SlideShare una empresa de Scribd logo
1 de 5
Jujuan RomeRome1<br />Professor Stephanie Quinn<br />English 2950<br />Rough Draft<br />You ever get that email from that unknown address saying that you’ve won something?  What about the text message from a 5 digit number telling you that something on sale?  No?  Well you’ve had to had seen the ads on the websites you go to that tells you you’ve won a million dollars. What about the sexual enhancements ads?  Everybody that has ever been on the internet have at least seen one of the above. What to know what it is?  Keep reading!<br />Spam is flooding the internet with many copies of the same message, in an attempt to force the message on people who would otherwise choose not to receive it.   In the Cheryl Bowman article “What Is the Meaning of Spam”, she says, “ The modern meaning of spam is unsolicited commercial emails sent to thousands of users simultaneously.  Most spam is commercial, electronic junk mail or email chain letters.   Spam cost senders very little to send and is paid by the recipient or the carrier, not the sender.   Email spam targets individual users with direct mail messages.<br />Email spam lists are often created by scanning Usenet postings, stealing internet mail list and searching the web for addresses.  One particular option of email spam is sending spam to mailing lists.   Because mailing list limits activity to their subscribers, spammers will use automated tools to subscribe to as many mailing list as possible.   They then use the mailing lists <br />Rome2<br />as a direct target for their attacks.   Never reply to spam, this let spammers verify that this is a known good address.  Be careful where you place an email address on the web.<br />In addition to wasting people’s time with unwanted email, spam also eats up a lot of network bandwidth.   Network Bandwith is a measure of available or consumed data communication resources expressed bit/s or multiples of it.  There are many software developers who have taken it upon themselves to fight spam with a variety of techniques but because the internet is public, there is really little that can be done to prevent spam or junk mail.  However, some online services have instituted policies to prevent spammers from sending spam to the subscribers.   With this in mind there’s an antispam organization out there that’s fighting for you.  CAUCE, the Coalition Against Unsolicited Commercial E-mail, is an all-volunteer global entity.  They put all their efforts into getting legislation passed that would help stop and penalize spam.<br />It is a new day at the office, and workers are getting online to check their electronic mail, only to find that it has been overrun by unsolicited junk mail.   This mail, more commonly referred to as spam has been around since the beginning of the Internet, and as the Internet has grown, so has spam .A recent study by Star Internet, based on the typical number of staff spending ten minutes a day checking their mail, indicates that spam costs companies because time is money.  This is just one reason why bulk unsolicited or spam e-mail is costly, time consuming, and should be banned. The term spam for unsolicited e-mail is believed to have <br />Rome3<br />originated from a Monty Python skit in which the dialogue was drowned out by shouting out the word quot;
spamquot;
.<br />Although spam is a problem for businesses, it is certainly not limited to them.   A large amount of spam mail is targeted at anyone who has an e-mail address, and many adults are therefore concerned at some of the content that is sometimes received with these inconvenient messages.   Some spam messages may contain explicit content, such as subject headers that display sexually explicit words and phrases that may be unsuitable for children who have access  to the Internet.  According to Mike Grunch, “ It is extremely important to pay attention to internet security but on the other hand, there is no reason to get paranoid”.  <br />Even though spam can contain some sexually explicit material, there are generally twelve spam scams that seem to be popular.  Many spam messages may contain promises of business opportunities, making money scams, work-at-home schemes, health and diet scams, easy money, getting free merchandise, chain letters, getting free merchandise.  Investment opportunities, cable scrambler kits, guaranteed loans or credit with easy terms, credit repair, and vacation prize promotions.  You should always use junk mail filters and refrain from opening or responding to unknown and unfamiliar emails.  Not only could they be just spam but they may also contain a virus which may be a bigger threat to your computer and cost more money in the long run. <br />Rome4<br />According to Dorothy Frank, “ A quick test to see if your email is in the spam database is to attend google and type in your email address.  If any results come up then your address is in the public domain and spammers have open access to it.”  You can prevent opening up spam messages through your email or commercial by understanding the anatomy of it.  There are about six key things that you can observe right before you decide to click on an email or advertisement.  Look at the sender.  Usually the name would be in capital letters and would be a name that is unbelievable and looks as if the computer just made it up.  Looking at the sender can be used to spot spam.  You can observe the e-mail address.  It would clearly look fake but if you don’t catch on at first you can look at the domain after the @ sign and Google about it and see if its offers are related to the email. <br />The subject also can cause a red flag with its bad spelling.  But it avoids mentioning what the message is actually about which might help it sneak past some spam filters.  The body image is the body of the message is actually an image rather than text.  Again this is another trick to defeat spam filters.  Finally there is the extra text.  Spammers regularly use large lumps of text to try to convince filtering systems that a message is legitimate.  What should be noted is that nowhere in this mail does the text actually mention what the message is about.  The only mention what it is offering for sale is in the image.<br />When you hear the word spam, your immediate thoughts go to the more well-known and common form of spam: e-mail spam.  However, other types of spam are found in a variety of <br />Rome5<br />internet communication mediums such as instant messaging, discussion boards, mobile phones with text messaging, newsgroups, internet telephony, blogs — basically any device or client that provides a means for communications.<br />At the end of the day, you probably won’t be able to stop spam.  What you will be able to do is contain in and prevent it from containing special information.<br />
How to Identify and Avoid Email Spam
How to Identify and Avoid Email Spam
How to Identify and Avoid Email Spam
How to Identify and Avoid Email Spam

Más contenido relacionado

La actualidad más candente

Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Informationebooker97
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerJillian Stone
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Gamecynthia.warner
 
Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;ddbennett
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scamsMr.OoPpSs Group
 

La actualidad más candente (16)

Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Email Etiquette Script
Email Etiquette ScriptEmail Etiquette Script
Email Etiquette Script
 
Email basics
Email basicsEmail basics
Email basics
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 
Allan Watt
Allan WattAllan Watt
Allan Watt
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
School presentation
School presentationSchool presentation
School presentation
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
2016 NGH Convention Newsletter 6
2016 NGH Convention Newsletter 62016 NGH Convention Newsletter 6
2016 NGH Convention Newsletter 6
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 

Destacado

Living Safely 2016 final copy
Living Safely 2016 final copyLiving Safely 2016 final copy
Living Safely 2016 final copyEvelyn Anderson
 
Www batteryer-fr (2)
Www batteryer-fr (2)Www batteryer-fr (2)
Www batteryer-fr (2)chemylike
 
RES Risk 2016 Conference brochure - 18-20 May 2016, Sydney
RES Risk 2016 Conference brochure - 18-20 May 2016, SydneyRES Risk 2016 Conference brochure - 18-20 May 2016, Sydney
RES Risk 2016 Conference brochure - 18-20 May 2016, SydneyPedram Danesh-Mand
 
ATIN VATS - Marketing Report on USL
ATIN VATS - Marketing Report on USLATIN VATS - Marketing Report on USL
ATIN VATS - Marketing Report on USLAtin Vats
 
ÖNCEL AKADEMİ: ÖZEL KONULAR
ÖNCEL AKADEMİ: ÖZEL KONULARÖNCEL AKADEMİ: ÖZEL KONULAR
ÖNCEL AKADEMİ: ÖZEL KONULARAli Osman Öncel
 
Sổ tay thư viện hàm ngôn ngữ C
Sổ tay thư viện hàm ngôn ngữ CSổ tay thư viện hàm ngôn ngữ C
Sổ tay thư viện hàm ngôn ngữ Cvncoding
 
Derechos de las mujeres en el papel y en la práctica. Belén Martín
Derechos de las mujeres en el papel y en la práctica. Belén MartínDerechos de las mujeres en el papel y en la práctica. Belén Martín
Derechos de las mujeres en el papel y en la práctica. Belén MartínMario Padilla
 

Destacado (13)

Living Safely 2016 final copy
Living Safely 2016 final copyLiving Safely 2016 final copy
Living Safely 2016 final copy
 
Avatar
AvatarAvatar
Avatar
 
Caroline Martin CV
Caroline Martin CVCaroline Martin CV
Caroline Martin CV
 
Www batteryer-fr (2)
Www batteryer-fr (2)Www batteryer-fr (2)
Www batteryer-fr (2)
 
ac-6
ac-6ac-6
ac-6
 
RES Risk 2016 Conference brochure - 18-20 May 2016, Sydney
RES Risk 2016 Conference brochure - 18-20 May 2016, SydneyRES Risk 2016 Conference brochure - 18-20 May 2016, Sydney
RES Risk 2016 Conference brochure - 18-20 May 2016, Sydney
 
ATIN VATS - Marketing Report on USL
ATIN VATS - Marketing Report on USLATIN VATS - Marketing Report on USL
ATIN VATS - Marketing Report on USL
 
Sustainability In Product Design And Manufacturing
Sustainability In Product Design And ManufacturingSustainability In Product Design And Manufacturing
Sustainability In Product Design And Manufacturing
 
ÖNCEL AKADEMİ: ÖZEL KONULAR
ÖNCEL AKADEMİ: ÖZEL KONULARÖNCEL AKADEMİ: ÖZEL KONULAR
ÖNCEL AKADEMİ: ÖZEL KONULAR
 
Sổ tay thư viện hàm ngôn ngữ C
Sổ tay thư viện hàm ngôn ngữ CSổ tay thư viện hàm ngôn ngữ C
Sổ tay thư viện hàm ngôn ngữ C
 
Well intervention
Well interventionWell intervention
Well intervention
 
Derechos de las mujeres en el papel y en la práctica. Belén Martín
Derechos de las mujeres en el papel y en la práctica. Belén MartínDerechos de las mujeres en el papel y en la práctica. Belén Martín
Derechos de las mujeres en el papel y en la práctica. Belén Martín
 
Production Plan
Production PlanProduction Plan
Production Plan
 

Similar a How to Identify and Avoid Email Spam

Final paper
Final paperFinal paper
Final paperJDonpfd3
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSaneBox
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 

Similar a How to Identify and Avoid Email Spam (20)

Final paper
Final paperFinal paper
Final paper
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Spam
SpamSpam
Spam
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
IST
ISTIST
IST
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
Web spam
Web spamWeb spam
Web spam
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
spam
spamspam
spam
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 

How to Identify and Avoid Email Spam

  • 1. Jujuan RomeRome1<br />Professor Stephanie Quinn<br />English 2950<br />Rough Draft<br />You ever get that email from that unknown address saying that you’ve won something? What about the text message from a 5 digit number telling you that something on sale? No? Well you’ve had to had seen the ads on the websites you go to that tells you you’ve won a million dollars. What about the sexual enhancements ads? Everybody that has ever been on the internet have at least seen one of the above. What to know what it is? Keep reading!<br />Spam is flooding the internet with many copies of the same message, in an attempt to force the message on people who would otherwise choose not to receive it. In the Cheryl Bowman article “What Is the Meaning of Spam”, she says, “ The modern meaning of spam is unsolicited commercial emails sent to thousands of users simultaneously. Most spam is commercial, electronic junk mail or email chain letters. Spam cost senders very little to send and is paid by the recipient or the carrier, not the sender. Email spam targets individual users with direct mail messages.<br />Email spam lists are often created by scanning Usenet postings, stealing internet mail list and searching the web for addresses. One particular option of email spam is sending spam to mailing lists. Because mailing list limits activity to their subscribers, spammers will use automated tools to subscribe to as many mailing list as possible. They then use the mailing lists <br />Rome2<br />as a direct target for their attacks. Never reply to spam, this let spammers verify that this is a known good address. Be careful where you place an email address on the web.<br />In addition to wasting people’s time with unwanted email, spam also eats up a lot of network bandwidth. Network Bandwith is a measure of available or consumed data communication resources expressed bit/s or multiples of it. There are many software developers who have taken it upon themselves to fight spam with a variety of techniques but because the internet is public, there is really little that can be done to prevent spam or junk mail. However, some online services have instituted policies to prevent spammers from sending spam to the subscribers. With this in mind there’s an antispam organization out there that’s fighting for you. CAUCE, the Coalition Against Unsolicited Commercial E-mail, is an all-volunteer global entity. They put all their efforts into getting legislation passed that would help stop and penalize spam.<br />It is a new day at the office, and workers are getting online to check their electronic mail, only to find that it has been overrun by unsolicited junk mail. This mail, more commonly referred to as spam has been around since the beginning of the Internet, and as the Internet has grown, so has spam .A recent study by Star Internet, based on the typical number of staff spending ten minutes a day checking their mail, indicates that spam costs companies because time is money. This is just one reason why bulk unsolicited or spam e-mail is costly, time consuming, and should be banned. The term spam for unsolicited e-mail is believed to have <br />Rome3<br />originated from a Monty Python skit in which the dialogue was drowned out by shouting out the word quot; spamquot; .<br />Although spam is a problem for businesses, it is certainly not limited to them. A large amount of spam mail is targeted at anyone who has an e-mail address, and many adults are therefore concerned at some of the content that is sometimes received with these inconvenient messages. Some spam messages may contain explicit content, such as subject headers that display sexually explicit words and phrases that may be unsuitable for children who have access to the Internet. According to Mike Grunch, “ It is extremely important to pay attention to internet security but on the other hand, there is no reason to get paranoid”. <br />Even though spam can contain some sexually explicit material, there are generally twelve spam scams that seem to be popular. Many spam messages may contain promises of business opportunities, making money scams, work-at-home schemes, health and diet scams, easy money, getting free merchandise, chain letters, getting free merchandise. Investment opportunities, cable scrambler kits, guaranteed loans or credit with easy terms, credit repair, and vacation prize promotions. You should always use junk mail filters and refrain from opening or responding to unknown and unfamiliar emails. Not only could they be just spam but they may also contain a virus which may be a bigger threat to your computer and cost more money in the long run. <br />Rome4<br />According to Dorothy Frank, “ A quick test to see if your email is in the spam database is to attend google and type in your email address. If any results come up then your address is in the public domain and spammers have open access to it.” You can prevent opening up spam messages through your email or commercial by understanding the anatomy of it. There are about six key things that you can observe right before you decide to click on an email or advertisement. Look at the sender. Usually the name would be in capital letters and would be a name that is unbelievable and looks as if the computer just made it up. Looking at the sender can be used to spot spam. You can observe the e-mail address. It would clearly look fake but if you don’t catch on at first you can look at the domain after the @ sign and Google about it and see if its offers are related to the email. <br />The subject also can cause a red flag with its bad spelling. But it avoids mentioning what the message is actually about which might help it sneak past some spam filters. The body image is the body of the message is actually an image rather than text. Again this is another trick to defeat spam filters. Finally there is the extra text. Spammers regularly use large lumps of text to try to convince filtering systems that a message is legitimate. What should be noted is that nowhere in this mail does the text actually mention what the message is about. The only mention what it is offering for sale is in the image.<br />When you hear the word spam, your immediate thoughts go to the more well-known and common form of spam: e-mail spam. However, other types of spam are found in a variety of <br />Rome5<br />internet communication mediums such as instant messaging, discussion boards, mobile phones with text messaging, newsgroups, internet telephony, blogs — basically any device or client that provides a means for communications.<br />At the end of the day, you probably won’t be able to stop spam. What you will be able to do is contain in and prevent it from containing special information.<br />