Read Articles:

How To Avoid Spam Robots
Top 7 Ways to STOP Junk Email
7 Steps To Effectively Take Control O...
5 Zero Cost Solutions to Spam
Do You Get More Spam Than Real Email?
Six Tips to Get Rid of Spam Email
Email Marketing: Affordable Internet ...
The Hidden Dangers of HTML Email
Let The Email Wars Begin
What Spam Blocker is Best For You?
Avoid, Shun, Thwart, Prevent, and the...
Spam - How to Report it
The Trouble With Spam Is....
I'm Guilty Until Proven Innocent
7 Ways Email Can End Your Business Re...
How Spammers Fool Whitelists - And Ho...
Email Etiquette More Than Just Manners
How Spammers Fool Rule-based and Sign...
The Cybermagic of Whitelists
Are opt-in email lists still valuable...
The Bad Guys Are Phishing For Your Pe...
Identity Theft Article - A Phisher I...
Use A Spam Filtering Tool To Manage S...
Evict the Spammers from Your Inbox
Anti-Spam Case Study: Pacesetter Clai...
Why Your ISP Takes Bribes From Spammers
Tips For Safer Computing Online
Cyber Crooks Go "Phishing"
My Emails Are Not Being Delivered. Bl...
How Spammers Fool Bayesian Filters - ...
The Anti Spam Challenge Minimizing ...
All About Spam
Name Squeeze Pages What Are They an...
Why Is Spam Such a Problem?
Is Your Website Blacklisted?
How Spammers Fool Spam Blacklists - A...
Hall of Shame The Bad Boys of Email...
The Vanishing Mail
Can You Survive In An Online World?
Will The Real Spammer Please Stand Up!
Sarbanes-Oxley: A Cross-Industry Emai...
Avoid Internet Theft, Fraud and Phishing
No Customer Left Behind
Why Thunderbird is the Best Email Cli...
What is Gmail?
Web Surfers Revolt Against "Pushy" Ad...
How To Rake In the Sales From Your Lo...
Bayesian Spam Filters Explained
Choosing Your Web Hosting Reseller So...
The Best Internet Advertising Is Free...
The Best Simple Software For The Busy...
Protect Yourself with a Porn Filter
Email Communication Is Dying. What's ...
Anti Spam at the Enterprise Level
Why Choose Dial Up ISP Services
How to register your domain
All About Computer Viruses
Save Time & Sanity With Virtual Assis...
Malware Quiz
Internet News Services Explode Online
Why Corporations Need to Worry About ...
Do Your Autoresponders Drive Your Cus...
5 Critical Steps to Protecting Your C...
Why Use Anonymous Proxy Servers?
10 Tips For Web Success
Domain Registration: Why You Need Pri...
Spammer in the Slammer: Jeremy Jaynes...
BUSTED: Anti Spam Forces Bankrupt Sup...

More Article Pages 1 - 2 - 3

Winning the War On Spam

For years I didn't worry much about spam.

But lately it's got out of control. Over half of my email is now spam, and it was growing by the week - until I took action.

This article shows you some strategies for winning the war on spam.


How Do They Get Your Address?


In the old days, spammers got their addresses mainly from Newsgroups - if you didn't post to Newsgroups, you were reasonably safe. But they're now using a much more efficient method to build their lists - email harvesters.

Email harvesters are robots that roam the Internet collecting email addresses from web pages. Examples are EmailSiphon, Cherry Picker, Web Weasel, Web Bandit and Email Wolf, to name just a few.

How can you protect yourself from email harvesters?

By 'munging' (mung = 'mash until no good') or cloaking your email address.

There are many ways of munging your address - the easiest technique is to use ASCII code for the punctuation in your email address (instead of symbols).

For the colon after mailto use : and for the @ symbol use @ and for the period use . . With this method, your email address would become:

but it will display as:

Your email address will appear exactly as it did before, and it will still be 'clickable', but email harvesters will ignore it and move on.

There are also JavaScript's that you can insert into your web page that will make your email address visible to humans but invisible to harvesting programs. Here's one that works very well:


How To Fight Spam


The most important thing is never, ever, reply to spam.

Most spam contains an innocent-looking 'remove me' email address. Do not use it. Here's why:

Spammers typically buy a CD containing a million or so email addresses, but they have no idea how many of those addresses are active. So before beginning their marketing campaign in earnest, they send out a 'test message' to the entire list.

The test message contains an email address for removing yourself. When you reply to that address, it confirms to the spammer that your address is active and therefore worth spamming.

Worse still, the spammer may be distilling from that CD a list of confirmed active addresses that he will then sell to another spammer.

The key to dealing with spam is to report it to a 3rd party: (1) the affiliate program that the spammer is advertising, (2) the spammer's web host, or (3) the ISP the spammer used to connect to the Internet.

When you report spam to a 3rd party, remember to be polite - they didn't send the spam and they're probably just as anti-spam as you are.

(1) Reporting to Affiliate Programs

Many spammers are affiliates advertising someone else's products or services. So look for a website address that contains an affiliate link, something like this: www.affiliateprogramdomain/841526

Then just send an email to the affiliate program (, informing them that you are receiving spam from one of their affiliates.

Most affiliate programs have zero tolerance for spamming and will remove an affiliate spammer without warning.

Now, affiliate spammers don't want you to see their affiliate link, so many of them send their email as HTML. All you see in the message are the words 'Click Here and Order Now'.

But in your browser just click on 'View Source Code' and search for the letters 'http'. That will take you to the spammer's affiliate link.

(2) Reporting to Web Hosts

If the spam doesn't contain an affiliate link, it's likely that it is coming from the owner of the domain name. In that case you'll have to report it to the spammer's web host or their ISP.

To make a report to the spammer's web host just go to Whois, the directory of registered domain names:

Type in the spammer's domain (the website address that appears in the spam) together with the extension (.com, .org, .net etc).

The host for that domain will usually be listed as the Technical Contact in the Whois record and there will be an email address for contacting them.

(3) Reporting to ISPs

To report a spammer to his Internet Service Provider, you'll have to look at the spam's 'extended headers'.

Extended headers show the servers that the message passed through in order to get to you. The instructions for viewing extended headers will vary depending on what email client you are using.

=> In Pegasus Mail, open the offending message and then

right-click and choose 'Show raw message data'.

=> In Eudora Light, click on 'Tools' in the top menu

bar, and then 'Options', and then select the

checkbox option that says 'Show all headers (even

the ugly ones)' and click OK.

=> In Outlook Express, open the offending message,

select 'Properties' from the File menu and then

click the 'Details' tab.

Reading and understanding extended headers is quite a detailed subject. Here's an excellent free tutorial on how to decipher extended headers:

As an alternative to these reporting techniques, you could use a web-based spam reporting service such as SpamCop ( SpamCop deciphers the spam's message headers and traces the mail back to its source.

Wishing you every success in the fight against spam!

Michael Southon has been writing for the Internet for over 3
years. He has shown hundreds of webmasters how to use this
simple technique to build a successful online business. Click
here to find out more:


©2022 - All Rights Reserved - Articles

Traffic Exchange Websites Free Visits AutoSurf Rotator PTP
SiteMap.xml SiteMap.html SiteMap.txt SiteMapror.xml AutoSurf Surf PTP Rotator Exchange Auto Surf Web Traffic Ads Free Visits Traffic Websites