Search Details

Word: faked (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Network users can send untraceable fake e-mailthrough port 25--an "open base" or area in thenetwork used to send and receive messages-in orderto avoid detection...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...Sending fake "write message"--messages whichare written directly to the screen of alogged-on-user--is also possible...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

...first-year student says he sends fake writemessages through port 811, a similar open base...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

Computer experts say there are ways to detectsome fake e-mail (please see graphic, thispage,) but most students do not know...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

During a Harvard Computer Society seminar lastmonth called" Avoiding Big Brother," PhilCartagena '96, a society members, said that byusing mail reading programs that allow users tosee the whole mail header--such as the "mail" or"elm readers--students can sometimes tell theauthentic-students can sometimes tell theauthentic from the fake. Full headers generallyidentify the computer from which the mail wassent...

Author: By Andrew L. Wright, | Title: Fake E-Mail, Other Abuses Plague 'Net | 4/6/1994 | See Source »

First | Previous | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | Next | Last