You can try an experiment. Compose an e-mail and enter several good e-mail addresses and several non-existent ones. They all get "mailed." Add your address from above. This may hang until you respond; it's a malformed address and needs action from you. Your e-mail client detected that it was malformed. If an e-mail client is smart enough to reject a malformed e-mail address, like aaa@....com, a virus writer can write code that will...
as well. The only difference is her code will delete the address and continue using the good ones.
Dig Deeper on Network intrusion detection and prevention and malware removal
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.