International Journal of Engineering and Advanced Technology (IJEAT)
A picture is able to tell one thousand words. Pictorial representation of any matter is clearer than text. Present time security is more challengeable task in the computer field. No one can say any model/algorithms/idea can't be crack. This paper is basically an idea to visualize the spam mail send by spammer through open relay. Email log file has much information. Lot information can be extracted from a log file. In this paper, two types of log files are described. These are email and firewall logs. This paper shows how a log file is able to visualize the information, attack, and protection against spammer/attacker.