Instant Tips to Kill Junk and Save Your Day - Spam No More

By Veronica Carrillo

A good portion, if not the majority of email traffic on the internet today is spam related. The subject matter of spam emails can include discounted Viagra, inexpensive Rolex watches, a surprise inheritance and any other type of scam imaginable. If your email address is more than a few years old or even only a few months, it is inevitable the spam will find its way into your in-box. You are not without hope though. The following tips and suggestions can help alleviate the influx of spam email messages.

The paper will provide an analysis of many modern anti-anti-spam techniques, accompanied by statistical reports and real-life examples. It will also outline some possible approaches to combat these often highly effective and thus increasingly 'popular' spam techniques. Although Internet spamming has been with us since as early as 1978 it first became more than a minor annoyance around September 1993, when America Online released AOL for Windows and the exponential expansion of the Internet began. At first, and for years subsequently, Usenet- and then email-based spam was very simple, consisting of unvarying ASCII messages sent from a limited number of IP addresses. Such simple 'plain text' spam required correspondingly unsophisticated approaches to blocking it. Content-based techniques such as keyword scanning and straightforward hashes (or 'signatures') over the message body were very effective, and at the connection level IP blocklist pioneers such as Spamhaus and MAPS helped turn spammers away before they could even ring the doorbell.

Since then spammers have developed a variety of methods to bypass the filters, having a counter-countermeasure for every anti-spam technique devised, targeting both connection- and content-level filtering. In the former case, huge networks of compromised home PCs, known as 'botnets', are the most well-known. But another trick employed recently (predominantly by so-called 'Nigerian' scammers) is effective not only against IP blocklists but also such emerging technologies as DomainKeys and SPF/Sender-ID. In this particular example the trick exploits a Yahoo! Mail service allowing new customers to inform their contacts of their new Yahoo! email address. The scammer pastes a big list of target email addresses, writes his plea for assistance in the 'personal message' area of the form (see Figure 1), passes the CAPTCHA ('Completely Automated Public Turing test to tell Computers and Humans Apart') test, and his email is dispatched from Yahoo!'s mail servers complete with valid SPF and DomainKeys information. Note that, while Yahoo! Mail claims to restrict the personal message to 100 characters, emails arriving on SophosLabs' spam traps at the time of writing indicate that the scammers have discovered a way to greatly exceed this limit. This technique is, of course, of limited utility and (presumably) longevity, but though the proportion of spam sent this way is negligible, this and similar exploits could be a thorn in the side of anti-spam filters relying solely on the connection-level approach. On the content front, obfuscation still lies at the heart of anti-anti-spam methodology. It's a well-known fact that given all the tricks spammers use to veil their words, it becomes possible according to one estimation to misspell 'Viagra' in more than 10^21 different ways. (That is, rather appropriately, over one sextillion combinations.) But modern spam has evolved many more sophisticated ways of mentioning the unmentionable.

In a business environment, email services are often hosted in house or outsourced. An organization or business may also want to standardize their email address format in a way that makes it harder for spammers to guess or discover legitimate email addresses.

Another good option for organizations that have a high volume of inbound emails is to enlist with an external to the organization spam filtering gateway service. This type of service receives all inbound emails and filters it before passing it on, majority spam free, to the final destination. An alternative to an external gateway spam filtering service would be to install spam filtering capabilities internally.

Lastly, make sure to implement safe computing practices on home or work computers. Ensure that anti-spyware or antivirus software is always installed and up to date. Encourage friends and colleagues to do the same to help prevent your email address from being harvested from a contact or address list on their computers via a backdoor Trojan or virus. - 31837

About the Author:

Protect Yourself From Email Scammers

By Gregg Housh

A lot of us are already very familiar with the annoyance of spam: unsolicited e-mail ads. In recent years, unwanted emails have evolved in an attempt to avoid increasingly advanced filters and wary consumers. We have put together a list of red flags to help you quickly spot emails that may be harmful to your PC and your bank account.

Suspicious attachments

Attaching files to an email is a quick and simple way to share files with your friends and family. The downside is that unscrupulous individuals can attach files like viruses and spyware in the hopes that an unwary recipient might download the file and infect their computer. If you receive an email with an attachment that you weren't expecting, be very careful about downloading the attachment or even opening the email.

Links that don't make sense

In an email that claims to be from Yahoo, a link to a specific page on Yahoo's site appears. So why does the text of the link not begin with "http://yahoo.com"? Because it's a scam. Many scam artists attempt to gain account information or even credit card numbers by pretending to be respectable websites asking for information about your account. These emails typically contain a link to a page where you can reset your password, confirm your credit card information, or log in to access some special new feature. To spot these bad links, you will need to look at the url: the address of the page that is being linked to. All urls begin with "http://" or "htpps://" and from there differ from website to website. If the url is not visible in the text of the link, you can hover your mouse over the link and the url will be displayed in the lower left corner of your web browser.

Emails about accounts that you don't have

Scam emails that disguise themselves as emails from major websites are betting on their recipients actually having accounts with that website in the first place. If you get an email about your facebook account when you never even signed up with facebook, the odds are very good that this is a scam or virus email.

Password reset requests you didn't send

One of the most common email scams currently is the fake password reset. These emails claim that you recently made a request for a new password, and direct you to a webpage where you can enter your "old" account name and password. You may be able to pick out these emails by the link urls or because you do not have the account that you would theoretically be resetting a password for in the first place. Even if you don't see anything wrong with the link or the account information, never respond to a password reset email that you did not specifically ask for.

Sender addresses that don't add up

An official email from YouTube.com will be sent from an account that ends with @youtube.com. If "joey5683426$$@ytmail.com" is sending you official updates about your YouTube account, it's a safe bet this is also a malicious email. If your email system hides sender information, you can change your settings to show full headers or usually click a link right in the email to show all of the sender information.

Money transfer plots

Frequently sent from Nigerian royalty, these emails claim that there is some enormous amount of money sitting in an account somewhere that the sender wants moved to the United States before something horrible happens to it. It's not unusual for these emails to be all in caps lock and poor English, although there are exceptions. These emails are scam attempts, trying to get your bank account information so that the sender can access your funds. No matter the pretense for the email, you should never share bank account information with anyone you don't know. Newer versions of these emails claim to be from "a member of your church."

Weird emails from friends

The most dangerous and difficult to pick out malicious emails are the ones that come from your friends and other contacts. Typically if you get a suspicious email from a friend or other contact, it's either because their PC has been infected by a virus or because their email account has been compromised. If you find an email from one of your contacts that contains strange characters in the subject, has attachments that you weren't not expecting, links to a file sharing site, or otherwise looks different from the emails you're used to from that person, take the time to contact them before clicking on any links or downloading any attachments.

Emails from yourself (that you didn't send)

These types of emails can be disturbing when you find them. If you find an email from your own account sitting in your inbox that you know you didn't send (and you have not given anyone else access to your account) immediately change your password and security question for your account. Next, check out your "sent mail" folder to see if any other emails went out that you were unaware of. Let everyone who received one of these suspicious emails know that you did not send the emails, that they should not read them or click any links or attachments and that you suspect your account was compromised. You can also let your email provider know about your concerns. If this problem comes back, your machine may be infected and require virus cleanup service.

As users and spam filters become more aware of these malicious emails, scammers will develop new schemes to get at your computer, bank account, and other information. The best weapon against these attacks is a healthy dose of skepticism, though even cautious users can fall victim to scams and viruses. If you believe you may have a compromised email account or infected computer, or if you just want to learn more about how to prevent these problems, give a professional a call. - 31837

About the Author:

The BBB warns of increased Debt Collection Scams

By Tim McBride

The Better Business Bureau and the FCC are warning consumers about phone calls from phony debt collectors. In the past couple of months, there has been an outbreak of telemarketing calls from phony debt collectors attempting to solicit private information for the purposes of identity theft.

Government agencies such as the FCC or FTC have reported an increase in consumer complaints about fraudulent telephone calls and identity theft. You can visit either the FCC or the FTC's official website to obtain up to date information about the techniques used by these fraudulent callers by clicking on the information section of each website. Additionally, the Better Business Bureau has a wealth of information about how to avoid becoming a victim of identity theft.

One recommendation is to ask the caller to call them back and then perform a lookup of the telephone number of the caller. That way you can review what others have said about the caller to help you confirm if they are a legitimate agency or not.

It is also suggested that you do not provide personal information such as bank account numbers, social security numbers and other financial information over the telephone.

Do not provide any personal information or financial information such as bank account numbers, social security numbers or other information over the telephone. Rarely is this information required by a legitimate debt collector.

Don't fall victim to identity theft, do your homework the next time you get a suspicious telephone call make sure that you know whose calling you before you provide any personal details, financial information or other personal information that can be used to steal your identity. - 31837

About the Author:

Learning To Use A Registry Cleaner

By David Smith

The Microsoft Windows registry is a directory which stores your PC's hardware and software settings and user preferences. When working properly, these settings enable your computer to function smoothly in order to give you a positive user experience. In essence, the registry is the central nervous system of your computer's operations. Every time anything happens on your computer, it is recorded in the registry.

Sometimes the registry gets cluttered and loaded down with redundant directories and unwanted and unneeded instructions, and may need to be cleaned with a registry cleaner. A registry cleaner scans the registry of your system and finds broken files, links, and any other details that are not needed or used by the PC. These may be irrelevant or even harmful entries that take up disk space and slow down your registry's operations. In this context, a registry cleaner should be used every few weeks, depending on how often you use your PC.

There are many different types of registry cleaner available on the market, and each one functions differently. You might want to look into the range of registry cleaners that are available to select the one you feel will assist you the most. Equally, it is advisable to seek advice to find out what is the best registry cleaner for your computer's set up.

There are many websites that compare and rate the top registry cleaners, and these make your decision much easier. The best registry cleaners will give you the chance to make backups of your registry before making any changes. Some of the top registry cleaners are RegCure, Registry Easy, Registry Smart, Registry Fix, and Error Nuker.

Installing a registry cleaner is simple and safe, and the advice on how to use them is extremely easy to follow. Once launched, each scan will take approximately five minutes and will then display the information the cleaner believes is redundant and not needed, giving you the option to erase it. Once finished, your computer will run smoother and operate more efficiently. - 31837

About the Author:

How to Avoid Problems When Advertising Online

By Doug Stewart

If you place an advertisement online, there are a number of potential problems which you should be aware of. This article discusses the most common ones and simple methods to avoid them.

1) Buyer does not pay

Perhaps the most common issue is buyers not paying. Before sending any product, ensure that you've received full payment, that the payment has cleared, and that it has been deposited in your account. This should be done for any payment type, including credit cards and cheques.

For items which are sent by post, a related issue is buyers who claim that they have not received the item and consequently refuse payment or demand a refund. The vast majority of such claims are false but proving this is difficult unless the goods are sent by registered mail. Consequently, one needs to balance the additional costs of registered post against the risk of fraudulent claims of non-delivery.

2) E-Mail Theft

To place your online advertisement, you will need to provide a contact EMAIL address. Unfortunately, there are various software programmes which collect EMAIL addresses from websites. They may get this direct from your advertisement, or breach the website security and steal it direct from the website databases. Alternatively, some programmes randomly complete the advertisement contact forms and send off messages, so that when you reply your EMAIL address can be collected from your reply.

Your EMAIL address will then be used for SPAM, fraud, or both. To prevent this, do not use your personal or business EMAIL address. Instead, get an address from one of the free EMAIL services and use this for the advertisement. When you no longer need the EMAIL, just delete it.

3) The Over-payment Scam

A 'buyer' will overpay you for an item and then ask you to refund the overpayment. For example, if an item costs $100 he might send $200, and then claim that he overpaid by mistake, requesting you to send him the extra $100 back.

In this scam, the original payment is fraudulent (e.g. counterfeit cheque or stolen credit card). The 'buyer' will simply disappear with any refund and since the payment to you will not clear, you will be out of pocket the amount of the refund. To prevent this, instead of refunding, cancel the original payment and request a new payment. Never ship goods or provide refunds before payments have fully cleared and been deposited in your account.

4) Meeting in Distant City

On very expensive items (e.g. house advertised for sale), the 'buyer' may insist on a private meeting to complete the deal, usually at a distant location (another city or country) and away from the public (e.g. in a hotel room). If you go, there are a number of problems which can occur, from your house been robbed (as they know when you will be away) or a straight-forward scam (e.g. they try to purchase the item in cash, using counterfeit money) or an attempt to get you alone and force you to give them money.

To avoid this scam, ask yourself if the offer is reasonable. Someone who offers to buy your house simply from an online advertisement, without ever seeing it or even trying to negotiate the price, is unrealistic. Further requests, such as meeting in a far away city rather than locally, just add to the unreality of the entire situation. When meeting strangers, always do so in a public place (e.g. a restaurant) and never in an isolated area (e.g. a hotel room). If possible, have a friend with you rather than going alone. Find out who you are dealing with. Ask them their names, where they live and so on. If they are genuine people, they shouldn't mind telling you about themselves.

5) Identity Theft

There are a number of scams which are designed to get your financial details. For example, a bank account number or credit card number, along with sufficient personal information to give them access to the bank account or credit card.

Banks and credit card companies often use personal information as account passwords. For example, when contacting them, they may ask for your birth date or your mother's maiden name. In combination with an account number, such basic information may allow someone to contact your bank or credit card company and pass themselves off as you.

They are a number of reasons which a 'buyer' may give for asking for this information. For example, they may ask your bank details so that they can transfer money to your account and then say they need the personal information for administrative or security reasons.

It is best not to provide either financial information or personal information to strangers. Instead, use a payment method (e.g. cheque or credit card) which does not require that you provide this information. - 31837

About the Author:

A Simple Spam Blocking Method That You Can Utilize

By Inel Rahadian

With the invention of email, people now can communicate with others easily. By pressing a button, you can spread a message containing an attachment to your relatives even if they live in different countries.

Unfortunately, there are folks who have taken advantage of this communication medium in the wrong ways. Thousands upon thousands mailboxes are flooded with spams every day. Although this problem cannot be completely eliminated, there is a simple method that can be applied to protect your primary mailbox from spam attacks.

These days, many email hosts like Yahoo!, Gmail or Hotmail come with useful features to filter or block spam emails. Such services can detect any incoming messages and determine whether a message comes from a legitimate sender or a spammer. Some webmail services also allow you to determine yourself whether a message is legitimate or is junk.

After setting up some parameters you can then forward filtered emails to your primary email address, the one that you do not share to public. Depending on the service that you use, mail forwarding feature may be offered for free or for a small fee. This way, the server itself that will block any unwanted, unsolicited emails before being delivered to your email client's inbox. In other words, you will utilize the spam blocker that exists in another machine to detect and block spams before getting to your inbox.

If you use the email address which is provided by your hosting company, you can apply the same technique as long as the company provides you with a webmail program. For instance, Horde provides an input box where you can list spammers' email addresses here. If one of the people in the list send you an email, the message will be simply deleted or moved to a special folder, depending on your choice. You can find this feature in many modern hosting providers today. Just use it to block any unwanted emails targeted to your inbox.

Although simple, this spam blocking method has some great advantages. Firstly, as many spam emails today contain dangerous attachments, it will reduce the chance your PC to be infected by spyware or any other malicious programs. Secondly, blocking spams on the server side will also reduce the amount of bandwidth used. Another advantage of using a web based filtration system is there is no software to download or install on your PC so that you do not have to worry the filtering operations will affect your computer's performance. - 31837

About the Author:

Spam - The Wrong Way To Use An Autoresponder

By Kurt Naulaerts

In today's virtual world the spam or unwished-for messages is a real issue. It appears the spammers are using autoresponders to do their dirty work. This is bad for everyone who uses an autoresponder with good motives. Their messages are commonly understood as spam making the owner wonder what's wrong at times. Sometimes a user may also ask why their messages are blocked or reported as spam.

The autoresponders do their job and respond to forged or legitimate emails indiscriminately. Spam messages are invariably forged and they appear to be from a third party. If an autoresponder receives a forged message they will send misdirected e-mails. That's how an autoresponder can become a spam source itself and its messages are blocked or reported. Many times users don't know how to notice if this begins to happen or to handle it.

The usual autoresponder is a straightforward program designed for normal email users to inform their contacts if the user is available to answer a certain question or merely to send the preset message. These messages are sometimes sent to inaccurate people and that is how spam is born. How are you able to fix that? It's reasonably simple. Just stop using this kind of autoresponder and answer the mail yourself for the transitional period. If you're too busy to answer the emails yourself you may have to hire somebody for the present.

A big issue in the spam world is the "misdirected bounces." If a mail server takes a message and can't deliver it, it will send a bounce mail to the original sender but often this message will be misdirected. How are you able to fix that? Upgrade or configure the post server in a way to avoid this problem. You can do this by setting your software to reject the message or accept it permanently . Don't let it take the decision of delivery for you after the software received the message.

Usually the autoresponders are sending messages to their mailing list, but without authorization. The people who receive these messages consider them unsolicited and therefore spam. If you've got a mail sever you must consider these changes because today's spam is a problem. Lots of mail servers have been blacklisted due to spam issues. Fortunately there are methods to prevent your autoresponder from changing into a spam tool. By doing some research online you'll discover new methods that are developed daily. If you actually don't wish to become a spammer the last choice is to stop using an autoresponder, because these programs do an excellent job.

Spam is a huge issue when it comes to internet advertising. If at any moment you're leery of what you're doing, you can always consult with a professional who can advise you in the right direction. Autoresponders were created to ease the life of busy professionals but unfortunately used for the wrong purpose can taint their good use. Do some research and always be a defensive consumer. Know what you're purchasing before you do. - 31837

About the Author:

Spam and Autoresponders - How They Do It

By Kurt Naulaerts

In today's virtual world the spam or unwished-for messages is a real issue. It appears the spammers are using autoresponders to do their dirty work. This is bad for everyone who uses an autoresponder with good motives. Their messages are commonly understood as spam making the owner wonder what's wrong at times. Sometimes a user may also ask why their messages are blocked or reported as spam.

The autoresponders do their job and respond to valid emails indiscriminately. Spam messages are usually forged and they seem to be from a third party. If an autoresponder receives a forged message they are going to send misdirected e-mails. That is how an autoresponder can become a spam source itself and its messages are blocked or reported. Many times users don't know how to notice if this begins to happen or to handle it.

The common autoresponder is a simple program designed for standard email users to tell their contacts if the user is available to answer a certain query or just to send the preset message. These messages are sometimes sent to incorrect folk and that is how spam is born. How are you able to fix that? It's reasonably simple. Just stop using this kind of autoresponder and answer the mail yourself for the transitory period. If you're too busy to answer the emails yourself you'll have to hire someone for the moment.

A big problem in the spam world is the "misdirected bounces." If a mail server takes a message and can't deliver it, it will send a bounce mail to the original sender but often this message will be misdirected. How can you fix that? Upgrade or configure the mail server in a way to avoid this problem. You can do this by setting your software to reject the message or accept it permanently. Don't let it make the choice of delivery for you after the software received the message.

Usually the autoresponders are sending messages to their mailing list, but without authorization. The people who receive these messages consider them unsolicited and therefore spam. If you've got a mail sever you must consider these changes because today's spam is a problem. Lots of mail servers have been blacklisted due to spam issues. Fortunately there are methods to prevent your autoresponder from changing into a spam tool. By doing some research online you'll discover new methods that are developed daily. If you actually don't wish to become a spammer the last choice is to stop using an autoresponder, because these programs do an excellent job.

Spam is a huge issue when it comes to Internet advertising. If at any moment you're leery of what you're doing, you can always talk to a professional who can advise you in the right path. Autoresponders were created to ease the life of busy pros but unfortunately used for the incorrect purpose can taint their good use. Do some research and always be a defensive consumer. Know what you are purchasing before you do buy it. - 31837

About the Author:

privacy policy

Privacy Policy

The privacy of our visitors to this website is important to us.
At this website, we recognize that privacy of your personal information is important. Here is information on what types of personal information we receive and collect when you use and visit this website, and how we safeguard your information. We never sell your personal information to third parties.

Log Files
As with most other websites, we collect and use the data contained in log files. The information in the log files include your IP (internet protocol) address, your ISP (internet service provider, such as AOL or Shaw Cable), the browser you used to visit our site (such as Internet Explorer or Firefox), the time you visited our site and which pages you visited throughout our site.

Cookies and Web Beacons
We do use cookies to store information, such as your personal preferences when you visit our site. This could include only showing you a popup once in your visit, or the ability to login to some of our features, such as forums.

We also use third party advertisements on this website to support our site. Some of these advertisers may use technology such as cookies and web beacons when they advertise on our site, which will also send these advertisers (such as Google through the Google AdSense program) information including your IP address, your ISP , the browser you used to visit our site, and in some cases, whether you have Flash installed. This is generally used for geotargeting purposes (showing New York real estate ads to someone in New York, for example) or showing certain ads based on specific sites visited (such as showing cooking ads to someone who frequents cooking sites).

DoubleClick DART cookies
We also may use DART cookies for ad serving through Google’s DoubleClick, which places a cookie on your computer when you are browsing the web and visit a site using DoubleClick advertising (including some Google AdSense advertisements). This cookie is used to serve ads specific to you and your interests (”interest based targeting”). The ads served will be targeted based on your previous browsing history (For example, if you have been viewing sites about visiting Las Vegas, you may see Las Vegas hotel advertisements when viewing a non-related site, such as on a site about hockey). DART uses “non personally identifiable information”. It does NOT track personal information about you, such as your name, email address, physical address, telephone number, social security numbers, bank account numbers or credit card numbers. You can opt-out of this ad serving on all sites using this advertising by visiting http://www.doubleclick.com/privacy/dart_adserving.aspx

You can choose to disable or selectively turn off our cookies or third-party cookies in your browser settings, or by managing preferences in programs such as Norton Internet Security. However, this can affect how you are able to interact with our site as well as other websites. This could include the inability to login to services or programs, such as logging into forums or accounts.

Deleting cookies does not mean you are permanently opted out of any advertising program. Unless you have settings that disallow cookies, the next time you visit a site running the advertisements, a new cookie will be added.

disclaimer

CONTENT DISCLAIMER

The information contained in this website is for general information
purposes only. The information is provided by this website and
while we endeavour to keep the information up to date and correct,
we make no representations or warranties of any kind, express or
implied, about the completeness, accuracy, reliability, suitability or
availability with respect to the website or the information, products,
services, or related graphics contained on the website for any
purpose. Any reliance you place on such information is therefore
strictly at your own risk.

In no event will we be liable for any loss or damage including
without limitation, indirect or consequential loss or damage, or any
loss or damage whatsoever arising from loss of data or profits
arising out of, or in connection with, the use of this website.
Through this website you are able to link to other websites which are
not under the control of this website.
We have no control over the nature, content and availability of
those sites. The inclusion of any links does not necessarily
imply a recommendation or endorse the views expressed within them.
Every effort is made to keep the website up and running smoothly.
However, this website takes no responsibility for, and will not
be liable for, the website being temporarily unavailable due to
technical issues beyond our control.

contact us



Your Name
Your Email Address
Subject
Message
Image Verification
Please enter the text from the image
[ Refresh Image ] [ What's This? ]


Sign Up for our Free Newsletter

Enter email address here