Tuesday, 11 February 2014

Email Bombing and Spamming

In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.

 A malicious act where huge numbers of e-mails are directed to a specific system or a targeted user of that system. Mail bombs will usually fill the allotted space on an e-mail server for the users e-mail and can result in crashing the e-mail server, or at the very least, possibly rendering the user's computer useless as their e-mail client attempts to download the huge amounts of e-mail. Also called a mail bomb.

Email bombing is a form of denial of service attack that floods an inbox and mail server with messages. If enough messages are sent, the systems may be overloaded and they will stop working. Many Internet service providers (ISPs) regard email bombing as a violation of the terms of service and they will suspend accounts of people involved in such attacks.

There are several ways to coordinate an email bombing attack. One is to send large numbers of email directly, often using multiple accounts. Spreading the emails out over many accounts will also make it harder to pin down the source of the attack, and it will not tip off ISPs that flag high email volume from a single account. A virus can be written to hijack email accounts held by other people and use them to bomb the target.


Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in every dish.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.

Email Bombing & Spamming






In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.

A malicious act where huge numbers of e-mails are directed to a specific system or a targeted user of that system. Mail bombs will usually fill the allotted space on an e-mail server for the users e-mail and can result in crashing the e-mail server, or at the very least, possibly rendering the user's computer useless as their e-mail client attempts to download the huge amounts of e-mail. Also called a mail bomb.


Email bombing is a form of denial of service attack that floods an inbox and mail server with messages. If enough messages are sent, the systems may be overloaded and they will stop working. Many Internet service providers (ISPs) regard email bombing as a violation of the terms of service and they will suspend accounts of people involved in such attacks.

 There are several ways to coordinate an email bombing attack. One is to send large numbers of email directly, often using multiple accounts. Spreading the emails out over many accounts will also make it harder to pin down the source of the attack, and it will not tip off ISPs that flag high email volume from a single account. A virus can be written to hijack email accounts held by other people and use them to bomb the target.


The use of verification emails for mailing lists is designed to prevent abusive signups, but email bombing can involve workarounds. For example, the bomber can create a new email address for the signup, click the link in the confirmation email, and then set up the account to forward to the target. The target will receive the communications from the mailing list and will not be able to unsubscribe because the mailings are not being sent directly through the organization.

Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in every dish.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.