Send Anonymous Email | Stealth Internet Rotating Header Image

February 4th, 2009:

Getting Rid of Spam

Two years ago, a new and sophisticated spam started to spread in the Internet. This spam is called the “Piggyback spam.” This spam takes the form of a regular spam email. Similar to other forms of spam, this contains advertisement of products, but it also contains something else more dangerous. When you open the spam email, there are links to external sites. However,  the links actually contain downloadable files. This files contain malware such as Trojan and Keylogger. The Piggyback spam also has the capacity to install spambot to your computer. The botnet that is responsible for this spam can actually disable your anti-virus software and remove rival spambots from your system.

Avoiding spams

Checking your computer regularly for botnet infection is among the best move that you can do to fight off different types of spams such as the Piggyback spam. There are filtering spam tools that you could use. One type of spam filtering tool is the “integrated” one. This tool is a common feature of email software. The integrated filtering tool gives you the option to mark spam emails for retention or deletion. You can also choose to block future messages that would be coming from a specific sender.

Then there is also the online spam filtering tool. This can be of two types, one for professional use and the other for home use. In the former, the spam is deleted from the mail server, so the spam does not reach the recipient anymore. The latter requires the authentication of the sender; if the spam mail is not authenticated, the email will fail to reach the intended recipient.

Valentine Spam Attack

As Valentine’s Day is fast approaching, there is a group that takes advantage of this upcoming celebration to spread spam. According to reports, messages containing subject lines such as”I love being in love with you” and “I belong to you” started to invade various mailboxes last January 22. The spam email lured victims through its interesting subject lines. The spam email contains a link to a certain site displaying 12 hearts. When the victim clicks one of these hearts, a malware instantly infects the computer turning it into a an “electronic zombie.” Another interesting fact is that the group who is responsible for this malware is the same group responsible for the Obama spam that spread a few weeks ago.

Effect of this spam attack

Upon clicking one of the hearts, a malware is released and your computer’s processing capabilities will be significantly affected. When this happens, your computer will be accessible to hackers, so viruses, worms and other types of malicious software could disrupt your computer system. Computer hackers and those who want to perform malicious tasks online can then use your computer for their cyber crime so that they cannot be easily detected by the authority. They can also access your private information without you suspecting it.

How to avoid spam attack

The best thing that you can do is to prevent yourself from being victimized by spammers. To do this, you have to be very careful when opening emails from unknown sources. It is also helpful that you enable the anti-spam feature of your program. Another option is to buy a software that would protect your computer from malware and spyware.

Combat Forum Spam

There’s money to be earned in running a forum. However, keep in mind that your discussion site can give Internet users an unpleasant impression if it is filled with links to various external sites that are not related to the topics in your forum. They can even be turned off by your focum if there are links leading to sites with pornographic contents.

What is a forum spam

Similar to an email spam, a forum spam contains massages and links that are unwanted or that contain spyware and malware, which could potentially damage your computer or network system. Unlike the email spam, however, a forum spam is posted in a group discussion site. One of the main purposes of forum spam is to lure the Internet users to certain commercial sites to generate more traffic in the said sites. Usually, a forum spam is posted by a spambot or an automated program that is used to send spam. To evade spam filters, some forum spams have texts, though the content is unrelated to the forum.

How can you combat forum spam

Spam prevention can be costly and can actually require a lot of effort on the part of forum administrators. There are actually various ways to combat forum spams. One is through “flood control.” In this way, spambots are prevented from flooding unsolicited massages and links to the forum by making the users wait for intervals before they can post text  in the forum. Another method is by using the CAPTCHA. This is a sort of visual test that would ensure that spambots cannot register automatically. The moderator can also block posts that contains “blacklisted” words from entering the forum.

How to Spot Authentic Email Marketing Campaign

One of the best marketing strategies is email marketing. There are actually lots of companies that opt for this strategy because the advertisement can be distributed to a large distribution list for a low cost as compared with using standard advertising strategies. With the growing number of Internet users, email marketing can really be very effective. Aside from this, email marketing does not require a lot of time to distribute the advertisement of a product, because an email is being sent to a large number of people in just a matter of seconds.

Though an email marketing campaign is legal, there are still a lot of people who are hesitant to open an email which they suspect of containing product advertisement. Many people even consider this email as spam. Though it is difficult at times to distinguish an email marketing campaign from a spam, the two has lots of differences. For one, email marketing campaign is authorized whereas spam is illegal. Usually, the former advertises an authentic product and the latter contains nonsensical messages or fake advertisement. A spam is often use to spread spyware or malware, instead of advertisement.

How to spot a real email marketing campaign

Because a spam can hide as a marketing campaign, it is necessary to be skeptical about the new messages you received. When you open the email, determine if the product advertisement is authentic by doing some research on the product and the company. If you found out that the advertisement is fake, you can then enable the anti-spam feature of your program to block future messages from that specific sender. Usually, in an authentic email marketing campaign, the company that advertises a product sends a message asking you if you want to receive emails from them before they send you other marketing campaigns.

Why “Reply-to-all” Is Not Cool

American diplomats experienced a little commotion last January because some diplomats hit the reply-to-all button upon sending their emails. According to the reports, a blank email was sent to the addresses of people in the department global address list and some diplomats replied to this email hitting the reply-to-all button with a large distribution list. The emails of some diplomats reached thousands of people. This case is one example of a serious danger the reply-to-all email can create if not used properly.

Disadvantages of “reply-to-all” email

The reply-to-all email has lots of drawbacks. For one, when you use the reply-to-all email, you are increasing the number of unnecessary emails that other people receive. A reply-to-all email also facilitates the easy and fast proliferation of malware and spyware. If you often make use of the reply-to-all in sending your emails, you can unwittingly spread malware, spyware, and other undesirable software.

By using this means of sending email, you can expose other private data to other recipients. Your message may also look a bit messy because of the addresses that appear in your email if you opt to send your message through the reply-to-all email. Because the addresses of the recipients appear in your email, this means you will be giving away the addresses of others without their consent. When you use the reple-to-all email, you can also expect to receive a bulk of unwanted messages from various people.

Other alternative

If you want to reply to a person, better use the BCC. In this way, you will only be sending your message to a specific person. You don’t have to worry even if your message is controversial because no one will be able to read it except the person you intended to read your message.