Friday, June 29, 2007

Are You A Forum Spammer?

One of the most successful kind of websites for social interaction among people with common interests is a forum. There are forums for every interest in the world and many are used by industry leaders in business as well as celebrities. From sports to gardening, marketing to politics, religion to popular music, every niche has a forum.

For website owners, forums are an opportunity to get more exposure and brand themselves as a expert in their field. Giving advice, sharing stories, networking, and asking questions are the most commonly found content in posts, except for one type...

The Spammer

Unfortunately, many high quality forums are ruined by the entrance of spammers. There are several types of forum spammers, some more subtle and others who are totally blatant. It is generally considered good forum etiquette in include any kind of self-promoting links in your forum signature, a little post that gets added to all of your text posts. These signatures are most often in BBCode and occasionally in HTML.

The blatant spammer will simply use these code in their posts to promote links to whatever site they want. Often this is the case with inexperienced affiliate marketers who don't know how to appropriately promote their site so they post it in forums asking people to visit.

If this tactic ever works it can only be because of ignorance on the part of the forum members. What's worse is that the post is simply the URL embedded with obvious affiliate identity tags and the post itself brings no contribution whatsoever to the community, it's just an ad.

The next step is that these forum spammers figure out that nobody is clicking on their links so the decide that the obvious identity tags in the link are driving people away because nobody wants to be somebody else's money making machine. The now novice affiliate goes and gets a "tinyurl" to hide the affiliate tags in their link and then they start posting that one everywhere, once again, blatantly advertising without contribution. After a little while they figure out that they still aren't getting people to click on their link, and start finally recognizing that affiliate marketers use "tinyurls" like candy and most people know that is a tactic to make the website owner more money and even worse, people feel like the owner tried to actually trick them into clicking on the link.

At this point the affiliate discovers he or she can change the link text so it isn't so obviously an affiliate link, so while the posts themselves continue as ads, the text to click on is no longer the URL but a phrase full of hype that says something like "my program makes me lots of money" (which it usually doesn't) so now they are starting to feel a little more confident. The spammer, however, is starting to realize that the posts are getting lots of complaints and no friends are being made in the community.

The affiliate is starting to realize that people don't want to be sold to on the forums. His intention of capitalizing on the niche is not a problem, but the method of attracting clients is like trying to see the sunset by running east. It'll never happen unless the approach is changed.

The spammer then decides to make a choice. Spam the forum or join the forum for the same reasons the other members of the community do and simply include a subtle link in their signature and actually become a contributing member.

Don't be a spammer, play by the rules. You'll have more friends, generate more interested prospects, and escape being banned from the best forums in the world.

About the Author:
Tyler James Ellison teaches how to make fast easy money online marketing legally using automated systems and guerilla techniques to promote businesses.
Posted: 15-02-2007
Article Source: ArticlesBase.com

Wednesday, June 27, 2007

How To Tighten Up Your Email Security

These days email is a necessary part of communication. However, this also means that email is one of the most popular ways for a virus to infect your computer. You need to protect yourself from the threat of fraud and infection.

Viruses

Email attachments often contain viruses so you need to be careful whenever you open any type of attachment even if you know the sender. There are some viruses that can infiltrate your address book and then send email that is infected to everyone on your list. This means that you can get a virus from a colleague or a friend. The best thing to do is to communicate with the sender so that you know you are expecting an attachment.

Software for virus protection is your best bet against viruses. This software will scan all your email attachments when they are received on your computer. All computers that have Internet access will need to have antivirus software so that all systems are protected as one big whole. There are some viruses that will start with one computer system and then spread to the rest of the network, eventually encompassing all the hardware that is needed to access the Internet.

Phishing

Email can lead to fraud, which is yet another type of security risk. Phishing, is one type of fraud that will try to trick you into giving out personal passwords or banking information. This type of email will use the logo from a well known banking institution or online business after which they will ask you to update your banking information or your password.

Phishing provides a link that looks as though it is legitimate but that in fact will lead you to a false website. If you provide them with personal information you become a victim of theft or fraud on your credit card. This is also known as "identity theft".

Email content and subject lines can be your clue to phishing. Instead of using your name the subject line might say something like "To our valued customer". It isn't hard to find some variant for personal names so be on the alert.

Less of clue to phishing is when a link is included that has nothing to do with the text in the email. You can verify this by highlighting the link and paying attention to the status bar. For example, if the email text is something about Microsoft, and the URL is www.nowhereland.com, you have a good clue that the message you've received isn't really from Microsoft.

There is software that can detect whether phishing is occurring. Even though this software isn't fully mature yet it can at least identify if an email is fraud. Whenever you are asked for your credit card number or a password you should be suspicious. Always keep in mind that no legitimate banking institution will ask you to give personal information or to verify any passwords in the content of an email.

E-mail Backups

Your email, just like other data on your computer, should always be backed up. Most email programs will be easy to back up. All you need to do is export your email messages to a selected folder and then do a backup on this folder. You can use a backup program and put your email onto a writeable CD, DVD, removable disk, or any other type of media.

You also have the option of buying backup software that is specialized for backing up email. This software is moderately priced and eliminates the need to export your email to a folder.

You can automate most backup software so that backups happen at a time that is convenient without you having to lend a hand. You'll have to find time in your busy schedule to configure this type of software. However, you'll be no more busy doing the configuring as you would be if you need to replace an email that you needed.

About the Author:
Paul Wilcox writes about internet security and other related topics. Sign up for my free newsletter and receive my special report "How To Lock Your Computer Down - Internet Security in 2006" at www.internetsecuritysquad.com/freereport
Article Source: http://www.articles2k.com

Monday, June 25, 2007

Spam Scams: How Not To Become A Victim

All spam emails we receive every day in tens or hundreds are annoying and disgusting. But the worst of them are scams, hoaxes, and illegal schemes aimed at defrauding you of your money, private information, and even your life. Being aware of how the spam scams work you will be able to protect yourself against the spammers-fraudsters and not to become a victim of their fraudulent schemes.

A lot of spam scams arrive in the form of a great investment offer. It usually works as a Pyramid scheme. Spammers ask you to pay money for a membership, goods, or simply to "invest" promising you much money as revenue. Your revenue will come from those people who will invest after you. Your investment is distributed to those who joined before you. At some point the pyramid ruins because there are not enough new investors to keep the money flowing. The spammer is at the top of the pyramid and he is the only one who benefits. The scan may not always look like an investment offer. The spammers can ask you to distribute some advertising letters to a list of email addresses, for remuneration. Although they will tell you that the list contains only opt-in email addresses, it’s not true, and you will be sending spam directly from your computer.

Another fraudulent scheme you may meet looks like a letter coming from a company that you do business with. Usually the spammer asks you to follow a link within the message supposedly to update your account. But actually this is done to worm you out your personal and financial information. If you click on that link, you will be brought to a page that will look like a company’s web site. While you are logging in or filling the form in, the program is recording your keystrokes and all your private information – account number, user name, password, social security number – is disclosed. Never click on the links included in such emails. Just open a company’s web site in a separate window and check your account details out.

Nigerian spam is one of the most dangerous email scams. The mechanism of the scam is simple. The spammer sends you a badly spelled letter on behalf of a government official, deposed ruler, or relative of a ruling family asking you for help. They have some goods, money, or jewels that they cannot access due to political reasons. They ask you to allow them transfer large sums of money into your bank account. They promise to remunerate you for your kindness, or even leave all money to you. Attractive offer, isn’t it? Don’t be a dolt, don’t believe them. They tempt you into a trap. Their object is to obtain your account number and bank transfer information. They also may ask you to send them a fee to bribe some corrupt government officials. Further you may receive additional officially looking letters where you will be asked to provide further documents, private information, and money. When they have “played” with you long enough, or believe that you may suspect to be led on, they will rob you and quite.

Take care! Don’t react upon any spam message whatever tempting offer it contains. Delete it at once, or let an anti-spam filter delete all spam before you download it into your inbox.

About the Author:
Julia Gulevich is a technical expert associated with development of computer software like AATools, Advanced Email Verifier, G-Lock EasyMail, Spam and Junk Email Filter http://www.glocksoft.com/sc/ More information can be found at Anti Spam Filter Resources http://www.glocksoft.net/sc/.
This article was posted on November 27, 2006
Article Source: articlecity

Friday, June 22, 2007

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to be able to send lots of it on an ongoing basis to stay in "business". High profile spammers can send 80 million pieces of junk email every single day. Yes one single person.

ISPs all over the online world have vowed to stop spammers sending such vast amounts of email through their mail servers. Do they really keep their word? All the end user sees is that the spam keeps coming. There must be a loophole there somewhere. There is.

In the soft white underbelly of the internet there exists something known as a pink contract. The term pink contract comes from the color of the famous tinned meat that junk email gets its name from. A pink contract is simply a business agreement between the ISP and the spammer. The spammer agrees to pay the ISP to turn a blind eye to the junk email passing through their mail servers.

Surely this is bad business for the ISP? Well the answer to that is both Yes and No. Yes it's bad news for the people who receive the junk email and No it's good news for the ISPs bank balance. A monthly pink contract can pay the ISP amounts from $10,000 upwards. Bearing in mind that the average work-at-home spammer averages $100,000 net per year the above figure is small change fo the bigger junk email vendors (the guys who earn $200,000 - $400,000 per month.)

But..... the CanSpam Act 2003... surely that's going to make a difference? Of course. Any ISP in the United States can get in serious, serious trouble for signing pink contracts. Problem is that there's a whole big world wide web out there and the vast majority of pink contracts are signed with overseas ISPs where US authorities have no jurisdiction - China and Russia being perfect examples.

There's no moral to this story. Spam is a huge problem that's finally being taken seriously by Governmental bodies. However until they start imposing prison sentences or seizure orders on those individuals and companies in the pink contract business the problem can only continue.

About the author:
Niall Roche
This article was provided courtesy of Spam-Site.com which reviews and tests spam blockers for the business and end user.
Circulated by Article Emporium

Thursday, June 21, 2007

How To Recognize And Prevent Pfishing Scams

The warning notice you get from your bank over the internet may be a fraud. It is a scam intended to make you give up secure financial information. This article will show you how to recognize and deal with these frauds.

Have you ever received e-mail messages that threaten to close your PayPal or Ebay account unless you send them information? It's a scam called "phishing." It is pronounced "fishing." It means what it says. Internet scam artists are fishing for information. It comes from Internet fraudsters who send spam or pop-up messages to lure personal information from you. Their objective is to extract sensitive information from unsuspecting victims.

The Federal Trade Commission(FTC) warns you that when phishers send you a fraudulent e-email, they want you to update, validate,or confirm your bank, credit card, or PayPal account, including passwords. Some phishing e-mails threaten to terminate your account if you don't respond. The messages direct you to a website that looks just like a legitimate organization's site. However, it isn't. It's a bogus site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.

The FTC suggests these tips to help you avoid getting hooked by a phishing scam:

If you get an e-mail message that asks for your personal or financial information, DO NOT REPLY. Do not click on the link in the message. Legitimate companies don't ask for this information via e-mail. If you are concerned about your account, contact your bank or credit card company using a telephone number you know that is genuine.

All the scam merchant needs is for you to access his/her website. Then, you are hooked. To avoid an inadvertent mistake, stay off the internet until you have established contact with your financial institution.

Use anti-virus software and a firewall. Keep them up to date. Some phishing e-mails contain software that can harm your computer or track your activities on the Internet without your knowledge.

Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones that can effectively reverse the damage and that updates your files automatically.

A firewall helps make you invisible on the Internet. It blocks all communications from unauthorized sources. It is especially important to use a firewall if you have a broadband connection. Operating systems like Windows also may offer free software updates to close holes in the system that hackers or phishers could exploit.

Don't e-mail personal or financial information. E-mail is not a secure method of transmitting personal information. If you initiate a transaction and need to provide such information, look for indicators that the destination site is secure. Unfortunately, no indicator is foolproof. Some phishers have forged security icons.

Review credit card and bank account statements as soon as you receive them. Check for unauthorized charges,address changes,and unexplained account balances.

Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security.

After you are back on the internet, forward spam e-mail that is phishing for information to spam@uce.gov. Also, forward the suspicious e-mail to the company, bank, or organization impersonated in the phishing e-mail. Most organizations have information on their websites about where to report problems.

If you believe you've been scammed, file your complaint to ftc.gov, and then visit the FTC's Identity Theft website at www.consumer.gov/idtheft. Victims of phishing can become victims of identity theft. While you can't entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk. If an identity thief is opening credit accounts in your name, these new accounts are likely to show up on your credit report. You may catch an incident early if you order a free copy of your credit report periodically from any of the three major credit bureaus.

You can learn other ways to avoid email scams and deal with deceptive spam at ftc.gov/spam

About the Author:
Bob Carper is a veteran information systems consultant specializing in verbal and written communication. He holds a BS and an MBA degree. He is an ardent railfan and belongs to the New York Central Historical Society. Visit http://www.secure-webconference.citymax.com
Submitted on 2007-02-07
Article Source: http://www.articlesarea.com/

Tuesday, June 19, 2007

Product Review: SpamArrest

Does any of this sound familiar? You get so much spam that you have to keep your finger on the delete button whenever you check your email. Then you inevitably erase the one or two important messages that you really needed to see, so you have to sift through all the spam again in your Trash folder to find them.

If you go out of town for a couple of days, your inbox fills up with junk and your important messages start to bounce before you can return to your computer to clean out your inbox and make room.

That was my situation. I have a spam filter at the ISP level, which really does not seem to filter out much. And I tried a couple of other spam filtering solutions, but they delayed my email too much, and I never fully trusted that everything was getting through.

I tried SpamArrest after noticing that a colleague was using it, but my expectations were not terribly high because the other filtering solutions that I had tried just did not work for me.

How Does it Work?

When you sign up for a SpamArrest account, you simply make a few changes to your email program (such as Outlook or Eudora) so that SpamArrest can download your email from your ISP to the Spam Arrest mail server. Then SpamArrest sorts it and filters whatever you do not want. I expected to have a little trouble configuring my email account correctly, but it was no sweat at all. The instructions are very detailed and easy to follow. They definitely cater to the layperson, so there is no jargon. And if you do have trouble, you can get technical support via email.

The basic SpamArrest account allows you to filter up to 5 email accounts. And they have a webmail feature, too, so you can access your mail by logging into your account at the SpamArrest website. It is great if you are traveling and just want to check in.

Once your email accounts are configured, you simply decide whose email you would like to continue to receive. You can preauthorize senders by typing in specific email addresses, by using a special import feature, or by preauthorizing entire domain names.

When someone who is not on your preauthorized list tries to email you, she will receive an email asking her to verify her intent to send you the message. The idea is that a real human being will verify her identity, but a spambot or automated mailing system will not.

One of my favorite parts of the SpamArrest system is that anyone who is on your preauthorized list is never sent a verification email at all. So you can easily set it up such that your friends, relatives, and colleagues never know you are filtering your messages.

Once someone responds to the verification email, she is added to your list of authorized senders. Then her original email (and all subsequent emails she sends you) will get through.

You can always remove people from your list of approved senders, too, so you have total control of whose email gets to your inbox.

If a verification email is not responded to, the email stays in a special "Unverified" folder in your online SpamArrest inbox for a whole week. That way, you can log in and check to see if any important messages were not verified. For example, sometimes I will forget that I signed up for an email newsletter, so I simply authorize the sender by clicking a button on the screen. Then the message, and all subsequent messages from this particular email address, will go right to my inbox and skip the "Unverified" folder altogether.

Right after I opened my SpamArrest account, I checked this Unverified folder every day, but now I find that most of the senders that I want email from are already on the authorized list, so I check in only every few days. It is easy to tell which messages in your Unverified folder are new since your last login, because they stay in bold typeface until you log out.

According to the SpamArrest statistics on my account, a full 63.64 percent of my email to date has been spam. It is such a great relief to know that it never made it to my inbox at all. I save a lot of time each morning, and I enjoy sending and receiving email again.

How Much Does it Cost?

At the time of this writing, SpamArrest subscriptions are $5.95 per month (or you can save by signing up for a year or two at a time: $44.95 for one year and $74.95 for two years.) You can add features for an additional fee, but I have the basic subscription and have never needed anything beyond that.

About the Author:
Susie Cortright
You can get a free 30 day trial of SpamArrest here. And view the latest Coupon Codes here..
Posted: 15-02-2007
Article Source: ArticlesBase.com

Tuesday, June 12, 2007

Spam Fighting Strategies for Webmasters

Battling spam is just like fighting any other activity that is illegal and needs to be fought in many areas. There are some easy steps that you can take to minimize the impact of spam in your email, as discussed in Part I. However, the webmaster of your email service has many more tools they can use to fight spam.

The effort would be small if a spammer had to collect email addresses one by one. This is why they take advantage of programming that is automated, such as using a spambot. A spambot is a program that looks through Internet websites for legitimate email addresses. These addresses are then "harvested" and put into huge lists.

The best way to deal with spammers is by raising their cost without putting too much of your own effort into it. Some of the techniques described in Part I can also be used by a webmaster.

CAMOUFLAGE

A spambot will only do what it has been told to do through a program. Many times a spambot will pass you by simply if you've disguised your email address. This is because a spambot is usually programmed to search for character strings that look like this: Jane_email@emailaddressdomain.com. You can fool a spambot by changing the email to Jane_email_at_NOSPAMemailaddressdomain.com.

Should the disguised email address be harvested by a spambot it will still need to "scrubbed" before it can be used. A program for scrubbing can be difficult to write since there are many variations that are possible, such as NO_SPAM and no*spam. Try to be as creative as possible.

There is a disadvantage to the above method: you need to remember to take out the extra letters as well as put in th@ sign.

You can make an email address impossible to harvest by putting it into a graphic instead of plain text or mailto:. Not many spambots are smart enough to translate a graphic and understand the pixel pattern as text that is usable. This is particularly true since graphics can have many shapes. Again, this method can be inconvenient because you won't just be able to reply to this address or copy and paste it.

Another approach is to get rid of the accessbile and visible email address completely. You can use a form for feedback that stores data in areas where a spambot can't search. You can also store the data inside of easy to write code that is difficult to decipher due to encryption. An example of this would be javascript.

BARRIERS

Communication becomes more difficult between trusted sources when visible email addresses are hidden in graphics or banned from visibility. You want to hinder the spammer by putting a block on any spambots that are known.

Many times they will have a signature that is easily seen through an IP address that is well known or a process name (and sometimes both). Other times they can search for User-Agents that are a non-browser form.

Webmasters can easily block IP addresses as well as block any unwanted processes. The webmaster just needs to begin a cron job that will scan the network for the name of a process and then terminate any IDs that are associated with the process.

A more experienced webmaster will have a daemon that will sleep until that time when a process name is noticed. The daemon will then "wake up" and terminate the process before any spam harvesting can occur. Sample programs, which are only a bit harder to implement, can be used and are available online.

You can get traps for spambots that will block any request that is incoming simply based on search patterns and behaviors. This method to fight spam is slightly more difficult to set up and attend to because it needs certain patterns to define it, changing the pattern slightly for different spambots. How-to information and sample perl programs are available online.

RAISE THE PRICE

After time most spammers will tire of trying different variations in programming just to get email addresses, making the reward much less than the effort. This is what you want to do: make the spammer cost much higher than the reward which will make your reward much more than the effort.

A spammer won't give up until there is no profit in the effort. US legislation, such as CAN-SPAM, has only seemed to deter businesses that are legitimate and that were never the guilty ones to begin with.

There are, however, some things being done to reduce the problem of spam to just an annoyance: there are penalties for sending spam, filters for junk mail are becoming smarter, and there are proposals underway that include needing a mailer ID.

This is all bad news for the spammer while at the same time is great for the rest of us computer users.

About the Author:
Paul Wilcox writes about internet security solutions for the Internet Cyber Security website. Sign up for our free newsletter at http://www.internetcybersecurity.com
This article was posted on September 15, 2006
Article Source: articlecity

Wednesday, June 06, 2007

Hall of Shame – The Bad Boys of Email Spam

The majority of Unsolicited Commercial Email (UCE) or “spam” is sent by a relatively small group of dedicated professional spammers. The Register of Known Spam Operations (ROKSO) indicates that 80% of all spam comes from just 200 known spam operations. This data is in line with research completed by CipherTrust research scientists, which indicates that most spam originates from a relatively small group of tightly integrated spam networks. While we’re all very familiar with the spam messages we receive each day, it is interesting to take a look at who these spammers are – to put a “face” to the problem. Following are four of the most notorious and prolific spammers in the world.

Alan Ralsky
Mr. Ralsky is currently one of the most egregious spam senders in the world. His organization, based in Michigan since 1997, uses Chinese, European and US-based servers to host and send spam to millions of email boxes daily. But that’s not enough for Ralsky. Not only does he operate as a spammer, but he also provides hosting services to other spammers.

In 2002, Verizon sued Mr. Ralsky for causing their network to freeze twice. The lawsuit originally sought $37 million, but was settled out of court for an undisclosed amount. Ralsky is no longer allowed to send email over Verizon’s networks, but admits no wrongdoing in the case and has vowed to continue sending bulk email.

Mr. Ralsky was convicted in 1994 for falsifying documents to defraud two banks in Michigan and Ohio and was fined $74,000. In an unrelated case in 1992, Ralsky was sentenced to 50 days in jail and ordered to pay $120,000 in restitution for failing to deliver a contract involving unregistered securities.

While Mr. Ralsky sends millions of unsolicited email messages selling everything from diet pills to online gambling, he claims that his business is legitimate and that his emails are not spam. He also insists that he does not sell pornography. We’re sure he’s an absolutely charming fellow.

Scott Richter
Scott Richter’s Denver-based company, OptinRealBig, is responsible for sending out billions of spam emails. He is one of the most outspoken and notorious spammers in business today. Whereas most spammers attempt to keep a low profile, often denying any involvement in spam, Richter seems to enjoy the spotlight. In fact, Richter even attempted to start up a “Spam King” clothing line before Hormel (the company responsible for bringing delicious canned Spam to dining rooms around the world) put an end to his trademark-infringing idea.

Richter and his partners were named in a lawsuit filed by the New York Attorney General and Microsoft. That suit, filed in 2003, sought millions of dollars in punitive damages, but was settled out of court in mid-2004 with a paltry fine of $50,000. For quite some time, Richter regarded his legal entanglements as excellent advertising for his company which, he claimed, gains value each time he is sued.

Recently he has changed his story somewhat. Faced with prolonged lawsuits led by Microsoft as well as various state and corporate entities, Richter has now declared bankruptcy. As his father (who is also his attorney) said, "It’s the legal fees that are battering the company. OptIn is profitable but for these lawsuits."

Andrew Westmoreland
An apparent accomplice of Scott Richter, Westmoreland’s Texas-based company, Internet Access Group Inc., sends millions of spam messages pushing everything from gas to online diploma mills to auto loans and mortgages. His business also operates under the names Brilliant Marketing, Aphrodite Marketing, OptiGate Networks and Players Exchange Club.

Robert Soloway
Robert Soloway’s Oregon-based company, Newport Internet Marketing Corporation, has sent millions of spam emails and has been the subject of numerous complaints and lawsuits by class action groups and Microsoft.

Soloway’s spam messages often contain get-rich-quick schemes selling (what else?) spam software and “fresh” email addresses. Yes, that’s right folks; you too can send spam to 15 million recipients for just $295. At least that’s what the ad says, but would you want to give your credit card number to someone like this?

Slam the Door on Spam
This is just a small sampling of the questionable characters who insist on clogging your inbox with junk email. While these may be some of the most egregious offenders, there are plenty more waiting in the wings who would like nothing more than to be considered equally offensive. As these new spammers rise through the ranks, we’ll keep you posted on who they are, and what kind of shady business they’re up to.

About the author:
Dr. Paul Judge, CTO, CipherTrust, Inc.
Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company’s flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting www.ciphertrust.com/products/spam_and_fraud_protection today.
Circulated by Article Emporium