Tag: Programming

  • MAIL FROM vs From vs Sender – exploiting SPF

    After 10 years of managing computer networks, I still learn something new almost every day. This week I inadvertently discovered that there were many more ways of “identifying” the sender of an e-mail that I had ever known (or in this case, of spoofing the sender an an e-mail). Despite having multiple layers of SPAM […]