Javascript must be enabled to continue!
Against the Tell Friend Email Security Vulnerability
View through CrossRef
Today an E-mail service is one principal tool in our daily work and life. We cannot dispense Email services. Spammers continue to develop their techniques to flood our inbox daily. On the other hand, websites are created to be in different types of different goals like news, sports, environments, staticialists, governments, etc. Websites may be in its environments, static sites, programs, or databases, and very often a combination of the three integrating relational databases as a back-end. Websites require intensive care in configuration and programming to assure a security factor, confidentiality, and trustworthiness of the published information. Most websites have many scripts that give visitors elastic options to share some subject's links URL with their friends one of that by using a tell a friend form. One of most well-known attacks over the internet is done by SQL-injection, though SQL-injections back to exploits, weak validation of textual input that is used to build tell friend scripts which cause dangerous attacks threat email user's privacy through cheating attacks. In this paper, the author aims to analyse a tell friend exploit and proposes a solution to stop this exploit.
Category: Information Security.
Title: Against the Tell Friend Email Security Vulnerability
Description:
Today an E-mail service is one principal tool in our daily work and life.
We cannot dispense Email services.
Spammers continue to develop their techniques to flood our inbox daily.
On the other hand, websites are created to be in different types of different goals like news, sports, environments, staticialists, governments, etc.
Websites may be in its environments, static sites, programs, or databases, and very often a combination of the three integrating relational databases as a back-end.
Websites require intensive care in configuration and programming to assure a security factor, confidentiality, and trustworthiness of the published information.
Most websites have many scripts that give visitors elastic options to share some subject's links URL with their friends one of that by using a tell a friend form.
One of most well-known attacks over the internet is done by SQL-injection, though SQL-injections back to exploits, weak validation of textual input that is used to build tell friend scripts which cause dangerous attacks threat email user's privacy through cheating attacks.
In this paper, the author aims to analyse a tell friend exploit and proposes a solution to stop this exploit.
Category: Information Security.
.
Related Results
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Next steps in capturing vulnerability dynamics: Introducing a connectivity-based model on systemic vulnerability to multi-hazards
Vulnerability has been acknowledged as a dynamic concept since the Pressure and Release model of Blaikie et al. (1994), as well as by other well-known models that integrate this ri...
Research of Email Classification based on Deep Neural Network
Research of Email Classification based on Deep Neural Network
Abstract
The effective distinction between normal email and spam, so as to maximize the possible of filtering spam has become a research hotspot currently. Naive bay...
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
Ecological vulnerability assessment based on remote sensing ecological index (RSEI): A case of Zhongxian County, Chongqing
The ecological vulnerability evaluation index was established through Normalized Difference Vegetation Index (NDVI), Wetness (WET), Normalized Difference Build-up and Soil Index (N...
User Motive Factors: The Rudiments to Email Satisfactory Communication
User Motive Factors: The Rudiments to Email Satisfactory Communication
Our study aims to evaluate if user motive factors, comprising; cognitive needs, social integrative needs, and personal integrative needs might influence email satisfactory communic...
Vulnerability and informal caregiver: a scoping review
Vulnerability and informal caregiver: a scoping review
AbstractObjectiveThis review paper examines the concept of vulnerability in the overall literature and its relation to informal caregivers.Vulnerability is frequently associated wi...
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
The Analyses of Forest Fire Vulnerability at Taman Hutan Raya (Tahura) Nipa-Nipa Kendari City1
Forest fires are one of the environmental problems that recur almost every year in Indonesia. This problem if not handled properly will certainly cause various negative impacts suc...
Evaluation, Security
Evaluation, Security
Abstract
Security evaluation
is a broad term that encompasses diverse subjects, from product and system certification to an organization's operat...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

