SlideShare a Scribd company logo
Fighting Spam
How prevalent is Spam? According to Scott McAdams, OMA Public
Affairs and Communications Department (www.oma.org):

“Studies show unsolicited or “junk” e-mail, known as spam, accounts
for roughly half of all e-mail messages received. Although once
regarded as little more than a nuisance, the prevalence of spam has
increased to the point where many users have begun to express a
general lack of confidence in the effectiveness of e-mail
transmissions, and increased concern over the spread of computer
viruses via unsolicited messages.”

In 2003, President Bush signed the “Can Spam” bill, in December of
2003 which is the first national standards around bulk unsolicited
commercial e-mail. The bill, approved by the Senate by a vote of 97 to
0, prohibits senders of unsolicited commercial e-mail from using false
return addresses to disguise their identity (spoofing) and the use of
dictionaries to generate such mailers. In addition, it prohibits the use
of misleading subject lines and requires that emails include and opt-
out mechanism. The legislation also prohibits senders from
harvesting addresses off Web sites. Violations constitute a
misdemeanor crime subject to up to one year in jail.

One major point that needs to be discussed about this: spam is now
coming from other countries in ever-greater numbers. These emails
are harder to fight, because they come from outside our country’s
laws and regulations. Because the Internet opens borders and thinks
globally, these laws are fine and good, but do not stop the problem.

So what do you do about this? Her are the top 5 Rules to do to
protect from spam.

Number 1: Do what you can to avoid having your email address out
on the net.

There are products called “spam spiders” that search the Internet for
email addresses to send email to. If you are interested, do a search on
“spam spider” and you will be amazed at what you get back.
Interestingly, there is a site, WebPoison.org, which is an open source
project geared to fight Internet "spambots" and "spam spiders", by
giving them bogus HTML web pages, which contain bogus email
addresses

A couple suggestions for you: a) use form emails, which can hide
addresses or also b) use addresses like sales@company.com instead
of your full address to help battle the problem. c) There are also
programs that encode your email, like jsGuard, which encodes your
email address on web pages so that while spam spiders find it difficult
or impossible to read your email address.

Number 2: Get spam blocking software. There are many programs
out there for this. (go to www.cloudmark.com or
www.mailwasher.net for example). You may also buy a professional
version. Whatever you do, get the software. It will save you time. The
software is not foolproof, but they really do help. You usually have to
do some manual set up to block certain types of email.

Number 3: Use the multiple email address approach.

There are a lot of free email addresses to be had. If you must
subscribe to newsletters, then have a “back-up” email address. It
would be like giving your sell phone number to your best friends and
the business number to everyone else.

Number 4: Attachments from people you don’t know are BAD, BAD,
BAD.

A common problem with spam is that they have attachments and
attachments can have viruses. Corporations often have filters that
don’t let such things pass to you. Personal email is far more “open
country” for spamers. General rule of thumb: if you do not know
who is sending you something, DO NOT OPEN THE ATTACHMENT.
Secondly, look for services that offer filtering. Firewall vendors offer
this type of service as well.

Number 5: Email services now have “bulk-mail” baskets. If what you
use currently does not support this, think about moving to a new
vender. The concept is simple. If you know someone, they can send
you emails. If you don’t know them, put them in the bulk email pile
and then “choose” to allow them into your circle. Spam Blocking
software has this concept as well, but having extra layers seems
critical these days, so it is worth looking into.




   Want this ebook for free..? Click here to
                 download.

More Related Content

What's hot

IST
ISTIST
IST
tails20
 
spam
spamspam
spam
tails20
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
hirakhalid2394
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
Alexander Decker
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt showInformz
 
Spamming Reason
Spamming ReasonSpamming Reason
Spamming Reason
Harish Chand
 
The Internet
The InternetThe Internet
The Internet
k8ierobinson
 
Spam, security
Spam, securitySpam, security
Email
EmailEmail
Email
Dan Hess
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are EverywhereChristos Beretas
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetmaria martha manette madrid
 

What's hot (20)

IST
ISTIST
IST
 
spam
spamspam
spam
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Unit 5
Unit 5Unit 5
Unit 5
 
Deliverability webinar ppt show
Deliverability webinar ppt showDeliverability webinar ppt show
Deliverability webinar ppt show
 
Spamming Reason
Spamming ReasonSpamming Reason
Spamming Reason
 
The Internet
The InternetThe Internet
The Internet
 
402 406
402 406402 406
402 406
 
Chatter
ChatterChatter
Chatter
 
Spam, security
Spam, securitySpam, security
Spam, security
 
Tools to help conquer your email
Tools to help conquer your emailTools to help conquer your email
Tools to help conquer your email
 
Email
EmailEmail
Email
 
Honeypot Projects are Everywhere
Honeypot Projects are EverywhereHoneypot Projects are Everywhere
Honeypot Projects are Everywhere
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internet
 

Viewers also liked

Sending Email
Sending EmailSending Email
Sending Email
primeteacher32
 
Just chatting
Just chattingJust chatting
Just chatting
natterlab
 
Internet Communication
Internet CommunicationInternet Communication
Internet CommunicationMiz Malinz
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolAmandeep Kaur
 
Chatting - R.D.Sivakumar
Chatting - R.D.SivakumarChatting - R.D.Sivakumar
Chatting - R.D.Sivakumar
Sivakumar R D .
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcaRenu Thakur
 
Computer virus
Computer virusComputer virus
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
Internet programming lecture 1
Internet programming lecture 1Internet programming lecture 1
Internet programming lecture 1Mohammed Hussein
 
Report on online chatting
Report on online chattingReport on online chatting
Report on online chattingAmandeep Kaur
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
Divyesh Rakholiya
 
1.4 the harmful effects of microorganism
1.4 the harmful effects of microorganism1.4 the harmful effects of microorganism
1.4 the harmful effects of microorganismSuhailie Samik
 
Sending Email
Sending EmailSending Email
Sending Email
CPIT
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Video Conferencing Ppt
Video Conferencing PptVideo Conferencing Ppt
Video Conferencing PptJAGJITSINGH25
 

Viewers also liked (17)

Sending Email
Sending EmailSending Email
Sending Email
 
Just chatting
Just chattingJust chatting
Just chatting
 
Skype
SkypeSkype
Skype
 
Internet Communication
Internet CommunicationInternet Communication
Internet Communication
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Chatting - R.D.Sivakumar
Chatting - R.D.SivakumarChatting - R.D.Sivakumar
Chatting - R.D.Sivakumar
 
Onlinechat
OnlinechatOnlinechat
Onlinechat
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Internet programming lecture 1
Internet programming lecture 1Internet programming lecture 1
Internet programming lecture 1
 
Report on online chatting
Report on online chattingReport on online chatting
Report on online chatting
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
1.4 the harmful effects of microorganism
1.4 the harmful effects of microorganism1.4 the harmful effects of microorganism
1.4 the harmful effects of microorganism
 
Sending Email
Sending EmailSending Email
Sending Email
 
Email ppt
Email pptEmail ppt
Email ppt
 
Video Conferencing Ppt
Video Conferencing PptVideo Conferencing Ppt
Video Conferencing Ppt
 

Similar to Fighting spam

LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
Chippy Thomas
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
Host It Smart
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
DeepakYadav1095
 
Web spam
Web spamWeb spam
Web spam
Kamal Sharma
 
Spam- A Menace to Society
Spam- A Menace to SocietySpam- A Menace to Society
Spam- A Menace to Society
jsantabarbara
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
Patricia Rountree
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
HabFg
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
Flora Runyenje
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
MichaelFernandez110
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
MallTake
 
The CAN SPAM Act
The CAN SPAM ActThe CAN SPAM Act
The CAN SPAM Act
Jaime Christine Perez
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
Tayfun TEK
 

Similar to Fighting spam (20)

What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Web spam
Web spamWeb spam
Web spam
 
Spam- A Menace to Society
Spam- A Menace to SocietySpam- A Menace to Society
Spam- A Menace to Society
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
The CAN SPAM Act
The CAN SPAM ActThe CAN SPAM Act
The CAN SPAM Act
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Fighting spam

  • 1. Fighting Spam How prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org): “Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.” In 2003, President Bush signed the “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail. The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt- out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail. One major point that needs to be discussed about this: spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem. So what do you do about this? Her are the top 5 Rules to do to protect from spam. Number 1: Do what you can to avoid having your email address out on the net. There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by
  • 2. giving them bogus HTML web pages, which contain bogus email addresses A couple suggestions for you: a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem. c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address. Number 2: Get spam blocking software. There are many programs out there for this. (go to www.cloudmark.com or www.mailwasher.net for example). You may also buy a professional version. Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email. Number 3: Use the multiple email address approach. There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else. Number 4: Attachments from people you don’t know are BAD, BAD, BAD. A common problem with spam is that they have attachments and attachments can have viruses. Corporations often have filters that don’t let such things pass to you. Personal email is far more “open country” for spamers. General rule of thumb: if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well. Number 5: Email services now have “bulk-mail” baskets. If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking
  • 3. software has this concept as well, but having extra layers seems critical these days, so it is worth looking into. Want this ebook for free..? Click here to download.