Penguin

Differences between current version and previous revision of WhySignEmail.

Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History

Newer page: version 11 Last edited on Sunday, August 29, 2004 7:02:12 am by AristotlePagaltzis
Older page: version 10 Last edited on Sunday, August 29, 2004 7:00:32 am by AristotlePagaltzis Revert
@@ -27,8 +27,8 @@
 You can also use the web of trust as a way of figuring out who spammers are. If the email you recieved is signed by someone in your web of trust then they are unlikely to be a spammer. If it turns out that they are you can set their level of trust to "none" and perhaps lower the amount of trust of everyone who signed their key. A spammer will have a hard time finding people to sign their new key every time they want to send another email. 
  
 ! Viruses 
  
-Even if you run a better OperatingSystem, viruses that use email to propagate typically send themselves to random recipients with a fake " From" header. As above , if you have a history of signing your email, it is easier to convince other people that you didn't send them a particular email. (The Sobig family of viruses have been very successful at propagating using email). 
+Email [Virus]es typically send themselves to random recipients with a fake <tt> From:</tt> header, so yours will invariably be used even if you run a better OperatingSystem. If you have a history of signing your email, it is easier to convince other people that you didn't send them a particular email. (The Sobig family of viruses have been very successful at propagating using email). 
  
 ---- 
 Part of CategorySecurity