Easy Life Tips

October 03, 2007

What Can an Anti-spam Firewall Do For You?

Today, the Internet is reminiscent of the wildest days of the Wild, Wild, West. Your stagecoach through the World Wide Web can be hijacked at any instant if you have no knight in firewall armor to ward off any viral intruders. When your computer is connected to the internet with no firewall running, it is vulnerable to attack from spammers, hackers and phishers.

Much like human viruses, computer viruses run the gamut from the benign to the fatally destructive to the computers they infect. And just as with human viruses, prevention is better than cure. Prevention begins by stopping them in their tracks at the portals of contact. This is where a firewall can come in handy.

An anti-spam firewall application will, to an extent, help in keeping viruses at bay. There is, however, no firewall that is 100% hacker proof - there are too many ways in which viruses can be embedded in a software download or regular data, for a firewall to detect and catch them all. However there are some relatively effective firewall programs available on the market, and some of them are actually free for your personal use.

At the bare minimum a home personal computer that is connected to a cable modem or a full time connection needs to have and run a personal firewall software program, as well as anti-spyware and some type of anti-viral program.

The ideal firewall will hide the ports that a hacker might use to gain access to your PC and protect your home PC from attacks, as well as track those attempted entries and prohibit unauthorized access or output from your computer. Two-way firewalls are the best as they block the threats that are incoming OR outgoing, to prevent things such s virus, Trojans or malware from being installed without you knowing it.

Windows XP, as well as the new Vista have a personal firewall built into the operating system that is by default turned on. Because it monitors and offers popup warnings many people turn it off, and leave themselves remarkably vulnerable to attack. The Windows firewall default of "on" should be maintained until and unless you find another software or hardware firewall to protect your system.

Some good freeware anti-viral and firewall software programs are available, such as Zone Alarm and Zone Alarm Pro. AVG also comes in a free as well as a pro version.Neither of these programs comes with adware attached and they are very good solutions to begin to address your internet security.

You will need good anti-virus programs to go after any viruses that may inevitably bypass your firewall. It should be programmed to either quarantine or, preferably, destroy them. Last but certainly not least, it is essential to always keep your anti-viral and firewall programs up to date with the newest patches and security updates. Most viruses target your C: drive, so scan it daily. And never, ever open any unsolicited emails or the attachments that come with them.

Labels:

Continue to Read...

Understanding Spam - How they Work on Your Computer?

Anyone who has an email address needs no introduction to this pesky phenomenon of electronic communication. Spam is unwanted, unsolicited commercial email that is mailed in bulk to thousands, even millions of recipients simultaneously.

Much of the confusion regarding spam comes from a lack of understanding the everyday email user may have regarding the ways and motivations of the spammers.

Whether a given email is spam or not spam can be said to be in the eye of the beholder. There are legitimate email marketers out there, who comply with all applicable laws when they do their bulk emailing. They will, for example, only send their advertising to recipients who have subscribed to their emailing list. In fact, in formal studies have shown that currently, only about half of all spam is deceptive or fraudulent; roughly half of all spam contains genuine marketing messages. Thanks to spammers, all email marketing is tainted with a bad name.

The nature of spam has less to do with its commercial content than with the fact that it is unsolicited and sent out in bulk. There are two categories of spam: unsolicited bulk email and unsolicited commercial email.

Unsolicited bulk email is mass-mailed to recipients who have not given their consent to receive it. This category of spam encompasses jokes, chain letters, virus alerts, etc. unsolicited commercial email targets your wallet. This subset of spam includes get-rich- quick and pyramid schemes, stock offerings for pennystocks, spamming software and fake pharmaceuticals.

While most spam is generally mailed out to advertise a product or service, some is malicious in content and intent. It runs the gamut from jokes and ads, to stock-market scams and virus-laden emails. Spammers, those obnoxious folks who send you spam, will target you because:

- They want you to buy something

- They defraud you out of your hard-earned money

- They want to confirm that your email address is a real live one (and then add you to a spam mailing list)

- They just want to shock and offend

The huge volume of spam has created big problems. While it is free for the spammer to send out his millions of spam emails, the cost of the bandwidth that this junk mail takes up borne by the internet service provider (ISP). The ISP, not one to bear this expensive burden on its own, will pass on some of the cost to you in the form of price increases.
You also pay the price for spam in the time wasted sorting through and deleting junk mail, the loss in productivity and the pure aggravation of having to deal with it. It also raises security issues because it may contain viruses that are harmful to your computer.

How do you spot spam when it lands in your inbox?

Here are a few things you can look for that are a dead give-away

- Email from someone you do not know
- Nonsensical subject lines
- Outlandish promises of money, exotic cruises and lonely housewives
- Adult or pornographic content
- Unsubscribe links in unsolicited email
- Very brief emails - a line or two

You should be aware that spammers often send you email that is designed to look like it came from an acquaintance of yours, a reputable company or a reply to an email from you.

Labels:

Continue to Read...

Top 5 Techniques to Protect Yourself From Spam

It is virtually impossible to avoid having your email address end up on a spammer's mailing list. You can, however, take steps to minimize the amount of spam that you receive. Here are to top five:

Address Munging

Never, ever post your permanent email address publicly online. Posting it on a website, on USENET, or in a guest book, for example, virtually guarantees that it will end up on a spammer's emailing list.

If you absolutely have to supply an address, or regularly participate in online forums but do not want further communication, camouflage your address in some way. You can, for example, disguise your address by writing it in such a way that humans can read it, but the spammers automated programs cannot.

Example: instead of JaneDoe@ISP.com, add a blank space before and after the "@" sign, or use characters e.g. JaneDoe at ISP dot com.

This is reffered to as "address munging". While address munging does not allow for a regular, clickable email link, anyone who really wants to contact you will figure it out the proper address.

If you have a website, provide a feedback form instead of giving your email address.

Sign up for an Alternative Email Addresses

Do not use your primary email address when placing an online order, getting a free download, or want to sign up for a newsletter or free service Get a secondary email address that you can use in these instances. You can open a free email account for this purpose. Email providers such as GMail and yahoo offer this free email service.

Reserve this email address specifically for this online activity - do not offer it to people from whom you want to receive email, as this will likely be lost in the deluge of junk mail.

Also, be sure to log into this account on a regular basis to delete the junk mail and avoid having the account closed. If you get over-spammed, just close this account and open a new one.

Choose an email address that cannot be easily guessed at. One method used by spammers to get email address is to generate a list of likely email addresses based on a combination of first names, last names and commonly used words. They may, for example build an emailing list that has variations of an address like JoelDoe1@hotmail.com, JoelDoe2@hotmail.com etc.
You can foil this spammer's tactic by using a relatively long email address, for example 8 or more characters long. You should also avoid choosing email addresses that include either of your names. Use your initials instead, in combination with numbers, e.g. jtd1509@yahoo.com.

Beware the Phisher Spam

Phishing is a tactic used by spammers to scam you into giving up vital personal and financial information. Its sole purpose is identity theft.

Never divulge any personal or financial information that is requested in an email. Your bank or credit card company would never ask you to confirm or update your personal information via an email or a link in an email. Any such emails should be reported to the bank or credit card company. Never, ever click on any links in this type of spam.

Get a spam filter or spam blocker

Stop the spam dead in its tracks before it ever makes it into your inbox. Well, most of it at least. Though they are not 100% effective, anti-spam software will keep most of it out. Even if you only use the internet a spam filter will help protect you from spam.

Labels:

Continue to Read...

How Spam Can Cost You a Lot?

The volume of spam that is sent out every minute of the day has reached pandemic proportions. The simple reason for this is because the cost to a spammer ranges from zero to negligible. In fact, anyone with a list of email addresses and Internet access can spam thousands, even millions of people with a single click of the mouse. The cost of spam, however, now runs in the millions.

Bandwidth

Spam takes up valuable Internet bandwidth that would otherwise be used for legitimate business and personal use. Bandwidth refers to rate at which data is transmitted; it is the amount of data that can be transmitted within a fixed amount of time. The lower the bandwidth, the slower the transmission.

When spam uses up valuable bandwidth, and clogs up the system, it causes costly delays in the transmission of important, legitimate information. It forces the Internet Service Providers (ISPs) to increase bandwidth just to handle the increased volume. This costs money, and this cost is passed on to the consumer.

Viruses, Worms and Malware

It is becoming an increasingly common menace. Spammers will attach viruses to the email they send out for purely criminal or malicious purposes. Some viruses, for example, are programmed to self-install and give the spammer access to all the vital information stored on your computer. This information is often be used for identity theft purposes.

Other viruses simply do great harm to computers the world over. A Consuner Reports study estimates that the cost of repairs and replacement parts for damage done to computer systems by viruses was over 8 billion over the past two years. This does ot take into account the billions spent on anti-spam and anti-virus software.

Productivity

Spam is not only annoying, it also takes up valuable time just to go through it and figure out sort out the spam from the valid mail. For businesses that receives hundreds of emails a day, the cost in time and productivity really adds up.
The "cost of spam calculator" that is available at cmsconnect.com estimates the that spam costs almost $1000 per employee each year, with over 50 hours of lost productivity for each one.

Lost Messages and Data

As we try to battle the spammers by installing spam filters and blockers, these programs often weed out legitimate businesss correspondence. Lost correspondence from a client or supplier can easily cost businesses money, clients and goodwill

Identity Theft

The phenomenon of phishing has become more prevalent as spammers think up new ways to make a buck at your expense. Phishing involves the use of email that is designed to look like a legitimate company has sent it. It is sent out to millions of people in the hope of scamming them into revealing personal information that the scammer can use for identity theft. The cost of Phishing and identity theft to their victims now also runs in the billions.

The cost of spam is a financial drain on the economy. We pay a high price for the spammer to scam his victims. The spammer pays nothing.

Labels:

Continue to Read...

5 Tips to Protect Yourself From the Spam in Your Inbox

You will inevitably receive some spam in your inbox - there is no getting around that fact of life. How you handle this unwanted junk mail will go a long way toward reducing or increasing the amount of spam you will receive in the future. It may also protect you from viruses, credit card fraud, identity theft and other forms of cyber-crime. Next time you log into your inbox, keep these 5 tips in mind to stop the spammers dead in their tracks.

Do not Preview

If you are able to preview your entire email messages in your inbox, you should disable the message preview pane. This is important because some spam email contains code that is specifically designed to compromise your computer and leave you vulnerable to viruses, Trojan horses or worse. Review the options offered in your email program and change the settings.

Do not Fall for the Phisher's Hook

Many spam emails are cleverly designed hoaxes, which are intended to get you to unwittingly divulge private information. They claim to be from your credit card company, bank or other financial institution, and attempt to fool you into divulging personal information such as your social security number, bank account number, password or other private, identifiable information.

This fraudulent practice is called phishing. Responding to this form of spam would leave you vulnerable to identity theft, credit card fraud and other financial cyber-crime.

Friend or Foe?

Just because an email has been sent to you by a friend, do not assume that it safe for you to open any attachment that comes with it. Contact your friend and verify that they did indeed send it.

Very often, spammers will attach a virus to their spam, which, if opened, will hijack your email program and mail itself out to every email address in your address book. This fraudulent email will appear to the recipients to have been sent by you. If they in turn, open this email attachment, the same malicious cycle is repeated.

Read your Email in Plain Text

Spammers often use Javascript to embed malicious code in their spam. It may, for example, be designed to infect your system with a virus that can install itself in your computer, and give a hacker or other scammer access to your private and financial information - without your ever knowing it. You can protect yourself against this by changing the settings to display the email messages in plain text. This effectively disables many harmful scripting features

Never Respond

Do not click on any banner advertising or send a reply to a spam message. Doing this lets the spammer that yours is a "real, live" address, which will only result in a deluge of even more spam. Unless you have specifically subscribed, do not click on any unsubscribe messages contained in junk mail. Most of these are only intended to fool you into confirming your address as valid. Also, do not forward any junk chain letters you may receive.

Above all else, common sense is the most important form of spam protection you can have. Be vigilant when you check your mail - even the most advanced anti-spam filter available today cannot keep 100% of all spam out of you inbox.

Labels:

Continue to Read...

How Protect your Kids from Spam?

Spam is commercial email that is sent out in bulk to millions of people without their consent. It is may contain advertising messages for regular products and services but increasingly, it is email of an inappropriate, offensive or malicious nature.

Today, many children have an email address that they use to email their friends, submit homework, etc. It is a fun, inexpensive and instant way to keep in touch. However, as the volume of spam keeps rising, the need to protect children from the dangers of spam is a growing concern.

Like all other Internet users, children are just as susceptible to receiving spam as are adults. And because spam is an equal opportunity menace, kids are just as likely to receive spam that contains adult and pornographic material. While there is really no way to totally eliminate the possibility of your kids receiving spam, there are steps you can take to minimize it. Here are a few:

Here are a few tips to help protect your kids from spam

Email Filters

Your email service comes with email filters built in. You can use these to filter your child's email into specific folders, and filter spam into the trash folder. This involves setting up rules that your email program will follow in determining what action to take on incoming messages: to let it through to the inbox, send it to trash or to block the sender.

Your email spam filter program will apply these rules based on certain words in the subject line or body of the email. For example, if an email contains the word "viagra," it will be sent directly to the trash and the sender blocked.

Spam Blocker

Your email service may also come with a spam blocker. If it does not, it may be worth your while to invest in one for your child's computer. Where-as your email filter filters incoming email into folders, the spam blocker blocks spam from going through the system. It checks your mail server every 10 minutes, where it deletes the spam and destroys any viruses it finds. Legitimate email is let on the server and downloads to the inbox when you log in.

Whitelists

Set up an email account for your child that "whitelists" only specific email addresses. A whitelist is just a list of trusted and approved email addresses. For example, you can have the addresses of your child's grandparents, aunts and uncles whitelisted. Whenever email is received from any of the whitelisted addresses, it goes directly to your child's inbox. All other email addresses are blocked.

Monitor, Monitor, Monitor

Be sure to log into your child's email account on a regular basis to monitor the incoming and outgoing messages, and to ensure that the spam filter and spam block are working appropriately.
Using your email spam filter, you can set up a rule that will ensure that a copy of every email that is sent and received on your child's account is forwarded to your own email address

It is very important to educate your children on the dangers of spam and how to handle it if they do receive any in their inbox.

Labels:

Continue to Read...

How to Report Spam Abuse and Where to Report?

Spam is as prolific as the leaves on the trees and because there are so many kinds of it, it is a challenge to find the right site or organization to report spam to.
Each type of spam will violate the law in one way or another and each can be prosecuted if it can be proven.

Saving and sending the entire email header is an important step in reporting spam. The header of every email you receive will contain information on the full chain of computers through which the email passed in order to get to you. Generally, most email will pass through at least four computers: The spammer's computer, the spammer's ISP, your ISP and finally your computer. This is the most reliable way for an anti-spam service to track down the spammer's ISP because the spammer will camouflage the "from" address.

As the email passes through each computer, information is added to the header indicating who the mail came from, as well as where they are sending it. While this header information will seem complicated, you just need to make note of the originating ISP, which will be easy to recognize. For example, if you receive your mail through AOL and you note "yahoo" in the string of information, then you will know to report the spam to yahoo.

To read the information in the email header, just right click on the email, choose properties and then either "options" or "header" depending on your email program. Then cut and paste the header path in its entirety, into the body of the email. Finally, forward the spam email first, to the spammer's ISP, and then next to spam reporting agencies

You should also forward the spam to the Federal Trade Commission (FTC). You can do this at the website: uce@ftc.gov. While the FTC will not take action on individual incidents, they will add the spam to a database reffered to as UCE (unsolicited commercial email)

A common spam scam you may come across is called a "419 Scam", or the Nigerian Advance Fee Fraud. These spam emails generally relates a tale of woe - a death in the family and a huge inheritance that the sender needs your (financial) help to claim. As improbable as it sounds, many people have fallen for this scam and millions of dollars have been defrauded from them. Fax a copy of this spam along with the header information to the United States Secret Service.

Here is a list of the agencies you may report spam to, along with the type of email they can handle or will deal with.

The Federal Trade Commission (FTC).
www.ftc.gov/bcp/conline/edcams/spam/ - This site offers you information about the law enforcement actions that have been taken against deceptive mailers and companies and those who do not honor opt-out requests from email recipients..

www.spamabuse.org
This is a third party reporting agency.

www.spamcop.net
Another third party agency which will report spam on your behalf to the relevant anti-spam agency.

For stock fraud, email the Securities and Exchange Commission (SEC) at enforcement@sec.gov . They are prosecuting however they are only able to deal with fraud in email that has to do with stocks and bonds.

Labels:

Continue to Read...

How Does a Spam Blocker Software or Programme Work?

A spam blocker is one way you can effectively cope with the deluge of spam that is targeted at your inbox each day. This type of anti-spam software works by blocking any unsolicited email from getting to your inbox. It is generally about 90% effective in blocking this spam, along with any viruses and other malicious code that may come with it.

The spam blocker differs from a spam filter in that its function is specifically to block most of the incoming spam. The spam filter works by organizing email that it identifies as spam into folders, and leaves it to you to take further action on. The spam blocker, on the other hand, is specifically programmed to prevent spam from getting through. With a spam blocker, you do not have to deal with the spam it detects and blocks.

So How Does a Spam Blocker Work?

The spam blocker will log into your mail server email account every 10 minutes, inspecting it for spam email. It immediately destroys any viruses, and gets rid of any obvious spam such as email that contains adult or pornographic material. Undesirable email is flagged and then redirected to a folder specifically for spam. You will have an opportunity to sort through this spam folder to verify that no legitimate email is mistakenly diverted there. Any email that it is on your white-list or which it determines as legit will be left on the server to be downloaded as normal.

If an email is from an unknown source and the spam blocker cannot clearly categorize it as either legitimate or spam, it is quarantined in a specific folder until you either move it or delete it. The quarantined spam is usually held in this folder for up to 30 days, or until you take action on it. The spam blocker keeps track of the particular action you take on each quarantined email e.g. if you delete the email. It will "remember" this action and use it to create a new filtering rule that it will apply to future incoming email.

What are the Benefits of a Spam Blocker?

- A spam blocker frees up storage space. Most mailboxes have a very limited capacity to store email. Spam takes up space, and a spam blocker generally prevents large files from making it into your main folder.

- By blocking spam rather than just filtering it, the spam blocker helps minimize the amount of time you have to personally sort through your spam email.

- Because this anti-spam software deletes spam, it drastically lowers the risk of a computer virus infecting your system.

- Many spam blockers are available online for immediate download, are usually very easy to install and generally do not require further configuration..

Many email services offer spam blocker software. If, however, you choose to buy your own, make sure you get one that is compatible with your service. Also take into account the level of blockage it offers as well as flexibility it offers in letting you customize the settings to your own preferences.

Labels:

Continue to Read...