This article provides the basics of what you can do with
e-mail headers. England's University of Bath offers detailed information about the anatomy of e-mail messages (www.bath.ac.uk/bucs/email/anatomy .shtml).
standard for imposing liability for errors in
e-mail header information
According to the company, ServerSide Security, the result of this collaboration, fights online security risks by evaluating e-mails not only by words, but also by word combinations; evaluating information contained in the
e-mail header; detection of phishing e-mails; recognition of e-mail viruses on the basis of dispersion patterns; analysis of social graphs; as well as removal of false positives.
First, look at the
e-mail header and check that all the information in it is correct.
Source Authentication achieves that goal by forcing e-mail to come from the real owner of the address that is in the "Return-Path:" portion of the
e-mail header. It is good practice to view a header for this return path statement at the top of all e-mail message headers.
The new enhancements in this version include scheduled activation and deactivation of policies, and the ability to find and change text in any
e-mail header field and direct incoming e-mail to a specific server based on rule criteria.