Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.3, May 2012 92 This paper presented a proactive method to shut down a Phisher’s operation by using a Pguard. This effectively stops a phishing attack at its source thereby protecting a significant number of other innocent users from being duped in the future. This is in contrast to the existing passive approach that only attempts to filter suspect email and allows the Phisher to continue his/her operations. While this technique does not prevent an initial phishing email from being sent, once the phishing page has been removed, all future victims are essentially protected from the Phisher. Experimental results show that this approach can be an effective way to remove phishing pages hosted on servers around the world. Furthermore, there is scope to undertake development on more aggressive techniques to address the problem of a non-responsive host Administrator that fails to shut down a phishing site. At present our proactive approach to shutting down a Phisher is performed manually in our laboratory. Future work involves automating this technique. This would involve firstly integrating our approach with an email filtering program to initially detect a potential phishing email. The next step would be to automate the tracing and web host email notification process. The final stage would be to devise a method to tangibly check to see whether a phishing web page has been removed, and if not, what means of action then must take place. Furthermore, we plan to significantly increase the number of phishing subjects used in the experimentation to test the Pguard technique effectiveness.