Saturday, December 12, 2009

SPAM (PART 3)

http://www.wired.com/images_blogs/photos/uncategorized/2007/12/04/spam.jpg


A Quick Look At Email Spam Filters----

You must be eagerly finding for a way out to stop receiving Spam mails in your inbox. Take a quick look at email spam filters to get some idea on how to check spam. There are a number of email spam filters that you can use in your computer. For official purposes, you have anti server software spam where the spam filter is located in the server level to trap all email spam. They prevent them from reaching your inbox. The email spasm not only slows down the performance of the server, but also occupies a lot of storage space. Emails are the easiest and the best way for these viruses to spread.

Working of Spam Filters

Anti spam software and anti spam solutions are essential to aid you in getting a clean inbox. The server spam filter or anti spam server is a software application that scans all the incoming email messages. With the help of their configuration, they identify Spam and prevent them from reaching your inbox. The spam mails not only eats away the storage space and make selecting your personal emails difficult, they also can contain viruses. Using anti spam filters is necessary as it saves both your time and money. But even when you are using anti spam filters, it is recommended to check the messages just to make sure that no personal message has been marked as spam. Even the server spam filters marks email as “false positive” to those that are identified as spam, but in reality they are valid messages. There are various anti spam programs that identifies Spam and sends it to the junk mail folder.

Not all spam filters work in the same way. Some of them are pre programmed where the know spammers are inserted. They accordingly block them. Some of the programs filter the emails based on the keywords used in the mails. Some of the email spam filters are configured and you can easily customize it or the network administrator can also customize it according to the requirement of the company.

An Introduction To Spam Filters----

Using spam filters is another very effective way of combating spam or junk mail. These programs use some keywords like ‘guaranteed’, ‘free’, etc and block any email with those words in them. But this has the disadvantage of sometimes blocking even important mails from your contacts and preventing those senders from sending mails to your address again. The way out is to use add-on spam filters which allow you to control the content that should be allowed into your inbox. This will save you a lot of time and energy as you no longer will have go through each and every email before identifying it as spam and eliminating it.

Spam filters can be installed on any computer system and aim at filtering junk and getting only relevant information to the user.

Setting up a simple spam filter can be very easy. Identify the section ‘filters’ in your email program and create a new filter. Lay down the rules or filter conditions for the new folder. These can be the parameters under which an email would be marked as spam and deleted from your inbox. If you prefer to look at the filtered mail before deleting it, you can choose the option to move it to another folder once it is filtered. Once you save the changes you have made in the new filter, it will be active.

You have a new variety of spam filters in the market now which are called ‘smarter filters’. While these fight and prevent spam very effectively, setting it up is a very complex process and is recommended only for technical experts.

New generation spam filters are different from traditional ones in that they go in for statistical data rather features of spam. These filters decide on spam by analyzing the entire email and comparing it with other already identified spam mails. The error margin for these filters is almost zero as more than 99% of scams are identified and eliminated through this method.

Antispam. Aren't We All! Don't You Just Hate It?----

Antispam. Aren't we all! Don't you just hate it? You've got enough to do without having to sift through a bunch of worthless, or worse yet, offensive junk e-mails in your Inbox.

So what can be done about it? What antispam procedures and software really work?

Spam filtering software is the first stop in your antispam campaign, but in some ways it's the easiest to subvert.

What this antispam tool does is tell your e-mail system to look for designated clue words - sex, nude, porn, for example - and to eliminate the messages that contain these clue words. Of course, there are easy ways to get around these antispam tactics. Did you ever see a message that comes through with the word sex spelled s*e*x? Well, that asterisk method has circumvented your spam filter - or the spam filter of your Internet and e-mail provider.

The other problem with this filter is that you could miss legitimate messages. A friend, for instance, who might mail you that she was "sick of porn sites popping up" might have her message deleted because it contained the word porn.

Two upgraded versions of these antispam filtering products are Bayesian and heuristic filters, which try to identify offensive messages through recognition of phrases as objectionable. SpamAssassin by Apache is probably the best known example of heuristic filtering. What these filters are doing that the more basic ones aren't is looking at the message itself rather than the subject header. Both Bayesian and heuristic filters have an Achilles heel in that they depend for their filtering on frequency. Were a spammer to send a short message it would get past.

To further complicate things by punishing the "good guys," major Internet service providers started simply considering batch emailing as potential spam. What this did, however, was to disrupt opt-in products such as e-zines and newsletters. So that didn't work well. The spammers themselves found a way around it anyway. As they sent out their batch messages they inserted a program that produced a variant in each heading. Perhaps a word that didn't even make sense, but still individualized each message enough to have the batching not appear as batching.

Some non-profit Internet watchdog agencies started keeping lists of the IP addresses of spammers. When these addresses cropped up in mail they were blocked. The way around this for spammers was simple - they changed IP addresses. The result was even worse, in that those addresses then got handed out to completely innocent folks who now had problems sending e-mail. Then the spammers got really aggressive and started creating and distributing viruses allowing them to hijack IP addresses that weren't on the "spam" lists.

Where the answer seems to lie for many businesses and their sites is to bypass standard email communication altogether and resort to online feedback forms for electronic communication. Which of course doesn't resolve the antispam issue for private individuals who have no Web site of their own.

Computers and Consumers - Understanding & Avoid Identity Theft----

Computers and Consumers - Understanding & Avoid Identity Theft

The Internet has given over a billion people, worldwide, a way to instantly find information. The number of threats to a consumer’s security increases as the consumer connects with more computers, companies, and people online. The Federal Trade Commission (“FTC”), the nation’s consumer protection agency, says that all Internet users should understand the importance of online security and should take measures to protect themselves.

Why the Need for Security & How to Protect Yourself

The Computer: Part of a computers sophistication lies in its ability to connect with other computers over the Internet in order to bring you information. When it is connected with other computers, it opens itself up for the transmission of information, which can create vulnerability for the computer. Hackers can connect to the computer, scan it for open ports, and gain access to unauthorized information about the computer user.

Most computers have an Intrusion Detection System (“IDS”) that monitors the computer for suspicious activity. When suspicious activity is detected, the IDS sends an alert that an intrusion has occurred.

An IDS alone will not protect your computer from incoming hackers and viruses. Computer users also need to protect themselves with firewalls, which create a barrier between hackers and the computer and help to prevent access to unauthorized information.

The Computer User: The computer user can also accidentally open doors that will lead to a security breach, such as when the user is using the Internet to make purchases. According to the U.S. Census Bureau, U.S. e-commerce sales for the year 2007 were $136.4 billion. Although the Internet has made shopping a whole lot easier, it has also increased the number of instances of identity theft. A study conducted by the US Department of Justice reports that 6.4 million households experienced some kind of identity theft in 2005. Consumers also open themselves up to increased junk e-mail called SPAM when shopping online. Thankfully, there are ways to minimize your risk when shopping online.

Be careful where you post your personal email address. Consumers using the Internet increase their chances of receiving SPAM e-mail each time they provide their e-mail address to make a purchase. As mentioned earlier, hackers can access consumer information by scanning ports that are not secure. Consumers can help protect themselves by only providing information that is necessary when making the purchase. There are companies designed to help protect consumers from e-commerce identity theft and SPAM.

When providing payment information, consumers should always make sure the site is secure. An easy way to determine whether a site is secure is to look at the web address bar at the top of the screen. The http, which precedes the address, should change to https when checking out on a shopping site. The ‘s’ indicates that the consumer is shopping from a secure page.

Finally, a consumer should avoid using ATM/debit cards to make purchases, as the breach of this information could lead to unauthorized access of the consumer’s bank account information. Use a credit card instead. Most credit card companies will work on behalf of their client, should a hacker steal their credit card information. In many cases, the consumer will only be responsible for $50 of the transactions.

When a consumer shops wisely on the Internet and acts in conjunction with private Internet security sites and the FTC they will decrease the chances of being one of the six million households affected by identity theft.

Digging into spam and filtering services----
http://www.jackmedia.web.id/wp-content/uploads/2009/05/spam.jpg

If you talk to anyone who uses email, spam is something that is frequently on there mind. How often is it that you open your inbox checking for an email from your mom, and you end up with emails with subjective titles involving animals, and foreign objects.

There are ways to fight back against Spam, and one of the most popular is through the use of a spam filtering service. There is all different types of spam, and surprisingly not all of them involve email. Most spamming involves the advertising or otherwise promotion of a product, however this is not true in some cases.

Most common types of spamming include: Email spam, Link spam and search engine spam.

Email Spam is the simple act of sending out massive amounts of 'junk email' to anyone and everyone, in order to promote a product. Often times spamming has been exploited by more 'undergorund' industries such as the adult industry, but it would be unfair to say that other industries haven't used it as well.

Link Spam is a form of spamming or spamdexing that recently became publicized most often when targeting the increasingly popular weblogs. Weblogs is one of the biggest problems, however link spam also affects guestbooks, and online discussion boards. The purpose behind spamming these various places, is to display hyperlinks to a various page or product, which helps both with user exposure and search engine popularity.

Search engine spam is usually closely related with the above "link spam", as it is the process of creating countless numbers of pages, that populate search engines. Often times these pages will be full of garbage text and have no real value on there own. When a user visits them, they will either be re-directed to a completely different page, often times on another domain, or show prominent advertising.

Everyone can take their part in removing spam. The easiest way for a general user to not encourage spam, is not to use it. Spammers only spam, because it must be effective, otherwise they would find something better to do with their time. It is also recommended to get various levels of personal spam protection, which is often times included with anti-virus software. 3rd party solutions such as Hotmail, have very good spam detection, however often times spam will leak in, and in that case you can help hotmail out by notifying them of the occurence, so that they can better help protect you next time.


Email Anti Spam And Virus Protection For Businesses - There Is Hope----

With anti spam vendors offering low cost licensing, businesses can now afford advanced email spam and virus protection with a simple to use interface at a much lower cost. The great thing about technology is that as it evolves it gets faster, additional features and economical. Over the past few years the same evolution has taken place with anti spam technology and services. In large part this can be attributed to the open source software community plus enterprising companies enhancing the capabilities of this software and packaging it into easy to use anti spam appliances.

It is not practical to have anti spam software running on desktops in a networked business environment. Managing all employee junk email software at the desktop is not realistic. It can be a nightmare and costly in terms time and licensing.

Spam appliances sit in front of your email server so that when email comes in it will first go to the spam appliance and the email will be scanned for spam as well as viruses. The filter will block the message if it identified as know spam. If the filter is not sure if the email is genuine it will quarantine and hold the email at the filter and it will be stored until the recipient deletes it, releases it to their email box, or they can white list a trusted correspondent so that future emails will not be held back. This will greatly reduce the load on your email server and reduce your bandwidth needs. We have seen anti spam systems block up to 83% of incoming messages. This could help extend the life of your email server and push back the need for upgraded capacity.

Most virus outbreaks occur via email and for little cost an appliance can block viruses before they reach your network and user’s inboxes. This provides an extra layer of defense in addition to your current anti virus solution.

Businesses have two options if they use an appliance based solution for their spam and virus control. They can purchase and administer their own filter. This is a good option if you have a large number of employee mailboxes to protect and the technical staff to administer the spam appliance. Businesses also have the option to outsource their spam control as a hosted service. This is a good choice for smaller companies and if information technology is not your specialty.

If you purchase your own spam filter, a subscription to updates may also be required. Make sure you get upfront pricing for the add-ons that you will need. If you have more than 100 email users and the technical staff to maintain the spam appliance, buying your own filter may be your best option. Generally the basic model will work for most organizations. Large organizations with thousands of users will require a spam filter appliance with increases capacity and features. Spam appliances are designed to work with all mail systems but some do have specific enhancements for Exchange server Microsoft’s popular collaboration software and mail servers that support LDAP (light weight directory access protocol). Spam appliances use the LDAP protocol to verify recipients before delivering messages to your email server, this avoids consuming server resources.

If your business has five to one hundred employees, then an outsourced anti spam and virus filter service is going to be a good economical choice for your organization. Fees are based on the number of users and you only pay for what you use. You will not have hardware to buy, maintain, and upgrade. The upfront cost is minimal and most email filtering providers will let you try the service for free at first. Another added benefit to outsourcing your spam control is redundancy. It is important that you choose a provider that has their spam and virus filters collocated at secure internet data center facilities. Data centers provide redundant network connections and power, so if your email server or internet connection is down unexpectedly the spam appliance will hold your email until your email server becomes available, minus spam and viruses.

Anti spam technology is constantly improving and the costs are getting lower. With increased productivity and an added layer of defense against virus attacks, an anti spam appliance or service is something your business can not afford to be without.

Everybody Hates Spam----

There is nothing like checking your email only to find out that your inbox is swamped with unsolicited message from people you do not know. No you’re not interested to buy dog food, beauty products, slimming pills, plants, or software! But still, you get these irritating emails.

Spam, this tiny four letter word has annoyed millions of people around the world.

What is spam anyway? Spam also called unsolicited commercial email (UCE), unsolicited bulk email (UBE) or junk mail, is unwanted email sent to multiple people usually for the purpose of advertisement.

Spam has produced negative effects aside from annoying people. Apparently, it is a waste of time to sort through tons of email while trying to figure out which email is valid and which is spam. Oftentimes you missed out those important messages just because you thought they were spam. Spam has also the potential to spread virus, pornography, and scams.

It is not only individuals who are affected by spam. Large companies and other businesses are suffering as well.

Many companies have already filed lawsuits against spammers who send spam and claim that they are from those companies, when in fact they are not and were just sent to cause turmoil and ruin the companies’ reputation.

The NCSA and Bank of America released a study called “Online Fraud report” and it showed that 87 percent of its respondents were confident that they could distinguish real emails from fraudulent emails. It turned out that 60 percent failed to identify the legitimate emails. This only shows that the spam problem has become even worse. Most people could not even recognize legit emails from spam.

Receiving spam is indeed such a hassle for people and for businesses.

You may be wondering how these spammers found your email address. With the existing technology available today, you should not be surprised to find that spammers use a lot of techniques for them to obtain other people’s email addresses. They could get email addresses from DNS listings, Usenet postings, or web pages, they also could guess common names at popular domains, or use programs called web spiders to search for email addresses on the web.

So how do you get rid of spam? Unfortunately, there is no 100 percent solution to this problem. You may try anti spam software or spam filters but this will only reduce the number of spam that you receive but will not totally eliminate them.

Another thing that you can do is to click that unsubscribe link, usually found at the bottom of email spam.

As I told you earlier, some spammers acquire email addresses through guessing common names at popular domains so it would be wise to set up an email account that is hard to guess. Use a different email when signing up with forums, mailing lists, chat rooms, news groups, and registering with websites.

Aside from email spam, a new range of spam has recently emerged. Spammers have found new ways on how they could get those spams to people. The new target of spammers are news groups, forum groups, instant messaging, online game communities, blogs, and even guest books.

With spam rising progressively, it is really important that you understand its nature and protect yourself through learning more on how you can get rid of it. Spam can waste your time, energy, and money so it would really be wise that you know how to block those annoying messages.

All Rights Reserved. You may reprint this content as long as it remains unchanged and the links are intact.

Fighting Spam!----

It's been nearly a decade since spammers and their enemies begun evolving competitively. As with the classic cheetah/gazelle model originally formulated by Darwin, each time one group becomes a little faster or more agile, its adversaries develop traits for outwitting and outrunning it.

In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail.

Nobody wants it or ever asks for it. No one ever eats it; it is the first item to be pushed to the side when eating the entree. Sometimes it is actually tasty, like 1% of junk mail that is really useful to some people.

The number of unsolicted commercial electronic messages received by the average American in 2001 was 571, according to Jupiter Media Metrix. By 2006, Jupiter says, that number will increase to 1,400, with more than 206 billion spam messages going out over the course of the year. While these numbers are notoriously difficult to calculate, every survey and ISP record points to dramatic increases in spam, sometimes as much as 300 percent year over year. One reliable indicator of the problem's magnitude is the size of the anti-spam effort. The range of tools available to ISPs, enterprises and consumers in the fight against spam grew considerably during the Web bubble. Simultaneously, heavyweight Web marketers and interactive ad players have been scrambling to distinguish their services from the bad guys, as well as to counteract growing calls for government controls on digital marketing.

In one of the biggest such moves, the Direct Marketing Association (DMA), through its subsidiary, the Association of Interactive Marketing (AIM), has released online commercial solicitation guidelines in an effort to promote high ethical standards among marketers. The rules require that members let e-mail recipients know how they can refuse future mailings and allow consumers to prevent the sale or rental of their addresses


Free Spam Blockers----

Remember when spam was just another horrible thing you would never eat? And then you grew up a little and spam became the lyrics to a great Monty Python song. And now spam is something to avoid at all costs. Or, in the case of free spam blockers, at no cost at all. Everything is better when it’s free, right? Such is the case with blocking out annoying spam from your email account, too.

Free spam blockers are popping up all over the internet. Kind of ironic, isn’t it, that some pop-up ads are advertising spam blocking technology. The problem with spam isn’t really the content, of course, it’s the time spent winnowing through all those e-mails in search of the ones that really contain useful information or are from people with whom you want to contact. The best free spam blockers in the world are not only free, but don’t take up any space on your computer. Yes, I’m talking about being very careful to whom you give your e-mail address.

The plain simple truth is that any time you fill out a form that asks for your e-mail address, you are just asking for spam. Maybe the site where you filled out the form sold your address to mass marketers and maybe they didn’t, but chances are if you have ever given your e-mail address to a company rather than an individual, you received spam because of it. And if you’re like most people doing business on the internet, you’re spending anywhere from thirty minutes to an hour and a half just checking your e-mail every day. You don’t have time to wade through the spam pool. That’s why getting yourself one of the reliable free spam blockers out there is so important.

You can almost instantly tell when you’ve come across one of these free spam blockers because of their oh-so-clever name. For instance, Spamhilator, SpamButcher, or SpamKiller. And you want to know a secret? They are almost all exactly alike. Oh sure, there are little differences that may mean a lot to you personally, but frankly it doesn’t matter. The best thing you can do is download them as a trial version—and with so many on the market offering trial versions, it makes no sense to ever download any of the free spam blockers that don’t offer trial versions—and check them out to make sure they do what they promise. And if they do what they promise, do they do it with a minimum amount of fuss and muss and maintenance on you part.

The key to using free spam blockers is maintenance. You got one in the first place to give yourself more time to do what you need to do. So why would you want to use a spam blocker is high maintenance itself? Go through all the free spam blockers that interest you and then narrow them down until you find the one that works completely in the background without throwing out stuff you really need and that doesn’t require you to keep checking up on it. That’s the one you want.


Get Rid Of Spam---
http://pcsightings.com/wp/wp-content/uploads/2009/06/spam-keybd.jpg


Every day, both dmoestic and corporate users of the internet receive considerable amounts of spam e-mail. They are not only annoying, but sometimes you can miss an important e-mail or newsletter simply because you lose it among the great number of e-mails that flood out your Inbox. Often you'll find that important people neglect to read your e-mail, because busy people like them hardly have the time and patience to browse through the huge quantities of spam mail they receive.

One solution to this problem is a filter or a free spam blocker. Many companies have designed filters for their customers. Many e-mail servers, especially the renowned ones that have a reputation to protect, have their own free spam blocker. There are several types of programs that can help you stop spam, including:

- the ones that are offered when you create a new e-mail address. Every company that provides e-mail service has a spam filter, including those that offer free accounts like Hotmail, Yahoo!, Gmail and so forth.

- there are also standalone programs that go through your mail folders regularly and do their best to separate valid e-mail from spam and unwanted mail. The main disadvantage with these free spam blockers is the fact that, when they do their checks, they use quite a large percentage of your computer's resources and sometimes also of your bandwidth. Before installing this kind of free spam blocker, you'll need to decide if this is okay with you.

- other types of free spam blockers are the ones that work as plug-ins to other programs like e-mail clients. The disadvantage with this kind of approach is that you need to download all your mail anyway, before the plug-in can do its stuff.

When you decide to use a filter, you must be sure that you update it or install new versions regularly, because marketing researchers working for spammres are continuously developing new ways of 'fooling' the filters. Filter makers must keep up by improving their software accordingly.

A free spam blocker works by looking for trigger words or phrases inside the text of the e-mails, and categorizing e-mails on that basis. Nowadays, there are special programs being created that are designed to pass spam through free spam blockers by re-arranging words or using a different language style in the e-mails. This is an unfair marketing strategy, of course, but if you want to be protected against it, you must always have an up-to-date version of your free spam blocker program.

Specialists recommend that you should review your needs and see what kind of filter suits you best. Each approach has its advantages and disadvantages. You must make up your mind whether you want to use the default filter on the e-mail server, or if you want to download all your mail before scanning them, or if you are willing to share your bandwidth with a standalone application. The best way is of course, if you can blend all the programs in one, but that's not always practicable. Still, it is advisable that you should not remain satisfied with the free spam blocker that your e-mail server provides, because you will probably continue to receive unwanted mail in spite of it. Using a plugin in addition to server-side filters is viewed by many experts as the most effective way of getting rid of spam, considering the trivial effort it takes to set up.

Google's Tag To Remove Content Spamming----

Content spamming, in its simplest form, is the taking of content from other sites that rank well on the search engines, and then either using it as-it-is or using a utility software like Articlebot to scramble the content to the point that it can't be detected with plagiarism software. In either case, your good, search-engine-friendly content is stolen and used, often as part of a doorway page, to draw the attention of the search engines away from you.

Everyone has seen examples of this: the page that looks promising but contains lists of terms (like term – term paper – term papers – term limits) that link to other similar lists, each carrying Google advertising. Or the site that contains nothing but content licensed from Wikipedia. Or the site that plays well in a search but contains nothing more than SEO gibberish, often ripped off from the site of an expert and minced into word slaw.

These sites are created en masse to provide a fertile ground to draw eyeballs. It seems a waste of time when you receive a penny a view for even the best-paying ads – but when you put up five hundred sites at a time, and you've figured out how to get all of them to show up on the first page or two of a lucrative Google search term, it can be surprisingly profitable.

The losers are the people who click on these pages, thinking that there is content of worth on these sites – and you. Your places are stolen from the top ten by these spammers. Google is working hard to lock them out, but there is more that you can do to help Google.

Using The Antispam Tag

But there is another loser. One of the strengths of the Internet is that it allows for two-way public communication on a scale never seen before. You post a blog, or set up a wiki; your audience comments on your blog, or adds and changes your wiki.

The problem? While you have complete control over a website and its contents in the normal way of things, sites that allow for user communication remove this complete control from you and give it to your readers. There is no way to prevent readers of an open blog from posting unwanted links, except for manually removing them. Even then, links can be hidden in commas or periods, making it nearly impossible to catch everything.

This leaves you open to the accusation of link spam – for links you never put out there to begin with. And while you may police the most recent several blogs you've posted, no one polices the ones from several years ago. Yet Google still looks at them and indexes them. By 2002, bloggers everywhere were begging Google for an ignore tag of some sort to prevent its spiders from indexing comment areas.

Not only, they said, would bloggers be grateful; everyone with two-way uncontrolled communication – wikis, forums, guest books – needed this service from Google. Each of these types of sites has been inundated with spam at some point, forcing some to shut down completely. And Google itself needed it to help prevent the rampant spam in the industry.

In 2005, Google finally responded to these concerns. Though their solution is not everything the online community wanted (for instance, it leads to potentially good content being ignored as well as spam), it does at least allow you to section out the parts of your blog that are public. It is the “nofollow” attribute.

"Nofollow" allows you to mark a portion of your web page, whether you're running a blog or you want to section out paid advertising, as an area that Google spiders should ignore. The great thing about it is that not only does it keep your rankings from suffering from spam, it also discourages spammers from wasting your valuable comments section with their junk text.

The most basic part of this attribute involves embedding it into a hyperlink as . This allows you to manually flag links, such as those embedded in paid advertising, as links Google spiders should ignore. But what if the content is user-generated? It's still a problem because you certainly don't have time to go through and mark all those links up.

Fortunately, blogging systems have been sensitive to this new development. Whether you use Wordpress or another blogging system, most have implemented either automated "nofollow" links in their comment sections, or have issued plugins you can implement yourself to prevent this sort of spamming.

This does not solve every problem. But it's a great start. Be certain you know how your user-generated content system provides this service to you. In most cases, a software update will implement this change for you.

Is This Spamming And Will Google Block Me?

There's another problem with the spamming crowd. When you're fighting search engine spam and start seeing the different forms it can take – and, disturbingly, realizing that some of your techniques for your legitimate site are similar – you have to wonder: Will Google block me for my search engine optimization techniques?

This happened recently to BMW's corporate site. Their webmaster, dissatisfied with the dealership's position when web users searched for several terms (such as "new car"), created and posted a gateway page – a page optimized with text that then redirects searchers to an often graphics-heavy page.

Google found it and, rightly or wrongly, promptly dropped their page rank manually to zero. For weeks, searches for their site turned up plenty of spam and dozens of news stories – but to find their actual site, it was necessary to drop to the bottom of the search, not easy to do in Googleworld.

This is why you really need to understand what Google counts as search engine spam, and adhere to their restrictions even if everyone else doesn't. Never create a gateway page, particularly one with spammish data. Instead, use legitimate techniques like image alternate text and actual text in your page. Look for ways to get other pages to point to your site – article submission, for instance, or directory submission. And keep your content fresh, always.

While duplicated text is often a sign of serious spammage, the Google engineers realize two things: first, the original text is probably still out there somewhere, and it's unfair to drop that person's rankings along with those who stole it from them; and second, certain types of duplicated text, like articles or blog entries, are to be expected.

Their answer to the first issue is to credit the site first catalogued with a particular text as the creator, and to drop sites obviously spammed from that one down a rank. The other issue is addressed by looking at other data around the questionable data; if the entire site appears to be spammed, it, too, is dropped. Provided you are not duplicating text on many websites to fraudulently increase your ranking, you're safe. Ask yourself: are you using the same content on several sites registered to you in order to maximize your chances of being read? If the answer is yes, this is a bad idea and will be classified as spamdexing. If your content would not be useful to the average Internet surfer, it is also likely to be classed as spamdexing.

There is a very thin line between search engine optimization and spamdexing. You should become very familiar with it. Start with understanding hidden/invisible text, keyword stuffing, metatag stuffing, gateway pages, and scraper sites.

How Anti Spam Software Works----

It was not too long ago that email mailboxes were so full of junk mail and spam that they threatened to render electronic communication useless. When you opened up your email you were bombarded with poorly written advertisements for $ex, V!agra, and tons of other intentionally misspelled products, designed to evade any spam blocking devices. Those interested in consumer protection knew the ultimate goal, to eliminate and block spam, but as soon as they created a product designed to do just that, the spammers evaded their efforts by getting more creative. That is, until modern anti spam software was developed. Antispam software comes in a variety of forms, with the obvious ultimate intent of stopping unwanted emails from reaching you.


Blacklist

One of the primary anti spam methods is known as blacklisting. This software identifies the IP address of the spam sender, and then communicates with the Internet Service Provider of the sender and instructs the ISP to block mail from that IP address to your email account. In theory this is a fool proof solution. The reality, however, is that there is a lot of money to be made in spamming, so forcing a spammer to switch his IP address frequently is not too high a price to pay to evade blocking. That said, this practice does, over time, start to close down doors to spammers and all but eliminates amateur spammers who do not have the capability to frequently switch IPs.


Spam Votes

Many individuals who frequently use their email accounts will be familiar with this device. Spam voting software works through the participation of users. When you receive email you have the option of classifying it as spam, usually by pushing a button which says, unsurprisingly, ‘spam’. Once enough people classify a piece of mail or an IP as spam it falls in trust until ultimately it becomes completely blocked from addresses.


Profiling

Profiling involves learning the common characteristics of spammers and spam mail. It is software that looks for things like bugs, invalid message ID’s and other traits and uses these characteristics to evaluate incoming pieces of mail. Each piece of mail is then given a score depending upon how it fares against these criteria. The user is then given the option of how high or how low to set the bar with regard to which emails are let in. This method has been shown to be immensely effective against amateur spammers and many professional spammers. However, it relies upon a ready team of professionals to identify new traits used by spammers and to incorporate those traits into the profiling algorithms.


Bayesian Filtering

The most promising spam blocking software follows no rules. Rather, it constantly learns new techniques to fight spam by scanning the mail you’ve read and comparing it to the mail that you have rejected. This highly sophisticated software uses the data that it gleans from thousands of users to identify which items are spam and which are not. It then has the capability to adjust its standards to your particular preferences. Over time, it becomes adept at sending you only the emails that you want, and blocking the emails that you do not.

No comments:

Post a Comment

Search This Blog

Back to TOP Back to TOP

Labels

NATURE OF GOD (325) KOOL CARS (268) COOL FLOWERS (224) COOL DIGITAL ART (206) GROUP PHOTOS (196) COOL PAINTINGS (193) COOL KIDS (188) COOL NATURE (177) ANIMALS (153) COOL FACE (153) JAZZY FACE (148) KOOL DESI (145) FACE_OF_SOUL (127) COOL DESI FACE (125) COOL FRUITS (124) KOOL BOLLYWOOD (124) COOL DESI (122) COOOL A1 (118) COOL BIKES (111) BIRDS (105) JAZZY BEAUTY (105) KOOL BUILDINGS (101) FLOWERS OF GOD (99) PAINTINGS (91) SAREE (86) COOL BEAUTY (78) FACE (73) COOL BRIDE (71) JAZZY WEDDING (70) TRANSPORT (70) COOL MODEL (68) JAZZY SMILE (61) WILDLIFE (58) SHIPS (57) WEAPON (57) CLOUDS (55) INSECT (55) COOL SUNSET (54) FUNNY (54) Make Money Online (54) SALWAR_ KAMEEZ (54) Airplanes (53) TREES OF GOD (53) Buildings Places (52) KOOL FANTASY (52) COOL ARCHITECTURE (51) FANTASY (51) MOUNTAIN OF GOD (50) SUN SET (50) UNDERWATER (45) COOL STILL PHOTOS (44) AUTOMOBILE (43) LEAVES (42) INNOCENT FACE (39) AMAZING (38) 3D (37) ANGELS FACE (37) BELIVE IT OR NOT (37) PEOPLES OF PAKISTAN (37) DULHAN_BRIDES (36) FLOWERS (36) ANGEL_FACE (35) KOOL 3D (35) ARMY (34) BOLLYWOOD (34) STRANGE (34) TECHNOLOGY (34) FAIRY_FACE (33) DREAM (32) Meditation Mind (32) god (32) COOL DREAM (31) DIGITAL ART (29) HUSN_E_MASHRIQ (29) SANWALI_SALONI (29) ANGELS (28) DRESSES (28) Energy Light (28) Google Adsense (28) JAZZY MODEL (28) BRILLIANT_NATURE (27) GORGEOUS SMILE (26) VIRGIN SOUL (26) COOL FASHION (25) TRAVEL OF WORLD (25) Blogging (24) FAIL (24) PHOTOJENIC_FACE (24) DREAMY_FACE (23) BUTTERFLY (22) COOL SMILES (22) MOON (22) SOUL_IN_SALWAR_KAMEEZ (21) BUTTERFLY_SAREE (20) KOOL NIGHT VIEW (20) COOL CELEBRITIES (19) DULHAN (19) INNOCENT DESI (19) KOOL EYES (19) SEA WILDLIFE (19) BRILLIANT SAREE (18) NATURE (18) PAKISTANI KIDS (18) JAZZY FASHION (17) OWN Website (17) COOL GREENERY (16) DESI SMILE (16) FASHION (16) FUTURE (16) HORSE IN BEAUTY (16) REPTILE (16) SAWALI SALONI A1 (16) Business (15) COOL BIRDS (15) FAIRIES_GROUP (15) SEO (15) VIRGIN FACE (15) WATER FALL (15) ACCIDENT (14) AMAZING WILDLIFE (14) BUILDING (14) COOL EYES (14) EYES (14) FAIRY (14) HOLI (14) MEHNDI ART (14) NUMEROLOGY (14) SAWALI SALONI (14) SEO♥ (14) WAR (14) BIKES (13) PAK SALWAR KAMEEZ (13) ANGELS MELA (12) Affiliate (12) Art Of Desi (12) BEAUTY OF PAKISTAN (12) COOL BUTTERFLY (12) MOTHER IN LOVE (12) WILDLIFE IN LOVE (12) Blog Marketing (11) DREAMY_FANTASY (11) EZINE♥ (11) FORUMS♥ (11) PARTY BEAUTY (11) RAIN BOW (11) Traffic Generator (11) eBAY (11) ANGEL (10) ART (10) Investments (10) NAMES OF ALLAH (10) PAKISTANI POLICE (10) TRAVEL (10) WATCHES (10) WONDER (10) BRILLIANT_FLOWERS (9) EMAIL MARKETING (9) FIGHTING (9) GLAXY (9) Niqab Hijab (9) ANGELS_GROUP (8) COOL JEWELRY (8) COOL UNDERWATER (8) DREAMY (8) Environment (8) FOREX (8) GREENERY (8) MEHNDI_NIGHT (8) OLD IS GOLD (8) Tantra Kamasutra (8) COOL HIJAB--NIQAB (7) Domain (7) PHOTOGRAPHER (7) AMAZING WONDERS (6) Ancient Egypt (6) Articles (6) COOL MOON (6) CREATIVE PHOTOS (6) Decorating (6) FUNNY PAKISTAN (6) INTERNET (6) ISLAND (6) KOOL BOTTLES (6) MENDHI (6) PROMOTION♥ (6) PayPerPost (6) SMS ADS (6) SO HOT (6) SOUL_FLOWERS (6) UNIVERSE (6) Art Of Saree (5) COLORs (5) COLOURFUL NATURE (5) DIGITAL _ART (5) E Commerce (5) JAZZY PAINTINGS (5) SHADI_WEDDING (5) Viral (5) AIR FORCE (4) AMAZING PAKISTANI ART (4) Astrology Astronomy (4) BEAUTIFUL GIRLS (4) BOAT (4) BRILLIANT (4) Dreams Sleep (4) Dreamy_Art (4) FLAG OF PAKISTAN (4) Family Budget (4) GRASS (4) Galaxies (4) HEER_RANJHA (4) HIJAB (4) HOROSCOPE (4) HOT (4) INNOCENT (4) KOOL XP (4) LOVE OF INNOCENT (4) MOSQUE (4) MOVIES (4) Mysteries (4) PAK ARMY (4) PRINCES (4) RAINY DAY (4) SEASON (4) SHUI SITE (4) SNOW (4) girls (4) ADWORD♥ (3) Amazon (3) DESI (3) DIGITAL_ART (3) FABOLOUS_PAINTING (3) FREELANCING (3) GOOGLE♥ (3) JAZZY CLEBRTY (3) List Building (3) MUSIC (3) PAY-PER CLICK♥ (3) PAY_PER_LINK (3) Paid Surveys (3) RSS (3) SPAM♥ (3) SPORTS (3) AMAZING BEAUTY (2) BEAUTY (2) BEAUTY OF KILASH (2) BRILLIANT_ANIMALS (2) COMPUTER (2) COOL (2) Cool Gadget (2) DESERT (2) DREAMY_SUNSET (2) EAGLE A1 (2) EYE (2) Expensive (2) FISH (2) GOD_DREAM (2) HEALTH TIPS (2) HERO (2) Hourse (2) LAILA MAJNO (2) LAKE OF GOD (2) LANDSCAPES (2) LOVE PAKISTAN (2) MOUNTAIN (2) PARROTS (2) RECORDS (2) Reiki (2) SEASON OF LIFE (2) TIGER (2) VIEW IN AIR (2) WILD NATURE (2) ANIMAL (1) BRILLIANT_BIRDS (1) BRILLIANT_INNOCENT (1) Blog Directories (1) CAREER (1) COOL PETS (1) COOL_SPORTS (1) DREAMY SHOTS (1) FACE CARE (1) Furniture (1) GATE ART (1) Gold Trading (1) Home Remedy (1) LIPs (1) Marketing (1) READING eMAILS (1) SEA OF GOD (1) STONE OF SOUL (1) TOTKAY (1) ca3 (1)