An open proxy can be used by a spammer to anonymously send out spam, using the resources of the owner of the proxy. Use of open proxies complicates both filtering spam and tracking spammers.
|Advice on how to secure an open proxy.|
|Filtering open proxies is an essential step in an effective spam filtering strategy.|
|Tools to test for open proxies.|
|Some open proxies are deliberately installed by a spammer on someone else's computer.|
|It is possible, although somewhat difficult in practice, to trace the abuser of an open proxy or trojan.|
|Honeypots are one method that can be used to trace the abusers of proxies.|