Showing posts with label spam. Show all posts
Showing posts with label spam. Show all posts

Tuesday, December 16, 2014

Spam, whence it and how to avoid it happens

Who cooked? (How did it start?)The modern meaning of the word "spam" has nothing to do with spicy ham. In the early 1990s, a comedy group Monty Python English piece brought the common use of the term. "The work of SPAM Theater" follows a couple struggling to order dinner from a menu of all-Hormel canned ham.

Repetition is the key to the serenity of the dramatization.
The actors put the word "spam" in the design time of 2.5 minutes 104 times! This flood has caused readers access Usenet newsgroups unwanted "spam". The name stuck.
Spammers quickly focuses on e-mails, and the terminology moved with them. Today, the word came out of the darkness technician. Now, the "Spam" is the general term for "unsolicited commercial e-mail" or "UCE".

Why to happen Mala spamming, good people?
Chances are, you've spam. In some ways, e-mail to find their way into the hands of spammers, and e-mail is suffering. How does this happen? There are several possibilities.

Company backstabbing.
Companies often maintain lists of e-mail addresses of your customers. This is a completely legitimate practice and usually takes no damage from it. Sometimes, however, the temptation is to make money fast is too great, and sells these lists or let outside advertisers. The result? A lot of unsolicited e-mails, and a serious breach of trust.

Generation of random direction.
Computer programs called random address generators simply "guess" e-mail addresses. There are more than 100 million addresses Hotmail - Howhard Can you guess some of them? Not too hard - Unfortunately for many unsuspecting Internet users. Many spammers also think

Address "normal" as "support@yourdomain.com"
"Info@yourdomain.com" and "billing@yourdomain.com."

Spider web.
Insidious Tools list collection today are spinning. All major search engines spider web, data record information on each page. Spammers use tools SPIDER on the Internet, but save e-mails found. Your personal web page lists your e-mail? Get ready to attack!

Collection chatroom.
The ISP provides very popular chat rooms where users are known only by their screen names. Of course, spammers know that the name on the screen is the first part of your e-mail address. Why try to enter the E-mail Address when a couple of hours in a chatroom cache can net produce a list of addresses activamente- used?

Idea Marketing Malo bad.
It is not working for the phone company, not for e-mail marketing. But to keep some spammers still their friends and family-style mailing list. Compiled from known spammer addresses and the persons or companies that owner has in the past, these lists are still illegitimate. Why? You may not have permission to someone via email. A friend-of-a-friend helped cut.

Stop The Flood to your inbox.
Already drowning in spam? Try using the filters in your email client - many offer a way to block certain e-mail addresses. Every time a victim of spam, block address of the sender. Spammers jump from one address, and you can find many lists, but at least to reduce power this method.

Also, more than one email address, and a "clean". Many believe that this technique is the flood of spam on a drip. Use an address for business mail security as an e-mail to your friends or signing with trusted companies. Never use your own on the net! Get a free address on the Internet and in chat rooms to use.

If all else fails, consider opening a screen name or e-mail account from scratch. If you do, you start from scratch and without spam. This time, protect your e-mail!

The lists of spam Do not use in the future.Do you want the Internet to surf absorbed by the flood of spam without? Prevention is the best policy. Use easy to guess email address. Keep your Mail-centered activity not use it. On Web sites, you do not publish or use it in chat or newsgroups.

Before you give your e-mail address for a company, you check the company. I agree with the sections for users dedicated spam rules? Do you have a Privacy Policy to explain exactly what to do with your address? More and more companies are also considering publishing an anti-spam policy written in plain English, so you can be absolutely sure of what you can get involved.

Think you're not a spammer? Be safe.
More than a marketer has inadvertently spam from the public. The first hundred complaints and some nasty phone messages usually stop him. In his tracks But at this point, the spammer with bills cleaning ISP and a bad reputation, which are confronted not easy to overcome.

The best way to avoid this, a clear understanding of what spam is who is to receive e-mails when someone mass not explicitly asked to hear from you, then you are spamming.

Stick with your gut. Do not buy $ 10 million addresses, regardless of how much the seller swears by them! If something looks suspicious, just say no. It will save money in the end.

The final blow.
The online world is now the flood of spam. Ultimately, people will stop sending spam because it no longer works. Do your part: Never buy a spammer. If your company for technology companies on the search, we select those with a confident attitude Anti-Spam.

Spam has a long history in the field of food and mail. This year, Hormel Foods, a museum, the SPAM in the real world has opened dedicated. While the museum does not have the Monty Python SPAM Skit, still no word on an exhibition of unsolicited commercial e-mail. But if all web users work together vertically, can Hormel ham in a unit survive many scourge of the Internet.

Sunday, December 14, 2014

What is Spam? - Spam flooding the Internet



You have probably seen an increase in the amount of spam that appears in your mailbox or on your favorite forum. The activities of a small number of people is a major problem for the Internet.

To request money chain letters, both for reports or just above, are illegal in the United States if they are in the mail or e-mail. Report fraud to your local postmaster United States. You can send to Nigeria and other African countries, someone who uses it to your bank account for $ 20 million transferred to want to see published. It's a scam "419" and died.

Spam flooding the Internet with many copies of the same message in an attempt, the message to people who would otherwise choose to receive strength. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send - most of the costs are determined by the recipient or vectors, rather than paid by the sender. For the recipient, spam is easy to recognize. If you hired someone to read email and reject spam, difficulties they had to do. How can we, under the IA to automate this process? I think we will be able to solve the problem by using relatively simple algorithms. In fact, I found the spam now quite well with anything other filter as a combination of Bayesian probability email individual words. (As described below) with a slightly modified Bayesian filter, now losing 1,000 spam 5, with 0 false positives.

One particularly nasty variant of email spam is sending spam to mailing list (e-mail forum for public or private debate). Because many mailing lists limit activity to their subscribers, spammers use automated to sign as many mailing lists as possible, so tools that address list, or use the mailing list as a direct target of their attack tools.

Monday, September 8, 2014

Fighting Spam

It’s been nearly a decade since spammers and their enemies begun evolving competitively. As with the classic cheetah/gazelle model originally formulated by Darwin, each time one group becomes a little faster or more agile, its adversaries develop traits for outwitting and outrunning it.

In addition to wasting people’s time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail.

Nobody wants it or ever asks for it. No one ever eats it; it is the first item to be pushed to the side when eating the entree. Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people.

The number of unsolicted commercial electronic messages received by the average American in 2001 was 571, according to Jupiter Media Metrix. By 2006, Jupiter says, that number will increase to 1,400, with more than 206 billion spam messages going out over the course of the year. While these numbers are notoriously difficult to calculate, every survey and ISP record points to dramatic increases in spam, sometimes as much as 300 percent year over year. One reliable indicator of the problem’s magnitude is the size of the anti-spam effort. The range of tools available to ISPs, enterprises and consumers in the fight against spam grew considerably during the Web bubble. Simultaneously, heavyweight Web marketers and interactive ad players have been scrambling to distinguish their services from the bad guys, as well as to counteract growing calls for government controls on digital marketing.

In one of the biggest such moves, the Direct Marketing Association (DMA), through its subsidiary, the Association of Interactive Marketing (AIM), has released online commercial solicitation guidelines in an effort to promote high ethical standards among marketers. The rules require that members let e-mail recipients know how they can refuse future mailings and allow consumers to prevent the sale or rental of their addresses