Web spam


Published on

This is a presentation about Web Spam and to prevent from it.

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Web spam

  1. 1. Spam is the practice of sending unwanted, unsolicitedemails to a large number of people.Spam is flooding the Internet with many copies of thesame message, in an attempt to force the message onpeople who would not otherwise choose to receive it.Or -•Emails you did not ask for that were•sent in bulk•from senders you do not knowAbove points are suspicious of being spam.
  2. 2.  Spammers manipulate search engines results in order to target users. Motive can be:  Commercial  Political  Religious Approximately 10-15% of web pages are spam Most spam promotes get-rich-quick schemes, questionable products, fraudulent offers, or pseudo- legal services.
  3. 3. Spam is of two types-A)Cancelable UsenetB)Email spam-o Harvested Address Spamo Virus Spamo Domain Name Spamo Dictionary Spamo Windows Messenger Spamo Hacked Mail Service Spamo Hoax Spam
  4. 4. It refers to spam email in which a single message is sentto 2 or more Usenet groups. This type of spam is directed as “lurkers”, or individualswho read newsgroups but who either do not or infrequentlypost or give their email addresses away. Cancelable Usenet spam reduces the utility ofnewsgroups by forcing through advertising, and as suchdecreases the ability of administrators and managers ofnewsgroups to manage accepted topics. This spam is run at alow cost to those sending out spam.
  5. 5. It refers to spam email that is directed at individual userswith direct addresses. Email spam lists are usually created by scanning Usenetpostings, sterling Internet mailing lists or searching the Webfor addresses. A variant of this form of spam is sent directly to mailinglists and email discussions that are used by public and privateforums. Email spam costs individuals submitting spam emailmoney; for example, ISPs and online services need to pay totransmit spam directly to subscribers.
  6. 6.  The spammers use a computer system (spider or spam-bot). The spam bot looks for the @ symbol. Collects the bit either side of the @ symbol to capture your email address and add it to the spammers database of millions of harvested addresses
  7. 7.  Someone elses computer (not yours) gets infected with a virus. The address book on their computer has your email address. The virus sends a spam to every address on the address book. The virus spoofs the from address in the email it sends i.e. the spam does not appear to have come from the senders email address, instead it says it came from another address taken from the address book. This is why you might receive emails from people saying you sent a virus to them, when you know your computer is clean
  8. 8. You can sometimes receive dictionary spamwhen you use a well known email service. The spammers know that there is going tobe a janesmith@bigmail.xyz. They setup computers to spam billions ofnames at that mail service simply by targeting everypersons name.
  9. 9. Some ISPs or webmail services may behacked by spammers or the addresses may be soldto spammers. Read the small print when signing up for anemail account. Look hard for that box that says wemight give your address to a 3rd party, tick here ifyou do not want to receive marketing info fromother companies....
  10. 10.  These are messages that innocent people may forward to you with some kind of hoax warning or way to make a fortune. Never respond to or forward this kind of message. They are hoaxes, see real example below. If you CC (copy in) your friends and contacts you may be providing a way for spammers to harvest the email addresses of your friends/contacts. These rubbish emails sometimes end with something like: "Try it; What have you got to lose?" What you have to lose is your privacy and credibility!
  11. 11.  The following keywords can be used to identify web spammers in this industry. (23 April 2008 results)
  12. 12. a)Use a separate email address.b)Consider acquiring multiple email addresses for different purposes.c)You can subscribe to services online that provide you with disposable addresses.• http://email.about.com/library/weekly/aa072002a.htm• http://sneakemail.com•
  13. 13. d)Remove your email address from your website.e)Never buy anything from a company that spam-over 95% of spam offers are scams!f)Filter your email-For more anti-spam filtering information, visit: http://email.about.com/cs/spamfiltering/ http://email.about.com/library/howto/htnegativespamfilter.htmg)Consider subscribing to a spam prevention service.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.