Fighting Spam on the Internet!
Receive so much spam? The box explodes with invitations to buy Viagra, pirated software, or degrees at bargain prices ? Arginate this annoying bad Network with some cunning and so much attention. We all know what is spam. Unfortunately. The majority of those who own and use at least one e-mail account regularly receives good with unwanted advertising ,often for dubious taste and little use , sometimes even fraudulent . We are used to propose solutions to the problems that may plague your PC , but at the end of 2013 , an article about anti-spam systems can not yet definitively resolve this ” plague ” . The fight against spam today is far from won : recent estimates have estimated that spam and the like make up over 85 % of the traffic of e-mails that travel over the Internet .
Despite periodic cleaning operations at a high level (had resonance to the end of 2013 , which led to the closure of a network of spammers known as ” McColo “, responsible for only three-quarters of spam circulating on the Internet) “enemies ” tend to reappear like mushrooms , and more and more aggressive. Systems against spam are more sophisticated , automated and effective than it was ten years ago , but the mailboxes are still not immune to the problem. As antispam, in fact, even the spam evolves. In these pages we will offer you not then the ultimate solution to the problem because it does not exist . We just want to explain what the situation is today , and give you all the advice you need to succeed in curbing what remains one of the most annoying problems related to the use of the Internet.
Blacklist “Blacklist”. List of sender addresses to block.
Disposable e-mail “E-mail use and throws. “An e-mail account “Fixed-term” varying between a few minutes and a year.
False positives Posts considered as legitimate “Unwanted publicity” from the antispam program for a error detection or heuristic logic.
Mailbox Expression English for “inbox Electronic. “But also for “Mailbox” ordinary.
Email is one of the main means of communication staff in use on our planet. Its widespread distribution , unfortunately, also makes it an ideal tool not only to convey advertising, but also Spyware, viruses, scams and other pitfalls . So much so that , to date, to determine the exact boundaries of the phenomenon of “spam” is not so simple . By this means , usually , the simple unsolicited advertisements or authorized by the recipient, who suffers from boredom to receive messages persistently offering the purchase of Viagra or useless products at bargain prices.
Site useful for everyone. spam.abuse.net
SpamCop determines the origin of unwanted email and reports to interested Internet service providers
The unsolicited advertising does not have any significant negative effect for the PC ( if not a bit ‘ of bandwidth consumed ), nor necessarily lead to subtle fraud. At one level a little ‘ more formal , however, we can say that , to be under attack, not so much the mailbox or the ” online life ” , but the privacy of each user.
The e-mail address is personal data (although not classified as ” sensitive data” , in the Italian legal terminology ) , and no one has the right to send advertising to people who have not provided an explicit consent. Close relative ( and a lot more bad) spam is phishing e-mail messages distributed using the same techniques that do not contain spam advertising but real attempts to steal personal information , passwords, and credit card data in the simplest way , or asking the user directly , usually with the excuse of alleged security checks (the technique is called ” social engineering “). The ultimate solution to spam does not exist. However, there are several solutions to make their life difficult software to install, requiring protection from the operator of mailboxes , plus a little ‘ forethought to divulge your e- mail only to people and sites you trust . And let’s start right from this .
If a spammer does not know your e-mail , could not write . It is a truism , but the first rule of conduct to be observed spam is as simple as possible : do not turn your e-mail address on the Internet. When you enter an address in the databases of spammers , do not go out anymore : and at that point you might as well move on to the next suggestion , December 9, 2013 at 55 which we will explain what to do when prevention did not fire , and the spam starts arriving in mailboxes. So on chat forums and public use fake addresses or temporary .
If you publish pages on the Web , do not put your address in them . If you participate in a forum in which the request is a valid email address to which you receive notifications, create a soft dedicated address , to be used only for private or professional correspondence , and recorded a second email account with a provider free to use in all situations potentially risk. This is true in particular for creating accounts on instant messenger and social network .
All the most popular instant messaging programs (from Windows Live Messenger , Gtalk and Yahoo! Messenger) directly using the e-mail address as an identifier , and if your program ” runs ” a little ‘ , be prepared to get in the box e-mail a bunch of garbage daily . Some social networks ( including the ubiquitous Facebook) allow you to hide the e-mail address , making it visible to friends only ( we will explain in the box on page 56 ), others are more naive and offer thousands of addresses to spammers , armed with programs (called ” harvester ” ) able to pick them up automatically without a shot being fired .
The most popular and effective at the time, is that of ” disposable e-mail ,” e-mail account that is “disposable ” to be used exclusively for the amount of time ( usually a few minutes, but also much more ) need to sign up for a new Web service you have tried to be careful, to jealously guard your e-mail , but after a while ‘ is, however, a message arrived unsolicited advertising . And , after that , another . And then another , with increasing frequency . The idea to keep out the spammers seem to have failed :
what to do ? Surrendering ?
Of course not. If spam starts coming, the only thing you can do is try to contain it , with a program that will deal and there are free as far as possible . Today’s anti-spam installed on the PC can be divided into three categories: a ” heuristic search ” to ” blacklist ” and ” collaborative .” The anti-spam heuristic search try to identify spam messages analyzing their contents if they contain certain terms , maybe repeated several times , the message is classified as ” unwanted ” and moved to a specific folder on the mail client (or deleted directly ) .
The limitations of this approach are essentially two . The first is that such protection is circumvented rather easily and , to be effective , the ” typographical variants ” block for each term must be numerous. An example. If you decide to lock the term “water pills ” ( most of the world’s spam comes from phantom pharmacies on- ine) is not enough to block the word ” pills ” : a spammer could replace letters with numbers ( p1lls ), or the “I” case to the “L” lower case ( piIIs ) making the message difficult to detect , but still legible to the human eye . Not to mention the word ” pills ” written with spaces between the letters ( pills ) , or within punctuation ( pills or capsules) . The other limitation of this approach is the risk of so-called false positives. That is, involves a real danger that a perfectly legitimate message sent from your contact dall’antispam be blocked because it contains terms suspected or images that are too big ( another technique of spammers is to send messages with text , a single image advertising ) , and that even so inconsiderate to not be aware of having received it .
Heuristic analysis is adopted by almost all email client with a built-in anti-spam mechanism , starting from Microsoft Windows Live and Mozilla Thunderbird. The second group of programs work with the mechanism of the ” blacklist “, or senders lists “bad” from which everyone should always be on guard : when a message arrives , the program checks its origin , and , if it appears to have been sent by a spammer already known ( and thus present in the list ), the program crashes before it even arrives in the folder ” inbox ” . This approach is not naturally able to provide effective protection per se ( appear every day hundreds of new spammers) and all the tools that it shall, in general, to combine the heuristic scanning . The ability to update the lists of spammers , however, can help in this way : I get from ” pippo @ pluto.com ” message .
Email user is not recognized as a spammer , but his message contains suspicious words and is marked as spam. At this point, the offending email is blocked, and the sender ” pippo @ pluto.com ” is indicated on the blacklist, so that his next message to be scrutinized more severely or totally blocked . Unfortunately, even the use of blacklists addresses solves the problem of false positives : it is always good to periodically take a look at the box in which the PC focuses messages considered spam , looking for e- mail blocked by mistake from the mesh dell’antispam . Next to the blacklist can also define the ” whitelist “, or lists of addresses of people you trust , from which you should be able to receive mail without running the risk of seeing them aside for error . The ” lists” are used by many security utilities , such as , among others , the suites from Symantec and McAfee.