SlideShare a Scribd company logo
Spam   is the practice of sending unwanted, unsolicited
emails to a large number of people.


Spam  is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.


Or   -
•Emails     you did not ask for that were
•sent     in bulk
•from     senders you do not know


Above points are suspicious of being spam.
   Spammers manipulate search engines results in
    order to target users. Motive can be:
     Commercial
     Political
     Religious

 Approximately 10-15% of web pages are spam
 Most spam promotes get-rich-quick schemes,
  questionable products, fraudulent offers, or pseudo-
  legal services.
Spam is of two types-
A)Cancelable Usenet
B)Email spam-
o Harvested Address Spam

o Virus Spam

o Domain Name Spam

o Dictionary Spam

o Windows Messenger Spam

o Hacked Mail Service Spam

o Hoax Spam
It refers to spam email in which a single message is sent
to 2 or more Usenet groups.

      This type of spam is directed as “lurkers”, or individuals
who read newsgroups but who either do not or infrequently
post or give their email addresses away.

     Cancelable Usenet spam reduces the utility of
newsgroups by forcing through advertising, and as such
decreases the ability of administrators and managers of
newsgroups to manage accepted topics. This spam is run at a
low cost to those sending out spam.
It refers to spam email that is directed at individual users
with direct addresses.

      Email spam lists are usually created by scanning Usenet
postings, sterling Internet mailing lists or searching the Web
for addresses.

       A variant of this form of spam is sent directly to mailing
lists and email discussions that are used by public and private
forums. Email spam costs individuals submitting spam email
money; for example, ISPs and online services need to pay to
transmit spam directly to subscribers.
   The spammers use a computer system (spider or
    spam-bot').

   The 'spam bot' looks for the '@' symbol.

   Collects the bit either side of the '@' symbol to
    capture your email address and add it to the
    spammers database of millions of harvested
    addresses
   Someone else's computer (not yours) gets infected with a
    virus.
   The address book on their computer has your email address.
   The virus sends a spam to every address on the address
    book.
   The virus 'spoofs' the 'from address' in the email it sends i.e.
    the spam does not appear to have come from the senders
    email address, instead it says it came from another address
    taken from the address book.
   This is why you might receive emails from people saying you
    sent a virus to them, when you know your computer is clean
You can sometimes receive dictionary spam
when you use a well known email service.

        The spammers know that there is going to
be a janesmith@bigmail.xyz.

      They setup computers to spam billions of
names at that mail service simply by targeting every
persons name.
Some ISPs or webmail services may be
hacked by spammers or the addresses may be sold
to spammers.

       Read the small print when signing up for an
email account. Look hard for that box that says 'we
might give your address to a 3rd party, tick here if
you do not want to receive marketing info from
other companies...'.
      These are messages that innocent people may
    forward to you with some kind of hoax warning or way to
    make a fortune.


      Never respond to or forward this kind of message.
    They are hoaxes, see real example below. If you 'CC'
    (copy in) your friends and contacts you may be
    providing a way for spammers to harvest the email
    addresses of your friends/contacts. These rubbish
    emails sometimes end with something like: "Try it; What
    have you got to lose?"

   What you have to lose is your privacy and credibility!
   The following keywords can be used to identify web
    spammers in this industry. (23 April 2008 results)
a)Use a separate email address.

b)Consider acquiring multiple email addresses for
   different purposes.

c)You can subscribe to services online that provide
   you with disposable addresses.
•   http://email.about.com/library/weekly/aa072002a.htm
•   http://sneakemail.com
•
d)Remove your email address from your website.

e)Never buy anything from a company that spam-
over 95% of spam offers are scams!


f)Filter your email-
For more anti-spam filtering information, visit:
   http://email.about.com/cs/spamfiltering/
   http://email.about.com/library/howto/htnegativespamfilter.htm


g)Consider subscribing to a spam prevention service.
Web spam
Web spam

More Related Content

What's hot

3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
SafeSpaceOnline
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
Norfolk Naval Shipyard
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
niallmmackey
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
unRFP
 
Survey on Password Security 2019
Survey on Password Security 2019Survey on Password Security 2019
Survey on Password Security 2019
GMX UK
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
Wombat Security Technologies
 

What's hot (6)

3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Survey on Password Security 2019
Survey on Password Security 2019Survey on Password Security 2019
Survey on Password Security 2019
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
 

Similar to Web spam

Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Spam
SpamSpam
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Pinpointe On-Demand
 
Fighting spam
Fighting spamFighting spam
Fighting spam
Darren Lock
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
Chinmayee Behera
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
Souhail Hammou
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
Patricia Rountree
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
jatin batra
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
Host It Smart
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
SaneBox
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
DeepakYadav1095
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
vdgtkhdh
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
MattChapman50
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
AbdulHaseebKhan34
 

Similar to Web spam (20)

Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
Spam
SpamSpam
Spam
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Web spam

  • 1.
  • 2. Spam is the practice of sending unwanted, unsolicited emails to a large number of people. Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Or - •Emails you did not ask for that were •sent in bulk •from senders you do not know Above points are suspicious of being spam.
  • 3. Spammers manipulate search engines results in order to target users. Motive can be:  Commercial  Political  Religious  Approximately 10-15% of web pages are spam  Most spam promotes get-rich-quick schemes, questionable products, fraudulent offers, or pseudo- legal services.
  • 4. Spam is of two types- A)Cancelable Usenet B)Email spam- o Harvested Address Spam o Virus Spam o Domain Name Spam o Dictionary Spam o Windows Messenger Spam o Hacked Mail Service Spam o Hoax Spam
  • 5. It refers to spam email in which a single message is sent to 2 or more Usenet groups. This type of spam is directed as “lurkers”, or individuals who read newsgroups but who either do not or infrequently post or give their email addresses away. Cancelable Usenet spam reduces the utility of newsgroups by forcing through advertising, and as such decreases the ability of administrators and managers of newsgroups to manage accepted topics. This spam is run at a low cost to those sending out spam.
  • 6. It refers to spam email that is directed at individual users with direct addresses. Email spam lists are usually created by scanning Usenet postings, sterling Internet mailing lists or searching the Web for addresses. A variant of this form of spam is sent directly to mailing lists and email discussions that are used by public and private forums. Email spam costs individuals submitting spam email money; for example, ISPs and online services need to pay to transmit spam directly to subscribers.
  • 7. The spammers use a computer system (spider or spam-bot').  The 'spam bot' looks for the '@' symbol.  Collects the bit either side of the '@' symbol to capture your email address and add it to the spammers database of millions of harvested addresses
  • 8. Someone else's computer (not yours) gets infected with a virus.  The address book on their computer has your email address.  The virus sends a spam to every address on the address book.  The virus 'spoofs' the 'from address' in the email it sends i.e. the spam does not appear to have come from the senders email address, instead it says it came from another address taken from the address book.  This is why you might receive emails from people saying you sent a virus to them, when you know your computer is clean
  • 9. You can sometimes receive dictionary spam when you use a well known email service. The spammers know that there is going to be a janesmith@bigmail.xyz. They setup computers to spam billions of names at that mail service simply by targeting every persons name.
  • 10. Some ISPs or webmail services may be hacked by spammers or the addresses may be sold to spammers. Read the small print when signing up for an email account. Look hard for that box that says 'we might give your address to a 3rd party, tick here if you do not want to receive marketing info from other companies...'.
  • 11.
  • 12. These are messages that innocent people may forward to you with some kind of hoax warning or way to make a fortune.  Never respond to or forward this kind of message. They are hoaxes, see real example below. If you 'CC' (copy in) your friends and contacts you may be providing a way for spammers to harvest the email addresses of your friends/contacts. These rubbish emails sometimes end with something like: "Try it; What have you got to lose?"  What you have to lose is your privacy and credibility!
  • 13. The following keywords can be used to identify web spammers in this industry. (23 April 2008 results)
  • 14. a)Use a separate email address. b)Consider acquiring multiple email addresses for different purposes. c)You can subscribe to services online that provide you with disposable addresses. • http://email.about.com/library/weekly/aa072002a.htm • http://sneakemail.com •
  • 15. d)Remove your email address from your website. e)Never buy anything from a company that spam- over 95% of spam offers are scams! f)Filter your email- For more anti-spam filtering information, visit: http://email.about.com/cs/spamfiltering/ http://email.about.com/library/howto/htnegativespamfilter.htm g)Consider subscribing to a spam prevention service.