Hide Ip to Stop Spam

By: Joseph Boyd

How spammers get your e-mail?

There are a lot of methods that they may use. Whereas there are also a lot of spammers' tricks which can't be explained even today.

I?will try to introduce some of them, known to?me at this point.

Automated Software and Scripts

There are different programs and scripts collecting e-mails in an automatic mode which are left by users on website contact forms.

They search for symbols sequence in HTML code:

  • HTML attribute "mailto:" usually followed by an e-mail address;

  • Strings containing "@" symbol which is commonly used in an e-mail.

  • Common Words Dictionary:

    A spammer combines common words and names and sends e-mail using different variations: test1@askldhaskld.com, test2@askldhaskld.com, test3@askldhaskld.com.

    Spammers usually use free big e-mail providers for their experiments.

    E-mail spoofing:

    A spammer makes a fake e-mail header which was seemingly sent from your own address or from an apparently credible source. The goal of this trick is to get you to open and respond to their e-mail.

    Remember! Do not respond to unsolicited e-mail ever. Use spam filters.

    Social engineering:

    A spammer makes a "personal" subject line that a user wants to open. Typical subject lines are: "Hey, how are you?" "Urgent and Confidential," "We need to meet," "I have money for you," or "It snowed again."

    Remember! Do not respond to unsolicited e-mail ever. Use spam filters.

    Message boards and chat rooms mining:

    Do not provide your e-mail address in public places if you are not sure that a webmaster uses special software to protect your e-mail in HTML code. If your e-mail address appears on a message board, in a chat room, or in any public place, a spammer will surely find it.

    Open Proxy Servers:

    Spammers use open proxies to send mail anonymously. Many spammers use these open proxy servers to help maintain anonymity. They hide IP address of their own to hide their location. Everybody knows that not all Proxy Servers are anonymous.

    Fortunately, there is a service that provides anonymity for Internet users and persecutes illegal actions because of the strict privacy policy to stop spamming and illegal actions through its services.

    This service is called SmartHide. The software encodes all the information (passwords, logins, buying, e-mailing, downloading, ICQ, etc.), hides IP address for anonymous surfing and thus helps Internet users to stop some form of spam.

    Web beacons:

    An image can be put inside an e-mail which is invisible to the recipient. It is known as an "invisible GIF" or "a web beacon." Once the e-mail is opened, the spammer is notified that your e-mail address is "alive".

    Do not open e-mail messages if they appear to be spam.

    Text random strings and characters:

    Spammers insert random strings of text to make the spam appear unique. Sometimes they do this with e-mail headers by adding spaces and characters like this: P_R_I_V_A_C_Y.

    Remember! Do not respond to unsolicited e-mail ever. Use spam filters.

    ?Chain Letters:

    Letters that suggest you should send them on to your friends (different number of friends may be required). They may promise you some money for every letter you send or bad luck if you send to less than five people or so.

    Remember! Do not respond to unsolicited e-mail ever. Use spam filters.

    How to stop spammers?

    It is a collection of all my thoughts, common tips and tricks to stop spamming.

  • Protect your e-mail address like your phone number;

  • Use an e-mail service that offers spam-fighting tools;?

  • Use Hide IP Software, like SmartHide (Not Proxy Software)?;

  • Never send a password, credit card numbers or other personal information in an e-mail;

  • Don't post your e-mail in public places (e.g. newsgroups, message boards, chat rooms);

  • Do not respond to unsolicited e-mail - it is a sign that your e-mail address is valid;

  • Never click on a URL in spam - it is an alert that your e-mail address is valid too;

  • Never forward spam chain letters;

  • Top Searches on
    Security
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 
     • 

    » More on Security
     



    Share this article :
    Click to see more related articles