ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Spam - How to Fight Spam Emails!

Updated on July 9, 2011

Stop Spam

Picture by mzacha @ www.sxc.hu
Picture by mzacha @ www.sxc.hu

Spam

The term spam come from the abbreviation of "spiced ham" and can be described as a non-requested mail sent in bulk. Even though it is better known by those who use a Internet email service, spam can also be found on mail boxes around the world.

More frequently spam is known as an e-mail with advertising purposes. However the term spam can be applied to messages sent by other means like regular mail, mobile phone messages, or even contacts and messages received through social websites.

Generally, spam has an appealing character but in most cases it is cumbersome and inconvenient.

My way to "fight" junk email

Below you will find the last posts on my DeletedSpam blog. This was the best way I found to dissuade spammers from spreading spam. How? Simply by making their emails available to be found by email spiders from other spammers and in return starting to deliver them the same thing they have been giving me - Email boxes full of junk emails!

There you will also find useful links to Free Anti Spam, Free Email Protection and Free Anti-Virus Softwares.

E-mail Spam

E-mail is the most common and known way to spamming.

There are several different methods for a spammer to get a list of addresses. One of the most common is to use programs for text interpretation (email spiders) that run scans in environments with a potentially large number of addresses available as: web pages, messages from the Usenet network and records of Domain Name Services (DNS).

This programs facilitate and automate the collection of addresses and thus sending spam messages to a large number of recipients at the same time.

Another method known as a "dictionary attack" consists on build a list of names and addresses based on very common words.

There are several kinds of junk emails beside the commercial ones. It is frequent to receive political or religious driven emails which almost never reveal the true intention of the spammer.

They often try to fool people by telling false informations that usually deal with people who urgently need some help, alert to any threat or danger, defamation of brands and companies or false offers of free products.

Then there is the chain letters where they promise luck, wealth or some other kind of benefit to those who pass a minimum number of people in a pre-determined time, ensuring that those who interrupt the flow rather than spread the message will have many misfortunes.

With this mechanism they have the ability to achieve an exponential number of people in a short period of time. Moreover they can have access to millions of new email addresses.

The Monty Python`s Spam Sketch with english subtitles

Photo by Wollbinho (Summerbreak) @ flickr.com
Photo by Wollbinho (Summerbreak) @ flickr.com

Propaganda spam disseminate products and provided services and even political propaganda. This type of spam is one of the most common and one of the oldest already registered.

Although there are legitimate commercial messages sent by well known and licensed companies, it is not unusual for the product or service offered to have some illegal characteristic and the spammer or the company are unknown to the public or completely anonymous.

Among others, advertising spam often present drugs without prescription, illegal or pirated software, university degrees, opportunities for quick enrichment, casinos and other forms of gambling, erotic products and pornographic pages.

Many times the spammers send image spam emails which are not spotted by some anti-spam softwares.

Scam - offering misleading opportunities and products that promise false results. Among the most common offerings are the miracle business opportunities or employment, work at home proposals and facilitated loans. All can be found in a list drawn up by the Federal Trade Commission in 1998 bringing together 12 common types of fraud and scams related to spam in the United States at the time.

One of the more popular scams on the Internet is the message in which the sender claims to be a Nigerian contacting because of personal or political reasons saying that is willing to transfer a large amount of money provided that the recipient pays a fee as a guarantee. This spam is known as "419" because the number of the Nigerian criminal code which applies in those cases.

Picture by somefool - Matthew Maber @ flickr.com
Picture by somefool - Matthew Maber @ flickr.com

This classification may also include messages that invite readers to participate in a "pyramid" scheme and promise to quickly multiply the profits of investors. This scheme which is to pay a sum to the person from whom it received the invitation to have the right to invite other people and have each of them to pay the same amount paid.

Phishing Spam - When messages take the guise of commercial spam or try to simulate common messages as reported transmitted within an organization or personal messages from people you know.

This disguise aims to deceive the recipient and ask it to send confidential data (filling out a form for example) to some email address or to register on a Web page that is really a copy of any other page. In most cases these traps are designed to obtain personal information and passwords to be used in any type of fraud or bank transfers and purchases over the Internet.

Malicious Softwares - Similar to phishing spam this type of disguise induces the recipient to run a malicious computer program sent from the message (causing the error). Among the programs usually sent in this way are the viruses, the worms and trojans.

Anti-spammers Features

The main technical procedure against spam is the use of blocking programs also known as filters.

These programs are based on the idea of analyzing the text of the message to obtain the probability of it being a spam or not. Once identified the spam message can be deleted or automatically moved to another folder.

Generally the search patterns can be defined by the user which makes the filters a potentially powerful tool.

Bayesian filters are filters that use statistical techniques to identify and monitor the receipt of spam. Currently they are the most efficient filters and most users and providers report efficiency that can reach 99.99%.

Another technical method to reduce spam is to hide e-mail addresses through procedures of camouflage. Some text interpretive programs running scans on the World Wide Web in search of addresses can be deceived by rudimentary encryption such as replacing "@" by "at" leaving the address legible to a person.

Using temporary email addresses can also help avoiding spam emails. Every time your email address is required by some registration process you can use a disposable e-mail address which expire after 60 Minutes

A useful free tool that may be used in the reporting of spam is also available (Complainterator). The Complainterator will send an automatically generated complaint to the registrar of the spamming domain and the registrar of its name servers.

Historically reporting spam in this way has not seriously decreased spam since spammers simply move their operation to another URL, ISP or network of IP addresses.

Consumers may also forward "unwanted or deceptive spam" to an email address maintained by the FTC (spam@uce.gov). The database collected is used to prosecute perpetrators of scam or deceptive advertising.

An alternative to contacting ISPs is to contact the registrar of a domain name that has used in spam e-mail.

Registrars, as ICANN-accredited administrative organizations, are obliged to uphold certain rules and regulations, and have the resources necessary for dealing with abuse complaints.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)