Hacking the Spammers

Written by Bob Osgoodby


I was talking with someone I know who is a real wiz with computers. He was telling me that if someone is persistent enough, they can basically break into any computer. Our service provider was recently attacked andrepparttar hackers placed programs inrepparttar 132844 system which were disruptive.

Their priorities were to first getrepparttar 132845 server back up and running. In order to do this, they had to find and removerepparttar 132846 disruptive filesrepparttar 132847 hacker had placed onrepparttar 132848 system. Their next step was to identify how access was gained, and close that doorway. Finally they will make a concerted effort to identifyrepparttar 132849 hacker. If, and when they do identify this person, they intend to prosecute them criminally, and sue them civilly forrepparttar 132850 damages they caused.

Surprisingly many ofrepparttar 132851 Hackers are kids still in High School taking computer science classes. As an exercise, not approved by their teachers, they create viruses or hack into their friends computers just for fun, and prove that they can do it. Every once in awhile however, it backfires and they create something that doesn't workrepparttar 132852 way they intended. This can quickly spread and have world-wide implications.

Other Hackers know exactly what they are doing and have a malevolent purpose. These people are sick. Their intention is to hurt others, which they do. These people should be prosecuted torepparttar 132853 full extent ofrepparttar 132854 law.

Hacking is something that must be stopped. eCommerce is growing everyday, andrepparttar 132855 actions of these cultural misfits can cost millions in both money and lost time.

Spammers who send unsolicited ads to thousands byrepparttar 132856 hour are also a major problem. While admittedly I have a high profile email address, and probably receive more than my share of spam, this can be similarly disruptive torepparttar 132857 operation of a business. There is no reason why I should have to sort through several hundred ads to find my email. This is disruption of service andrepparttar 132858 spammers should be held liable.

Now there are two kinds of spam. Atrepparttar 132859 risk of offending someone,repparttar 132860 first is perceived spam. Some "yo-yo" either signs up for something, or requests information, and having a mental lapse, forgets they did. They then complain bitterly when they receive it.

And then there isrepparttar 132861 "mental giant" that subscribes to a newsletter or ezine under one email address, which is forwarded to their main one, and forgets they did it that way. For security purposes, they have to be usingrepparttar 132862 mail address they subscribed under to be removed, and don't. They find it easier to simply fire off an expletive filled missive to anyone they can identify.

Protect Yourself from Being Called a Spammer

Written by Glen Palo


The purpose of this article is to help website owners, writers, internet marketers to protect themselves from being accused of spamming.

Anyone that has a website, webpage or electronic newsletter and communicates using email, publishes articles or promotes their URL can be accused of being a spammer.

First, knowledge isrepparttar first step to prevention. Unfortunately, to date there is no official or agreed upon definition of what constitutes spam.

The internet today isrepparttar 132843 result ofrepparttar 132844 collaborative efforts ofrepparttar 132845 Internet Engineering Task Force (IETF). IETF is a large open international community of network designers, operators, vendors, and researchers concerned withrepparttar 132846 evolution ofrepparttar 132847 Internet architecture andrepparttar 132848 smooth operation ofrepparttar 132849 Internet. These arerepparttar 132850 guys that writerepparttar 132851 guidelines (RFC) and standards to which everyone adheres to makerepparttar 132852 internet function. They wroterepparttar 132853 Netiquette Guidelines (RFC1855). For more info, visit http://www.ietf.org/

The Coalition Against Unsolicited Commercial Email (CAUCE) according to their website (http://www.cauce.org) was created by netizens to advocate for a legislative solution torepparttar 132854 problem of UCE (a/k/a "spam"). Unfortunately, they do not specifically define spam other than provide a list of characteristics of email sent by unreputable marketers promoting pyramid schemes, chain letters, etc.

>From my research, I have concluded that spam has been defined as junk email, unsolicited bulk email (UBE), unsolicited commercial email (UCE), unrequested email and more.

Here is a quick check list of things that would possibly be considered spam:

=>Sending advertisements, solicitations, or any type of mailing that was not requested (even if only sent to a single person)

=>Posting advertisements for your web site in news groups, bulletin boards, or any other public medium where such posts are not appropriate

=>Having other people do either ofrepparttar 132855 above.

Most Internet Service Providers and web hosting companies are anti-spam. They have to be because ofrepparttar 132856 severe consequences of being labeled tolerant of spam, and, particularly being listed onrepparttar 132857 Realtime Blackhole List maintained by Mail Abuse Prevention System LLC (MAPS).

According torepparttar 132858 MAPS website at http://mail-abuse.org/, they are a not-for-profit California organization whose mission is to defendrepparttar 132859 Internet's e-mail system from abuse by spammers. Their principal means of accomplishing this mission is by educating and encouraging ISP's to enforce strong terms and conditions prohibiting their customers from engaging in abusive e-mail practices.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use