An open proxy can be used by a spammer to anonymously send out spam, using the resources of the owner of the proxy. Use of open proxies complicates both filtering spam and tracking spammers.
Hijacked host - www.spamtrackers.eu/wiki/index.php?title=Hijacked_host
Advice on how to secure an open proxy. | |
Filtering open proxies is an essential step in an effective spam filtering strategy. | |
Tools to test for open proxies. | |
Some open proxies are deliberately installed by a spammer on someone else's computer. | |
It is possible, although somewhat difficult in practice, to trace the abuser of an open proxy or trojan. | |
Honeypots are one method that can be used to trace the abusers of proxies. |