Hello Institute of Information Technology Ltd.

A Blog Page of HIIT

Prevention to mass mailing

There are three methods of email bombing: Mass mailing, List linking and ZIP bombing. Mass mailing involves sending several duplicate emails to the same address but can be easily detected by spam filters. The second, List linking, involves subscribing the target email address to different email list subscriptions. The user would always receive spam mail from all these subscriptions and will have to manually unsubscribe from each list separately. Email bombing done using ZIP archived attachments containing millions and billions of characters is known as ZIP bombing.


While you cannot eliminate the chances of being email bombed, there are some preventive & protective measures you can take to reduce their effect. Here are some of them:

  1. Use anti-virus software and firewall :
  2. You can reduce the chances of being attacked, by using anti-virus and putting up a firewall configured to restrict traffic.
    Use email filter applications– Email filters are packages that are used to manage unsolicited emails by filtering emails according to the source address.
    Filter package tools for Windows include:
    • Email Chomper
    • Spam Buster
    • Cactus Spam Filter
    • Spam Killer
  3. Use Proxy Servers :
    It is difficult to spam and filter each and every email bomb coming from different IP addresses. Such a situation could be mitigated with the help of proxy servers. A proxy server is a computer to which all other computers in a particular network are connected. The proxy server has certain rules for filtering the messages it receives requesting for information and resources of the computers connected to it. This helps in filtering malicious requests and messages from suspicious IP addresses before they are sent to the clients of the proxy server.
  4. Using Simple Mail Transfer Protocol (SMTP) :
     Denial of Service attacks can also be solved using SMTP which is a method of authenticating the exchange of messages across Internet protocols. The clients access their mailbox using Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP). Through SMTP, the Mail Submission Agent then transfers a mail or information to the Mail Transfer Agent (MTA). On connecting to the SMTP, the MTA analyses the mail exchange record and IP address of the sender and reject the message if they are found suspicious. Security mechanisms such as authentication and negotiation are processed during the exchange of data.
    It is important that you identify the source of the email bombs and once you have identified it, you need to configure your router or firewall and prevent incoming packets from that address.


Tawheedul Muhimin Sohrab

Student, Lakehead Grammar School




Total Views: good hits

© Hello Institute of Information Technology Ltd. All rights reserved.