
{"id":576,"date":"2009-08-21T10:02:18","date_gmt":"2009-08-21T13:02:18","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=576"},"modified":"2009-08-21T10:02:18","modified_gmt":"2009-08-21T13:02:18","slug":"smtputils-herramienta-para-probar-si-un-mta-es-open-relay","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/","title":{"rendered":"SMTPUtils &#8211; Herramienta para probar si un MTA es Open relay"},"content":{"rendered":"<div style=\"text-align: justify;\"><span style=\"font-weight: bold;\">The Open Source tool for tuning your SMTP server<\/p>\n<p><\/span><span style=\"font-weight: bold; color: #006600;\">SMTPUtils<\/span> es una herramienta de c\u00f3digo abierto, pensada para ser utilizada en asegurar los <span style=\"font-weight: bold;\">servidores de correo electr\u00f3nico<\/span>, mediante pruebas o an\u00e1lisis, los cuales brindan al administrador del servicio o al personal de seguridad inform\u00e1tica, un resumen de su implementaci\u00f3n.<\/div>\n<p><span style=\"font-weight: bold;\"><br \/>\n<\/span><\/p>\n<p style=\"font-weight: bold;\">Caracteristicas:<\/p>\n<p>1. Resuelve por registro MX<br \/>\n2. Chequeo de <a href=\"http:\/\/es.wikipedia.org\/wiki\/Open_Relay\">open relay<\/a><br \/>\n3. Pruebas al antivirus perimetral<br \/>\n4. Pruebas al sistema antispam<br \/>\n5. Pruebas de Performance<br \/>\n6. Obtenci\u00f3n de informaci\u00f3n<br \/>\n7. Chequeo por DNSBL (Versi\u00f3n 0.2)<br \/>\n8. Soporte para SPF (Versi\u00f3n 0.3)<br \/>\n9. Auto detecci\u00f3n greylisting (Versi\u00f3n 0.3)<br \/>\n10. Soporte para Ping (Versi\u00f3n 0.3)<\/p>\n<p><strong>Licencia:<\/strong> Tanto la aplicaci\u00f3n como el c\u00f3digo fuente usan la licencia GPL versi\u00f3n 3.<\/p>\n<p><span style=\"font-weight: bold;\">Paltaforma<\/span>:  Linux y MS Windows esta pensado que en un futuro pudiera funcionar sobre FreeBSD y Mac OS X<\/p>\n<div style=\"text-align: justify; font-style: italic;\">\n<blockquote><p><span style=\"font-size: 130%;\">In these times where the number has grown of Spam and virus, as well as bad people, they try to be take advantage of failures or bad configurations of the services SMTP, this does necessary to include a tool that us report of the state of our service, to determine the possibility that this be they Open relay, their behavior before the attacks of virus and spam, as well as the performance of the service in large volumes. They are things that SMTPUtils can do for you.<\/span><\/p><\/blockquote>\n<\/div>\n<p><span style=\"font-size: 130%;\"><a style=\"font-weight: bold;\" href=\"http:\/\/smtputils.sourceforge.net\/\">Descarga y web del proyecto<\/a><\/span><\/p>\n<p><span style=\"font-size: 130%;\">Fuente: Cryptex<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Open Source tool for tuning your SMTP server SMTPUtils es una herramienta de c\u00f3digo abierto, pensada para ser utilizada en asegurar los servidores de correo electr\u00f3nico, mediante pruebas o an\u00e1lisis, los cuales brindan al administrador del servicio o al personal de seguridad inform\u00e1tica, un resumen de su implementaci\u00f3n. Caracteristicas: 1. Resuelve por registro MX [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-576","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - SMTPUtils - Herramienta para probar si un MTA es Open relay<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"SMTPUtils &#8211; Herramienta para probar si un MTA es Open relay\",\"datePublished\":\"2009-08-21T13:02:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\"},\"wordCount\":240,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - SMTPUtils - Herramienta para probar si un MTA es Open relay\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-08-21T13:02:18+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - SMTPUtils - Herramienta para probar si un MTA es Open relay","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"SMTPUtils &#8211; Herramienta para probar si un MTA es Open relay","datePublished":"2009-08-21T13:02:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/"},"wordCount":240,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/","url":"https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - SMTPUtils - Herramienta para probar si un MTA es Open relay","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-08-21T13:02:18+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/smtputils-herramienta-para-probar-si-un-mta-es-open-relay\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/576\/revisions"}],"predecessor-version":[{"id":577,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/576\/revisions\/577"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}