved Me: Stopping Spyware in Its Tracks ..............37 Chapter 3: Understanding the Enemy: What Really Spawns Spam ...........................53 Part II: Justifying and Selecting Spam and Spyware Filters ...................................................69 Chapter 4: Calculating ROI for Your Anti-Spam and Anti-Spyware Measures ..........71 Chapter 5: Developing the Battle Plans ........................................................................89 Chapter 6: Evaluating Anti-Spam and Anti-Spyware Solutions ................................107 Part III: Deploying Your Chosen Solution ...................133 Chapter 7: Training Users and Support Staff .............................................................135 Chapter 8: Planning the Rollout ...................................................................................149 Chapter 9: Rolling Out to the Enterprise ....................................................................177 Chapter 10: Supporting Users ......................................................................................193 Part IV: Maintaining Your Defenses ..........................207 Chapter 11: Everyday Maintenance ............................................................................209 Chapter 12: Handling Thorny Issues ...........................................................................219 Chapter 13: Defense in Depth: Providing Layers of Protection ...............................251 Part V: The Part of Tens ...........................................267 Chapter 14: Ten Spam-Filtering Solutions for the Enterprise ..................................269 Chapter 15: Ten Keys to Successful Spam Filtering ..................................................279 Chapter 16: Ten Spam-Related Issues Most Enterprises Face .................................287 Chapter 17: Ten Spyware-Filtering Solutions for Businesses ..................................295 Chapter 18: Ten Online Resources for Resolving Spam and Spyware ....................307 Chapter 19: Ten Keys to Successful Spyware Filtering .............................................313 Appendix A: Spam and Spyware Filtering Project Plan ...............................................321 02_575910 ftoc.qxd 3/15/05 3:46 PM Page vii Appendix B: Spam and Spyware Filtering Project Requirements ..................................327 Appendix C: Glossary ...............................................341 Index .......................................................................349 02_575910 ftoc.qxd 3/15/05 3:46 PM Page viii

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.