Saturday, July 29, 2006

How To Avoid Spam Robots

Despite the fact that Federal legislation (the CANSPAM act) made it illegal, harvesting email addresses from the web using automated robots remains alive and well.

Spammers who need fresh email addresses release software spider programs that comb the Internet and suck email addresses off Web pages, guest books, and anywhere else you might post your email address.

Once they get your email address, spammers will trade it around like 5th graders with a new pack of Pokemon cards at recess and you can expect the avalanche of email to begin flooding your inbox.

In order to combat this still rampant practice of stealing email addresses from websites and sending people email they don't want, the following tips should help protect you.

** Break It Up **

Obviously the best way to avoid getting picked up by an email harvester is not to post your email anywhere on anyone's website (including your own).

If the only way someone can get your email is if you give it to them, that creates a similar situation to operating with an unlisted phone number.

If telemarketers can't get your phone number, they can't call.

If you must post your email address, post it in a way that a robot won't recognize it as an email address. Instead of posting YOURNAME@YOURDOMAIN.COM, you can put YOURNAME (AT) YOURDOMAIN.COM and then, in parenthesis, put (replace AT with @ to email me).

Though it seems like an extra step for legitimate email, you'll find it a very effective technique.

** Use An Image **

Currently, online spiders (ANY spider, including search engines) cannot read text that appears in a graphic or picture. If you must display an email address on a page, then do it by typing your email address into your favorite graphics program and saving the image as a .gif or .jpg. Then post the image onto your web page so people can see the email, but spiders cannot. This too creates an extra step for people because they must type in your email address, but it's an effective solution if you must display an email address on your own website.

** Use An Email Form **

Another way to cut down on spam originating from your own website is simply not to display an email at all.

Instead, allow customers and prospects to contact you through a form where they fill in fields, click a button, and your website emails you their message.

A note of caution: make sure the form script you use does not keep your email address visible in the form code.

If the form code contains the email address, spam robots can find it even though you don't see it on the page.

** Make It Hard To Guess **

Sometimes you'll get unsolicited email because a spammer guessed your email address.

It's not a far stretch to imagine that someone probably has the email Jim@yourdomain.com, so spammers will do a "dictionary" attack on common usernames.

One way to defeat this is to place a "dot" (.) in your email address, such as Jim.Edwards@yourdomain.com. The dot makes it virtually impossible for spammers to guess your email address.

About the author:
Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.turnwordsintotraffic.com
© Jim Edwards - All Rights reserved http://www.thenetreporter.com
Circulated by Article Emporium

Wednesday, July 26, 2006

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway
Spam, commonly defined as unsolicited commercial email, is a powerful advertising channel for many products and services. As a result, spamming has become a profitable business, driven by the low cost of sending email compared to other direct marketing techniques. The high return on investment for spammers has resulted in an overwhelming volume of unwanted messages in personal and business email boxes. Consider this: Conducting a direct mail campaign costs an average of $1.39 per person, meaning that a response rate of 1 in 14 is necessary just to break even on a product with a $20 gross profit. Selling the same item via unsolicited spam email costs only $0.0004 per person, meaning that a response rate of 1 in 50,000 gets the seller back to break-even; anything above that is gravy. With profit margins like these, it’s easy to see why spammers will try anything to get past anti spam technology to deliver their messages to your inbox.

Types of Spam Threats
The recent onset of fraudulent spam variants such as phishing and spoofing pose an even greater risk than the spam volume clogging email servers. Spammers use techniques such as phishing and spoofing to fool users into opening messages that, at first glance, appear innocuous.

Phishing
Phishing is a specific type of spam message that solicits personal information from the recipient. Phishers use social engineering techniques to fool end users into believing that the message originated from a trusted sender, making these attacks especially dangerous because they often con victims into divulging social security numbers, bank account information or credit card numbers. In one six-month period from November 2003 to May 2004, phishing attacks increased in frequency by 4000%, and the trend continues upward.

An example of phishing is an email that appears to come from a bank requesting that users log into their account to update or correct personal information. When the users follow a link embedded in the email, they are redirected to a site that looks and behaves like the expected bank website. However, unbeknownst to the soon-to-be identity theft victims, the site is actually controlled by the scam artists who sent the email; any and all information entered by the victim can now be used in a variety of ways, none of them good.

Spoofing
Spoofing is a deceptive form of spam that hides the domain of the spammer or the spam’s origination point. Spammers often hijack the domains of well-known businesses or government entities to make spam filters think the communication is coming from a legitimate source.

Today’s spammers are more crafty than ever before and have begun blending elements of both phishing and spoofing into their messages, further spinning their web of deception. The toxic combination of spoofing and phishing presents a major threat that can trick most anyone into providing personal information to a stranger.

Toothless Legislation
On January 1, 2004, President Bush signed into law the “Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003,” or “CAN-SPAM” Act. While well intentioned, CAN-SPAM has done little or nothing to curb the flow of unwanted email. In fact, an estimated 97% of all spam email sent in 2004 violated the Act, and the United States still dwarfs other nations in terms of the origin of spam, with CipherTrust research revealing that an astonishing 56.77% of all spam comes from U.S.-based IP addresses. While CAN-SPAM was designed to decrease the overall volume of spam, the exact opposite has happened: in 2004, spam accounted for approximately 77% of all email traffic, and phishing attacks continue to increase exponentially, with studies showing an increase of 4000% from November 2003 to May 2004.

Anti Spam Software for the Desktop
The dramatic increase in spam volume has prompted a corresponding surge in stand-alone anti spam software solutions for the desktop, all with varying levels of effectiveness. Some anti spam software uses text filtering to screen incoming messages for known characteristics of spam, while other solutions rely solely on reputation systems that monitor and categorize email senders by IP address according to their sending behavior. Still other anti spam software uses “challenge/response filters” to block unapproved mail until the sender responds (manually) to a challenge email sent to their email account to verify his or her identity.

With so many different methods of filtering spam, no single software-based desktop anti spam solution is capable of effectively stopping spam before it reaches the inbox. The only way to successfully fight spam is to create an anti spam “cocktail” including reputation services, text filters, constant updates and a host of other best-of-breed spam blocking methods. Just as importantly, an effective anti spam solution should reside at the email gateway, not at the desktop. Without protection at the gateway, mail servers waste massive amounts of bandwidth and storage space processing every message, wanted or not, and end users face the unenviable task of deciding what to do with the countless spam messages that successfully reach them.

Take a Consolidated Approach to Anti Spam
Although it takes a person only a moment to process a message and identify it as spam, it is difficult to automate that human process because no single message characteristic consistently identifies spam. In fact, there are hundreds of different message characteristics that may indicate an email is spam, and an effective anti spam solution must be capable of employing multiple spam detection techniques.

In addition to effectively identifying spam, businesses must be assured that legitimate mail is not blocked in error. Even one false positive, or incorrectly blocked email, can have a significant impact on businesses today. Accurate spam blocking requires a combination of tools to examine various message criteria combined with real-time research and intelligence data.

By aggregating multiple spam detection technologies like text filtering, reputation services, traffic analysis and other best-of-breed techniques, and placing the solution at the email gateway in a hardened appliance, enterprises can retake control of the inbox.

About the author:
Paul Judge, CTO, CipherTrust, Inc. is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company’s flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting www.ciphertrust.com/products/spam_and_fraud_protection today.
Circulated by Article Emporium

Saturday, July 22, 2006

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don’t work anymore.

Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be.

Heuristics (Rule-based Filtering)
One method used to combat spam is Rule-based, or Heuristic Filtering. Rule-based filters scan email content for predetermined words or phrases that may indicate a message is spam. For example, if an email administrator includes the word "sex" on a company’s rule-based list, any email containing this word will be filtered.

The major drawback of this approach is the difficulty in identifying keywords that are consistently indicative of spam. While spammers may frequently use the words “sex” and ‘Viagra” in spam emails, these words are also used in legitimate business correspondence, particularly in the healthcare industry. Additionally, spammers have learned to obfuscate suspect words by using spellings such as "S*E*X", or "VI a a GRR A".

It is impossible to develop dictionaries that identify every possible misspelling of "spammy" keywords. Additionally, because filtering for certain keywords produces large numbers of false positives, many organizations have found they cannot afford to rely solely on rule-based filters to identify spam.

Signature-Based Spam Filters
Another method used to combat spam is Signature-based Filtering. Signature-based filters examine the contents of known spam, usually derived from honey pots, or dummy email addresses set up specifically to collect spam. Once a honey pot receives a spam message, the content is examined and given a unique identifier. The unique identifier is obtained by assigning a value to each character in the email. Once all characters have been assigned a value, the values are totaled, creating the spam’s signature. The signature is added to a signature database and sent as a regular update to the email service’s subscribers. The signature is compared to every email coming in to the network and all matching messages are discarded as spam.

The benefit of signature-based filters is that they rarely produce false-positives, or legitimate email incorrectly identified as spam. The drawback of signature-based filters is that they are very easy to defeat. Because they are backward-looking, they only deal with spam that has already been sent. By the time the honey pot receives a spam message, the system assigns a signature, and the update is sent and installed on the subscribers’ network, the spammer has already sent millions of emails. A slight modification of the email message will render the existing signature useless.

Furthermore, spammers can easily evade signature-based filters by using special email software that adds random strings of content to the subject line and body of the email. Because the variable content alters the signature of each email sent by the spammer, signature-based spam filters are unable to match the email to known pieces of spam.

Developers of signature-based spam filters have learned to identify the tell-tale signs of automated random character generation. But as is often the case, spammers remain a step ahead and have developed more sophisticated methods for inserting random content. As a result, most spam continues to fool signature-based filters.

The Solution
When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.

About the author:
Paul Judge, CTO, CipherTrust, Inc. is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company’s flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting www.ciphertrust.com/products/spam_and_fraud_protection today.
Circulated by Article Emporium

Wednesday, July 19, 2006

My Emails Are Not Being Delivered. Black Lists and White Lists Explained.

Over 40% of all emails within your marketing campaign are not being delivered. You may not even be aware of this, as many ISPs will not send back a bounce message. In fact if you are sending messages to AOL customers, AOL is now blocking over 80% of the messages that come into their servers.

One of the main reasons that this is occurring is that your IP or Domain may be Black Listed. All major ISP's and many corporate email systems now check against Black Lists and will refuse to deliver any emails that come from an IP that is Black Listed.

But what exactly is a Black List?

DNS black lists are lists of domains and IP's that are known to originate Spam. Many anti-spam software programs used by corporations and ISP's use these lists to control Spam by refusing any email that originates from one of these domains or IPs.

Unfortunately there are many instances of false positives as there are few checks and often little objectivity when listing a particular IP. In order for a black list to know that a domain is sending Spam, the offence must be reported. It may take only one report via a web form for you to be listed.

You may be listed maliciously through one complaint of a client, or that of a competitor. Many Black Lists, as well, will list not only the IP that is suspected as spamming, but will list any IPs in that range of addresses. If someone using the same Internet provider as you is accused of spamming and is placed on a Black List, you may be listed as well.

DNS blacklists are usually maintained by anti-spam organizations or by individuals.

What are some of the most popular Black Lists that ISPs are using?

Some of these include:
MAPS - http://www.mail-abuse.com/
Spam Cop - http://www.spamcop.net/
SpamHaus - http://www.spamhaus.org/
SPEWS.org - http://www.spews.org/
ORDB.org - Open Relay Database - http://www.ordb.org/

How do I know if I am on a Black List?

Unfortunately, you really can't be 100% sure if you have been black listed. You may be on someone's black list and not even know it. There are, however, ways to check most of the lists.

One way is to check your server log when sending your campaigns. You will often see an email bounce notice indicating that the message has bounced because you are on a particular black list.

Many of the major black lists also allow you to enter your IP into a form on their site. These checks will tell you whether you appear, or not, on their list.

A useful tool, is the Black List Monitor. http://www.blacklistmonitor.com - It automatically checks your IP against most of the major Black Lists and tells you which ones you are listed on. It also gives you help in getting removed. All your IPs are constantly monitored for any changes, listings, or delistings.

But what is a White List and how can this help?

Many corporations and ISPs will create a white list. This is a list of trusted IP addresses that they feel confident will not send spam to their customers. If your IP is listed on a particular white list then your email messages will be delivered to the destination email address. It is important for reputable marketers to work with the major ISP's such as AOL to ensure that you are on their white list. For most, it can be a lengthy process, but well worth your efforts.

Other third-party email certification programs now exist. Bonded sender www.bondedsender.com is one such agency. By joining Bonded Sender, senders improve deliverability rates and differentiate their brand. Senders go through a formal application process, adhere to email standards and post a bond against potential complaints. Major ISPs such as MSN/Hotmail now check against Bond Sender's white list and allow these email to pass.

Knowing if you are on a black list, getting removed if you are and getting established on white lists is critical if you are email marketing. The more messages delivered equals
more sales!

About the author:
Author Karen Fegarty is with MailWorkZ the creator of Black List Monitor-- advanced service that continuously checks all the major blacklists for you, and then some. Don't be treated unfairly! Keep a handle on who may have you blacklisted. Get a free trial and find out more at http://www.blacklistmonitor.com
Please consider the following article for publication.
Circulated by Article Emporium

Saturday, July 15, 2006

Let The Email Wars Begin

Things just got a lot hotter in the hyper-competitive world of online email providers.

In response to Google's announcement that their soon-to-be-launched "Gmail" service will offer users 1 gigabyte of email storage, Yahoo! announced an upgrade of their free email service to allow users 100MB of free email storage along with other enhancements.

Microsoft's Hotmail will surely also announce a free upgrade in email storage space.

On the surface it might just appear like a simple case of one-upmanship, but it actually represents major forces digging in online and preparing to do battle.

It appears Yahoo! simply wanted to take the issue of email storage space off the table as a consideration for users as to which email service to choose.

Google enjoyed considerable media and public attention over the past few weeks with the media marveling at how Google intended to give hundreds of megabytes more space to its users than Yahoo! or Hotmail.

With this move, Yahoo! made storage a "non-issue," but the real war has only just begun.

Email ranks as the number one most popular online activity according to virtually any survey you care to read.

When people go online, they spend the single biggest chunk of their time sending, receiving, and reading email.

Online email providers understand that eyeballs on a page looking at advertising and responding to offers is what makes them money.

By increasing loyalty among email users in order to repeatedly draw them back to the same website (often several times a day), email service providers like Yahoo!, Hotmail and Google can keep people looking at revenue generating ads.

Despite the best efforts of government regulators, private organizations, software filters, ISP's and others, over half of all email sent online rates as unsolicited commercial email (SPAM).

Besides storage space, Google, Yahoo! and Hotmail will start claiming that their spam filters rate better than the rest.

These online powerhouses hope to attract users with the promise of cutting down and even eliminating the avalanche of get-rich-quick, pornography, and ink-jet cartridge offers (among others) that bombard virtually anyone with an email account more than 15 minutes old.

This will, however, lead to another problem that many of them won't talk about, which involves filtering legitimate email as spam.

Unfortunately, the sword cuts both ways on this issue.

So where does it all end? Never! Hotmail will enter the fray with expanded storage capacity as well as the promise of less spam and a more "friendly" interface to make your email life even easier.

Yahoo! and Hotmail will most likely copy Google and start serving context sensitive advertising based on the content of each email message as it get viewed.

Privacy advocates will weigh in to claim that all of the filtering and serving of ads based on an email message's content violates our rights to privacy and heralds the arrival of "Big Brother."

But all this jockeying for position and enticing users from one email service to another actually represents a great boon for the average Internet user.

It will force three of the Web's biggest players to wake up and improve their services after 2 or 3 years of "business as usual" and we can all expect a few valuable innovations to result.

About the author:
Jim Edwards, a.k.a. TheNetReporter.com, is a syndicated newspaper columnist, nationally recognized speaker, author, and web developer. Owner of nine (9) successful e-businesses as well as a professional consulting firm, Jim's writing comes straight off the front lines of the Internet and e-commerce.
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.turnwordsintotraffic.com
© Jim Edwards - All Rights reserved
http://www.thenetreporter.com
Circulated by Article Emporium

Wednesday, July 12, 2006

Six Tips to Get Rid of Spam Email

Ignore Spam Email
Do not open an unsolicited email. Spammers are just playing a numbers game. They simply send out like a million emails and hope that at least a third of them stick.

Spammers try to gather as many email addresses as they can. They don’t even know if any of the addresses are active. It is when you answer them that they know whether or not it is an active account that is checked often.

2. Do NOT Click On the Unsubscribe Links
It is natural for you to want to click on the link at the bottom of the email that promises that you can be taken off of their email list, but do not think for a second that this is what happens.

When you click on the “click here if you wish to stop receiving these emails” link, the spammers simply change the name that sends it to you. All you have proven is that you are indeed opening and reading emails.

3. Use Various Email Addresses
Since it is unavoidable to receive spam, set up a “dummy” email address. You would use this address when you register for newsletters, order products, enter contests, and register your new software.

You would like to avoid using you primary email address, or the email address that you receive from your ISP for things like that. This is the email that you would give your contacts or “safe people”.

4. Don’t Post Your Address
If you have a web site, avoid posting your email address in your “contact me” section.
Since spammers scan through web sites and look for the @ symbol, write your email address with the word “at” instead.

That makes it a bit more difficult for spammers to find your email address because they use special software that searches for the symbol, and not just the words.

5. Do Not Purchase from Spam
The absolute worst thing that you could do is buy something from spam. Just imagine how perfect the world would be if everyone gathered together to refuse to buy things that were offered in an unsolicited email. Spammers would be out of business the moment that they realized that they weren’t getting anywhere.

6. Beware of Free Trial Software
For every legitimate download, there are plenty that are designed to get your personal information, which will eventually lead you to more spam. This is particularly popular from free trial software as well as free software.

Spammers use this method in a similar manner as they would use a gift promotion and contest sign in. That is one of the most beneficial ways for spammers to get you on their hook.

About the author:
Alex Fir
Visit Stop Spam Center for the latest news and information about how to block spam. http://www.stopspamcenter.info/
Article Source: www.iSnare.com

Saturday, July 08, 2006

Take back control of your inbox. Eliminate annoying and potentially harmful e-mails

Are you tired of spam stealing your time, your money, your bandwidth and your hard disc space?

The time you devote each day to sort and delete spam from your inbox could be put to much better use. In the European Union alone, the working hours employees are spending on sorting and deleting spam is costing the companies and estimated 10 billion euros every year! By manually sorting out spam after it has reached your inbox you are loosing time and money, as well as bandwidth and space. You are also putting your computer at risk by allowing possibly hazardous content to enter your server. Supportcave.com offers free intelligent Spam Blockers, helping computer users to protect their computers as well as reclaiming their time, money, bandwidth and space from the spammers.

Every day - 365 days a year - more than 10 billion spam e-mails are sent out to e-mail users all over the world. Despite new laws and verdicts trying to strike down on the spammers, the number of spam e-mails are expected to rise to 30 billion a day by the end of 2005. Today spam constitutes 37% of all e-mail traffic in the U.S.

Spam is not only annoying, it's dangerous and it is causing financial losses for companies as well as individuals. For example, an estimated 10 billion euros are spent every year by companies in the European Union to deal with spam. Spam is sent out by fraudulent companies and individuals and can often be infected with viruses, spy programs or other undesired software. Studies show that 95% of all computer viruses are sent through e-mail. Even virus free spam causes problems since it consumes the users' time as well as hard disc space. Spam is however not only shunned by the users, the Internet Service Providers abhor it as well since it chews up a lot of bandwidth and disc space, and the non-stop sending of e-mails uses a lot of system resources and stresses the e-mail servers. This leads to a less effective Internet and increased costs for everyone.

The best way to protect your self from spam and battle the spammers is to use a Spam Blocker. The most basic forms of Spam Blockers are software programs periodically checking your e-mail for the best known types of spam and remove them, or filter them into a special folder for you to remove. There are however much more sophisticated Anti Spam programs on the market. The Webroot Spam Shredder is a Spam Filtering Software that lets you to remove spam e-mails from the mail server without ever pulling them down into your inbox. This means heavily increased security for your computer and your network and is the most efficient and effortless way of controlling your incoming e-mails. You will be given the opportunity to accept or delete suspected e-mails while they are still on the server. You can also choose to quarantine them for later review.

The Webroot Spam Shredder is equipped with a smart learning engine, which studies your decisions to keep or delete spam. The longer you use the Webroot Spam Shredder, the more effectively the program will sort your incoming e-mail. The Webroot Spam Shredder Whitelist and the Webroot Spam Shredder Blacklist features let you identify e-mails that should be immediately delivered or instantly deleted. If you use Outlook, Outlook Express or Eudora for your e-mail, you can effortlessly import your contact list into your Whitelist. When friends, family, colleagues etcetera send you e-mail those letters while be instantly delivered to you inbox and you won't have to make any decisions regarding them.

The Webroot Spam Shredder database is a frequently updated to protect you from the latest known spam. You can choose your desired level of protection and the type of messages to scan with the Spam Shredder.

Are you tired of spam stealing your time, bandwidth and hard disc space? Applying the Webroot Spam Shredder allows you to determine up to 99.9% of the spam e-mails. Install the Webroot Spam Shredder today and start safeguarding your time as well as your money from the fraudulent spam senders!

About the author:
Jason Frovich
Supportcave.com offers new and enhanced Spam Blocker Software. Not only will these programs effectively check and clean your email from spam, once installed it identifies and diverts spam before it reaches your inbox.
Circulated by Article Emporium

Wednesday, July 05, 2006

Spam - How to Report it

I’m sure you find spam just as frustrating and annoying as I do. So I’ve done some investigation in how to report it to get these people hopefully in a bit of strife! And put spam to an end or at least lessen it ;-)

You see, I actually didn’t realize for a while I was actually making the situation worse. You ever receive those spam emails where you KNOW for sure you NEVER signed up to receive their emails and then they provide an unsubscribe link down the bottom?
Anyways, here I was clicking the unsubscribe button on all these annoying spam emails thinking I was getting my email address removed from their database where all I was doing was confirming that my email address was active and I was reading their spam emails.

Here is how YOU can report these spammers (and hopefully lessen the amount that drifts in and out of our inbox’s every day).

Report Spam Here:
http://www.spamcop.net/

It will show you how to get the details and IP addresses of the spammers to forward to SpamCop in order to file your report against them. Please make sure before doing this, that the email you report as spam “really” is spam and not something you joined on to receive. It's just as bad to falsely accuse someone of spam just as it is to receive spam!
Make sure before you join anyone’s mailing list that they have a privacy notice that allows you to unsubscribe at anytime you wish. And states clearly they will not rent nor share your email address with any third party.

If you find this information helpful please feel free to forward it on to your friends. They can join my mailing list simply by sending a blank Email to scams@aweber.com

About the author:
Joanne King
Join my mailing list simply by sending a blank email to scams@aweber.com (And yes you can unsubscribe at anytime and I will not rent nor share your email address with any third party, spam annoys me just as much as it annoys you).
Circulated by Article Emporium