Hacking the Spammers

Written by Bob Osgoodby

Continued from page 1

Be aware that there are some people, who hate spam with such a passion, they actually get software that parses a message and automatically sends a complaint to every email address and domain it finds.

Someone had published an article I had written, and since it included my domain name, a complaint was fired off. That is simply not fair. I didn't sendrepparttar email, it wasn't sent from my account, but I received a warning. The retard who did that apparently doesn't care who they hurt in pursuit of their "holy grail".

But perceived spam is only a very small part ofrepparttar 132844 real problem. I don't mind getting an unsolicited email from a real person. I can always ask them to remove me, and they normally do. A real problem isrepparttar 132845 spammer who forges an email address, and if you try to respond, your message is returned as undeliverable.

Some ISP's have identified domainsrepparttar 132846 spammers use and it is automatically deleted, so you never see it. In order to combat this,repparttar 132847 spammers send it out their scams with a stolen email address that actually exists. I recently received over 6,500 remove requests from people who had received an ad for a sex site, sent out with my return email address someone had used. This is rather a simple matter, andrepparttar 132848 headers inrepparttar 132849 email clearly show it didn't come from me. However,repparttar 132850 inexperienced would layrepparttar 132851 blame squarely on my shoulders. This is identity theft andrepparttar 132852 perpetrators should be severely punished.

You are especially at risk to a hack attack if you have either a DSL or Cable connection, as you are always connected when your computer is on. Someone could break into your computer and spam to their hearts content using your account. We have our computers networked together, and it requires a password to accessrepparttar 132853 files. While that will protect us fromrepparttar 132854 majority of attacks, a determined effort could gain access.

The best protectionrepparttar 132855 average person can use is a "firewall" which prevents people from accessing their computer. Search engines will quickly reveal where they can be obtained.

Now if we could only getrepparttar 132856 hackers to concentrate onrepparttar 132857 spammers, maybe this entire problem would go away.

Bob publishes the free weekly "Your Business" Newsletter Visit his Web Site at http://adv-marketing.com/business to subscribe. As a bonus, get 40,000 FREE E-Books from Larry Dotson, when you visit http://www.ldpublishing.com

Protect Yourself from Being Called a Spammer

Written by Glen Palo

Continued from page 1

ISPs that share MAPS concerns aboutrepparttar harm caused by spam often request access to MAPS' databases so that they can decide whether to block email which originates fromrepparttar 132843 listed sites.

Consequently, ISPs have to fear being listed by MAPS if they are not aggressive in combating spam. As a result, many ISPs will shoot first and ask questions later when one of their clients is accused of spamming.

How do you protect yourself from spam complaints?

First and foremost find an ISP or hosting company that takes a proactive approach to spam complaints. Review their Acceptable Use Policy (AUP) or Terms of Service (TOS). Ifrepparttar 132844 AUP or TOS does not state how or what their process is for handling spam complaints, ASK! Also ask them about their attitude regarding SpamCop. It appears that SpamCop is becomingrepparttar 132845 defacto spam clearing house.

When an ISP or hosting company receives a spam complaint, their policy should be to diligently, and swiftly investigaterepparttar 132846 reported incident. They should make every attempt to determinerepparttar 132847 actual origin of an email, as well asrepparttar 132848 intention before making a determination. Their policy should be to issue a warning first.

If you have an opt-in, opt-out mailing list, it should not be a problem. Even thenrepparttar 132849 possibility does exist for someone to "forget" that they opted in. Using a double opt-in method list is ideal for maintaining opt-in lists. The request to be added to a list is submitted and thenrepparttar 132850 submitter hasrepparttar 132851 requirement to confirmrepparttar 132852 request prior to actually being placed onrepparttar 132853 mailing list.

People writing articles for publication in electronic newsletters should be particularly careful in selecting their ISPs and hosting companies. The possibility exists that an article could be published in a newsletter that someone claims to be spam.

In short, there isn't a set, specific method of determining how someone will react to a mailing, however using common sense, and reading as much as possible aboutrepparttar 132854 pitfalls of spam, should steer readers clear of any major problems.

Some links readers may find helpful: http://www.dtcc.edu/cs/rfc1855.html http://spam.abuse.net/whatisspam.html http://www.spamcop.net

Glen Palo has published the Achieve USA Home Business Journal since 1998. For a subscription, please visit http://www.achieveusa.com For more information on protecting yourself from spam complaints send an email to spam2@achieveusa.com

    <Back to Page 1
ImproveHomeLife.com © 2005
Terms of Use