Guided By, Presented By,
Sr, Elsin Chakkalackal S H Senchu
Thomas
Asst. Professor S1 MCA,
Roll No-50
Amal JyothiCollege Of Engineering
 Spam definition
 Spam statistics
 Classification
 Cost
 How spammers earns money
 Spam sending techniques
 Anti-spam techniques
 Conclusion
10/29/15 2
Definition:
 Unwanted or malicious mail is commonly called spam
 Spam also called junk email or bulk email can be defined
as unsolicited e-mail, often of a commercial nature, sent
indiscriminately to multiple mailing lists, individuals, or
newsgroups.
 The intention is to frustrate the receiver and also to
income money.
10/29/15 3
10/29/15 4
Most widely recognized forms of spam in the terms of
media are:
(1) E-Mail spam
(2) Search engine spam
(3) Image spam
(4) Blank spam
10/29/15 5
E-MAIL SPAM:
 E-mail spam, also known as unsolicited bulk email (UBE) or
unsolicited commercial email (UCE)
 It is the practice of sending unwanted e-mail messages,
frequently with commercial content, in large quantities to an
indiscriminate set of recipients.
 Email spam targets individual users with direct mail messages.
 Email spam lists are often created by scanning Usenet postings,
stealing Internet mailing lists, or searching the Web for
addresses.
10/29/15 6
WEB SEARCH ENGINE SPAM:
 It is also called Spamdexing ( spamming and indexing)
 Refers to the practice on the World Wide Web of modifying HTML
pages to increase the chances of them being placed high on
search engine relevancy lists.
 Using sinister methods to have websites rank higher in search
engine results is commonly referred to as “spamdexing”.
10/29/15 7
IMAGE SPAM
 Image spam is a kind of E-mail spam where the message
text of the spam is presented as a picture in an image file.
 Image spam is an obfuscating method in which the text of
the message is stored as a GIF or JPEG image and
displayed in the email.
 Often, image spam contains nonsensical, computer-
generated text which simply annoys the reader.
 It is difficult to detect using spam filtering software
designed to detect patterns in text in the plain-text E-mail
body.
10/29/15 8
BLANK SPAM
 Blank Spam - Spam missing the header and body with no
advertising.
 Blank spam is spam lacking a payload advertisement.
Often the message body is missing altogether, as well as
the subject line. Still, it fits the definition of spam because
of its nature as bulk and unsolicited email.
 Blank spam may be originated in different ways, either
intentional or unintentionally.
10/29/15 9
 Some spammers have a business model that lets them make money
as long as people simply visit their website.
 Selling validated e-mail address lists to other spammers.
 Promoting their own or third-party products.
 Advertising.
10/29/15 10
 Spam is the curse of the Internet.
 It clogs inboxes
 Crashes servers
 Wastes time and money
 Loss of productivity and is an abuse of privacy.
 It raises costs for everyone who uses the Internet.
 It exposes children to inappropriate material.
10/29/15 11
This is called email address harvesting . A large set
of email
addresses are collected without the consent of the address owner.
From mailing lists
From web pages, various web and paper forms
Buying lists from others
By hacking into sites
Harvesting bots.
By guessing & cleaning
10/29/15 12
 Spammers currently use four primary identity concealment
techniques to send untraceable spam.
 The purpose of these techniques is to hide the network
addresses of the spammers’ computers.
(1) Untraceable Internet connections
(2) Bot-networks
(3) Open relays
(4) Open proxies
10/29/15 13
 Send-safe
- Send-Safe is a bulk-emailing program that allows you to
send email from your own computer, or a remote computer with
or without the use of proxies .
 Mass-mailer
-Easy Mass Mailer is a easy and fast email sending
program. Which allows to Send bulk HTML & Text Email,
Attachments and Embedded Images
 Turbo-mailer
-- is a controversial bulk e-mail sending program that
sends out at speeds greater than 50,000 emails per hour on a
dedicated mailing server. Operators often source zombie
computers to send its e-mail.
10/29/15 14
 Discretion
 Use spam filters
 Avoid responding to spam
 Reporting spam
 Avoid Email Harvesting
 Background checks on new users and customers
 Employed by researches and law enforcement
 Disable HTML in Email
10/29/15 15
 The evolution of spam has created a myriad of spam categories
that can plague your inbox, outbox, hard drive, software, and
internet browser.
 The key to protecting yourself and your operating system against
spam is to empower yourself with knowledge. Know what the
typical spam characteristics are, what they look like, and how
they would like to bombard you with both financial and
computerized danger.
 When you stay smart, spam is harmless. However, let your guard
down, and spam can do much more than simply clog your inbox.
10/29/15 16
17
18

Spam

  • 1.
    Guided By, PresentedBy, Sr, Elsin Chakkalackal S H Senchu Thomas Asst. Professor S1 MCA, Roll No-50 Amal JyothiCollege Of Engineering
  • 2.
     Spam definition Spam statistics  Classification  Cost  How spammers earns money  Spam sending techniques  Anti-spam techniques  Conclusion 10/29/15 2
  • 3.
    Definition:  Unwanted ormalicious mail is commonly called spam  Spam also called junk email or bulk email can be defined as unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups.  The intention is to frustrate the receiver and also to income money. 10/29/15 3
  • 4.
  • 5.
    Most widely recognizedforms of spam in the terms of media are: (1) E-Mail spam (2) Search engine spam (3) Image spam (4) Blank spam 10/29/15 5
  • 6.
    E-MAIL SPAM:  E-mailspam, also known as unsolicited bulk email (UBE) or unsolicited commercial email (UCE)  It is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.  Email spam targets individual users with direct mail messages.  Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. 10/29/15 6
  • 7.
    WEB SEARCH ENGINESPAM:  It is also called Spamdexing ( spamming and indexing)  Refers to the practice on the World Wide Web of modifying HTML pages to increase the chances of them being placed high on search engine relevancy lists.  Using sinister methods to have websites rank higher in search engine results is commonly referred to as “spamdexing”. 10/29/15 7
  • 8.
    IMAGE SPAM  Imagespam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file.  Image spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.  Often, image spam contains nonsensical, computer- generated text which simply annoys the reader.  It is difficult to detect using spam filtering software designed to detect patterns in text in the plain-text E-mail body. 10/29/15 8
  • 9.
    BLANK SPAM  BlankSpam - Spam missing the header and body with no advertising.  Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line. Still, it fits the definition of spam because of its nature as bulk and unsolicited email.  Blank spam may be originated in different ways, either intentional or unintentionally. 10/29/15 9
  • 10.
     Some spammershave a business model that lets them make money as long as people simply visit their website.  Selling validated e-mail address lists to other spammers.  Promoting their own or third-party products.  Advertising. 10/29/15 10
  • 11.
     Spam isthe curse of the Internet.  It clogs inboxes  Crashes servers  Wastes time and money  Loss of productivity and is an abuse of privacy.  It raises costs for everyone who uses the Internet.  It exposes children to inappropriate material. 10/29/15 11
  • 12.
    This is calledemail address harvesting . A large set of email addresses are collected without the consent of the address owner. From mailing lists From web pages, various web and paper forms Buying lists from others By hacking into sites Harvesting bots. By guessing & cleaning 10/29/15 12
  • 13.
     Spammers currentlyuse four primary identity concealment techniques to send untraceable spam.  The purpose of these techniques is to hide the network addresses of the spammers’ computers. (1) Untraceable Internet connections (2) Bot-networks (3) Open relays (4) Open proxies 10/29/15 13
  • 14.
     Send-safe - Send-Safeis a bulk-emailing program that allows you to send email from your own computer, or a remote computer with or without the use of proxies .  Mass-mailer -Easy Mass Mailer is a easy and fast email sending program. Which allows to Send bulk HTML & Text Email, Attachments and Embedded Images  Turbo-mailer -- is a controversial bulk e-mail sending program that sends out at speeds greater than 50,000 emails per hour on a dedicated mailing server. Operators often source zombie computers to send its e-mail. 10/29/15 14
  • 15.
     Discretion  Usespam filters  Avoid responding to spam  Reporting spam  Avoid Email Harvesting  Background checks on new users and customers  Employed by researches and law enforcement  Disable HTML in Email 10/29/15 15
  • 16.
     The evolutionof spam has created a myriad of spam categories that can plague your inbox, outbox, hard drive, software, and internet browser.  The key to protecting yourself and your operating system against spam is to empower yourself with knowledge. Know what the typical spam characteristics are, what they look like, and how they would like to bombard you with both financial and computerized danger.  When you stay smart, spam is harmless. However, let your guard down, and spam can do much more than simply clog your inbox. 10/29/15 16
  • 17.
  • 18.