Anti-mail bomb
Mail bomb is a destructive use of sending a large number of documents beyond the space specified by the mailbox, so that the target mailbox can no longer process the letter, resulting in the rejection of the mailbox attack. Here are some email bomb tools.
EmailKiller
EmailKiller is relatively cumbersome in similar mail bombs. It can add the target mailbox address to be attacked in the "Target Mailbox" option, but the length of each sent message is limited (depending on the capacity of the target mailbox), the number of threads depends on the speed of the network. In the "Set Letter Content", you can edit the title and content of the sent letter, and the message will be automatically sent and garbled. In other options, you can select the SMTP sender server address and fill in the email sender's mailbox address. It should be noted that the sender server must be the same address as the sender server used by the sender's mailbox. Fill in, you can also take the default value.
MailBomb
MailBomb is a relatively common mail bomb tool that not only can send anonymous letters, you can also add an attachment to the letter sent in. When using this tool, first fill in the target address, fill in a known sending server, and then fill in your own mailbox address (usually fake). However, the server of the sender's mailbox must be consistent with the added server to send it successfully. The content of the email can be edited freely. The "ADD" option can be added to the attachment to be sent, and the number of times can be customized. There are a number of options in the "more" option, including: the ability to set the address of the auto-reply message, the subject of the auto-reply letter, and the name of the sender. After adding the above options, just change the subject back and forth when sending the relevant email, press "Send" to attack (Figure 2).
Honker Honker messenger messenger
bulk mail can be achieved, is a tool for "trouble" mail bomb. Fill in the address of the target mailbox in the mailbox blacklist, press the "+" sign to add the address to be transferred to the list, press the "-" sign to clear the target mailbox in the list. Send mail with Red Guest Messenger, you can use the default option, Red Mail Messenger will send some letters like greetings to the target mailbox. If the letter sent by Red Guest Messenger is opened, it will occupy the target system source until it crashes. .
prevent mail bomb attack methods
First, do not open their own important mail addresses; secondly, the use of e-mail filtering program to reject some damage over the letter addresses your mailbox. As long as you follow the above two methods, you can prevent mail bomb attacks.
hard to prevent bomb
bombs designed to cripple the hard disk data to other losses, but also to target hard disk can not start.
Jiangmin bomb
This is a very dangerous bomb hard disk, run it will lock the hard drive head in a certain position on the boot sector, resulting in soft and hard fake physical damage, resulting in DOS
The various systems above 3.3 cannot be started normally.
we all know, the computer at boot DOS
system will search all the logical drive order, when the DOS
be directed, first of all to go to the master boot sector Partition table information - at the beginning of the OBEH address of the first sector of the zero-headed cylinder of the hard disk - when the partition information starts 80H, it means the main boot partition, the other is the extended partition, the main boot partition It is defined as the logical disk C disk, the logical disk of the extended partition is defined as the D disk, and so on to find E, F, G... Jiangmin bomb is here to modify the normal master boot partition record, the extended partition The first logical disk points to itself. DOS
After finding the first logical disk at startup, finding the next logical disk always finds itself, thus forming an infinite loop, which is to use The reason why the floppy drive, the optical drive, and the dual hard disk cannot be started normally. In fact, Jiangmin bombs only used a small flaw in the launch of DOS
, which made many people feel helpless. Knowing the "locking" principle of Jiangmin bombs, you have to unlock them.
Figure 18-4 Vista original wallpaper screenshots (+ above can be clicked to enlarge) Postscript At
Recently, Jelly received several complaints from colleagues. They reported that they could not acces
. The xp system allows the time bar of the system taskbar to display the exact date in the xp system
Because of the work needs to collect a lot of beautiful pictures in the computer, face more and more
WindowsXP network optimization five strokes simple skills
Practical tips for you to uninstall stubborn programs
Create a textless refreshing desktop in Windown XP system (1)
I like DIY - look at my folder "seventy-two changes"!
The reason why the deep parsing of the registry repair is unsuccessful is that the
gorgeous! Easily dress XP as Windows 7 (5)
Win7 set desktop background rotation effect
Windows XP "click to lock" feature
The computer value of this configuration 3900 is not worth it. Can you play LOL Watch Pioneer?
Four ways to install Linux on Win 8 PC
Can't the Caps Lock button be closed? The master teaches you how to turn off the
Win7 system exe file can not open how to solve
Reinstall Windows 7 system to import XP mode and other virtual machine tutorial
How to use the win10 screen keyboard?