Showing posts with label Spam. Show all posts
Showing posts with label Spam. Show all posts

Wednesday, December 21, 2011

Spam, spam, spam, spam...good spam, wonderful spam....VIII

OK - before we move onto the next topic, I've received a few requests concerning the Monty Python title to this thread.  So - here you you go:

http://www.youtube.com/watch?v=anwy2MPT5RE


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk

Tuesday, December 20, 2011

Spam, spam, spam, spam...good spam, wonderful spam....VII

So - although spam is annoying, it is also a carrier of viruses, malicious software and can be used to enter computer systems for classified or personal information.

     The most important factor with spam is simply to block it.  Spam, fortunately, is a relatively "low tech" form of fraud and intrusion into your computer's software and and hardware systems.  It works in the most basic way possible: by sending masses of emails to override your email filter and get your attention.  In this respect, spam is nothing more than the 21st version of a "chain letter."

     Just keep in mind to block spam and keep a lookout for emails that are not from recognized sources or do not make any sense.  This is just basic advice in the modern world.  Also, fortunately, spam is such an old method of fraud and overriding computer systems that most people are aware of it, or at least have heard of it.  Also, fortunately, most ISP's and service providers provide a "spam" folder for placing incoming spam messages away from your system and "junking" them.

    We will move on to a new topic tomorrow.


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk

Sunday, December 18, 2011

Spam, spam, spam, spam...good spam, wonderful spam....VI

More spam prevention tips:

1.  Don't respond to the "removal request" email address that shows up in some spam.  It is better to label it as "spam" to your ISP and avoid it in the future.

2.  If you have your own website (as does my Firm), don't put a link to your email address.  Instead, offer user s a form they can use to contact you.

3.  Avoid online service profiles that include contact information.


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk

Thursday, December 15, 2011

Spam, spam, spam, spam...good spam, wonderful spam....IV

Well, we have defined what is spam.  The logical question is: what can we do about it?

     Fortunately, there are some simple answers.  Most internet providers provide spam blocking materials and software devices to block incoming spam.  When you get an unwanted email, you can mark it as spam and your ISP will take care of the matter.

     If spam continues and for some reason the spam marker does not work, then contacting your ISP or even free services like Yahoo and Google will resolve the problem.

     Of course, if you receive a spam email and the email has an attachment, do not open it under any circumstances.

    We will continue with this tommorrow.


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk


Wednesday, December 14, 2011

Spam, spam, spam, spam...good spam, wonderful spam....III

OK - we know what is spam.  Other than the fact that it is annoying, why should we really care?  We can always delete it and not worry about it.

     Well, first of all, as we discussed in a previous post, spam can "clog" a computer network and its systems.  This is because of the vast bulk emails that are sent.  But, unless you are a network administrator or an IT professional, this does not really affect us (in the sense that it is up to the network administrator or the IT professional to clear the backlog.

    Remember what I stated earlier, however, spam can also be used for fraud.  Spam are carriers of 419 scams.  Spam is also used to collect information on the recipients of such emails.  Remember, with bulk emailing, sometimes it is easy to "overlook" one and provide information to a request for such information by not paying attention to where the email originated.  Also, it goes without saying that spam mails can contain viruses.

    Spam, by its very nature, is not meant for "good" purposes.  This only leaves the option, therefore, that spam is sent for "other" purposes.


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk




Tuesday, December 13, 2011

Spam, spam, spam, spam...good spam, wonderful spam....

So - just what is this wonderful thing called "spam?"  We need to define it if we are to talk about it.

     Spam is unsolicited bulk email.  Just like in the past with snail mail, where a person or organization could buy mailing lists of potential clients and then send a "form" letter to these people with offers of some good or service, in today's world it is possible to buy mailing lists (or even find them) of millions of email addresses (yes, that is "millions") and send out bulk emails offering goods or services for sale.

     Spam can cause a multitude of problems.  First of course, most people find it annoying (with good reason).  Second, however, spam can tie up a computer network if enough bulk email is sent (and as we all know, millions of unwanted emails can be sent all over the world in a blink of an eye).  Third, bulk email can also cause impairment to systems or data or to programs simply by the large numbers of email that is send.  Fourth, spam can be used as a cover to send emails that are carriers of a virus.  Fifth, of course, the spam can be used to commit fraud.

   More on this later.


NOTE: THE INFORMATION IN THIS BLOG IS NOT LEGAL ADVICE NOR IS IT INTENDED TO BE LEGAL ADVICE.  IF THE READER HAS ANY LEGAL QUESTIONS, PLEASE REFER TO AN ATTORNEY.

Have a great and fraud-free day.


----------à>>>>>>>>>>>>>>>gene tausk