"Make no mistake about it--spam and viruses are deliberate,
malicious assaults on our systems that often work together to
penetrate and compromise our networks. A popular dirty trick by
spammers is to plant malicious code in their spew to exploit
recipients' systems. Remember jeem.mail.pv? Proxy-guzu? These sweet
little Trojans, just two of many, compromise Windows boxes and turn
them into spam servers. The moral here? Keep spam off your network
and it will be considerably more secure.
"While the vast majority of viruses, Trojans, worms, and other
malware are aimed at Windows, users of Linux, Unix, BSD, and MacOS
should not be complacent. You never know where the next exploit
will be aimed. We'll look at server-level defenses in part 1 of
combating the two-headed monster, while part 2 will cover the
client side, including how to decode mail headers and recognize
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.