SlideShare uma empresa Scribd logo
1 de 17
Spam   is the practice of sending unwanted, unsolicited
emails to a large number of people.


Spam  is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.


Or   -
•Emails     you did not ask for that were
•sent     in bulk
•from     senders you do not know


Above points are suspicious of being spam.
   Spammers manipulate search engines results in
    order to target users. Motive can be:
     Commercial
     Political
     Religious

 Approximately 10-15% of web pages are spam
 Most spam promotes get-rich-quick schemes,
  questionable products, fraudulent offers, or pseudo-
  legal services.
Spam is of two types-
A)Cancelable Usenet
B)Email spam-
o Harvested Address Spam

o Virus Spam

o Domain Name Spam

o Dictionary Spam

o Windows Messenger Spam

o Hacked Mail Service Spam

o Hoax Spam
It refers to spam email in which a single message is sent
to 2 or more Usenet groups.

      This type of spam is directed as “lurkers”, or individuals
who read newsgroups but who either do not or infrequently
post or give their email addresses away.

     Cancelable Usenet spam reduces the utility of
newsgroups by forcing through advertising, and as such
decreases the ability of administrators and managers of
newsgroups to manage accepted topics. This spam is run at a
low cost to those sending out spam.
It refers to spam email that is directed at individual users
with direct addresses.

      Email spam lists are usually created by scanning Usenet
postings, sterling Internet mailing lists or searching the Web
for addresses.

       A variant of this form of spam is sent directly to mailing
lists and email discussions that are used by public and private
forums. Email spam costs individuals submitting spam email
money; for example, ISPs and online services need to pay to
transmit spam directly to subscribers.
   The spammers use a computer system (spider or
    spam-bot').

   The 'spam bot' looks for the '@' symbol.

   Collects the bit either side of the '@' symbol to
    capture your email address and add it to the
    spammers database of millions of harvested
    addresses
   Someone else's computer (not yours) gets infected with a
    virus.
   The address book on their computer has your email address.
   The virus sends a spam to every address on the address
    book.
   The virus 'spoofs' the 'from address' in the email it sends i.e.
    the spam does not appear to have come from the senders
    email address, instead it says it came from another address
    taken from the address book.
   This is why you might receive emails from people saying you
    sent a virus to them, when you know your computer is clean
You can sometimes receive dictionary spam
when you use a well known email service.

        The spammers know that there is going to
be a janesmith@bigmail.xyz.

      They setup computers to spam billions of
names at that mail service simply by targeting every
persons name.
Some ISPs or webmail services may be
hacked by spammers or the addresses may be sold
to spammers.

       Read the small print when signing up for an
email account. Look hard for that box that says 'we
might give your address to a 3rd party, tick here if
you do not want to receive marketing info from
other companies...'.
      These are messages that innocent people may
    forward to you with some kind of hoax warning or way to
    make a fortune.


      Never respond to or forward this kind of message.
    They are hoaxes, see real example below. If you 'CC'
    (copy in) your friends and contacts you may be
    providing a way for spammers to harvest the email
    addresses of your friends/contacts. These rubbish
    emails sometimes end with something like: "Try it; What
    have you got to lose?"

   What you have to lose is your privacy and credibility!
   The following keywords can be used to identify web
    spammers in this industry. (23 April 2008 results)
a)Use a separate email address.

b)Consider acquiring multiple email addresses for
   different purposes.

c)You can subscribe to services online that provide
   you with disposable addresses.
•   http://email.about.com/library/weekly/aa072002a.htm
•   http://sneakemail.com
•
d)Remove your email address from your website.

e)Never buy anything from a company that spam-
over 95% of spam offers are scams!


f)Filter your email-
For more anti-spam filtering information, visit:
   http://email.about.com/cs/spamfiltering/
   http://email.about.com/library/howto/htnegativespamfilter.htm


g)Consider subscribing to a spam prevention service.
Web spam
Web spam

Mais conteúdo relacionado

Mais procurados (6)

3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Survey on Password Security 2019
Survey on Password Security 2019Survey on Password Security 2019
Survey on Password Security 2019
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
 

Semelhante a Web spam

Final paper
Final paperFinal paper
Final paper
JDonpfd3
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
Chinmayee Behera
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
siewying
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
AbdulHaseebKhan34
 

Semelhante a Web spam (20)

Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
Spam
SpamSpam
Spam
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Web spam

  • 1.
  • 2. Spam is the practice of sending unwanted, unsolicited emails to a large number of people. Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Or - •Emails you did not ask for that were •sent in bulk •from senders you do not know Above points are suspicious of being spam.
  • 3. Spammers manipulate search engines results in order to target users. Motive can be:  Commercial  Political  Religious  Approximately 10-15% of web pages are spam  Most spam promotes get-rich-quick schemes, questionable products, fraudulent offers, or pseudo- legal services.
  • 4. Spam is of two types- A)Cancelable Usenet B)Email spam- o Harvested Address Spam o Virus Spam o Domain Name Spam o Dictionary Spam o Windows Messenger Spam o Hacked Mail Service Spam o Hoax Spam
  • 5. It refers to spam email in which a single message is sent to 2 or more Usenet groups. This type of spam is directed as “lurkers”, or individuals who read newsgroups but who either do not or infrequently post or give their email addresses away. Cancelable Usenet spam reduces the utility of newsgroups by forcing through advertising, and as such decreases the ability of administrators and managers of newsgroups to manage accepted topics. This spam is run at a low cost to those sending out spam.
  • 6. It refers to spam email that is directed at individual users with direct addresses. Email spam lists are usually created by scanning Usenet postings, sterling Internet mailing lists or searching the Web for addresses. A variant of this form of spam is sent directly to mailing lists and email discussions that are used by public and private forums. Email spam costs individuals submitting spam email money; for example, ISPs and online services need to pay to transmit spam directly to subscribers.
  • 7. The spammers use a computer system (spider or spam-bot').  The 'spam bot' looks for the '@' symbol.  Collects the bit either side of the '@' symbol to capture your email address and add it to the spammers database of millions of harvested addresses
  • 8. Someone else's computer (not yours) gets infected with a virus.  The address book on their computer has your email address.  The virus sends a spam to every address on the address book.  The virus 'spoofs' the 'from address' in the email it sends i.e. the spam does not appear to have come from the senders email address, instead it says it came from another address taken from the address book.  This is why you might receive emails from people saying you sent a virus to them, when you know your computer is clean
  • 9. You can sometimes receive dictionary spam when you use a well known email service. The spammers know that there is going to be a janesmith@bigmail.xyz. They setup computers to spam billions of names at that mail service simply by targeting every persons name.
  • 10. Some ISPs or webmail services may be hacked by spammers or the addresses may be sold to spammers. Read the small print when signing up for an email account. Look hard for that box that says 'we might give your address to a 3rd party, tick here if you do not want to receive marketing info from other companies...'.
  • 11.
  • 12. These are messages that innocent people may forward to you with some kind of hoax warning or way to make a fortune.  Never respond to or forward this kind of message. They are hoaxes, see real example below. If you 'CC' (copy in) your friends and contacts you may be providing a way for spammers to harvest the email addresses of your friends/contacts. These rubbish emails sometimes end with something like: "Try it; What have you got to lose?"  What you have to lose is your privacy and credibility!
  • 13. The following keywords can be used to identify web spammers in this industry. (23 April 2008 results)
  • 14. a)Use a separate email address. b)Consider acquiring multiple email addresses for different purposes. c)You can subscribe to services online that provide you with disposable addresses. • http://email.about.com/library/weekly/aa072002a.htm • http://sneakemail.com •
  • 15. d)Remove your email address from your website. e)Never buy anything from a company that spam- over 95% of spam offers are scams! f)Filter your email- For more anti-spam filtering information, visit: http://email.about.com/cs/spamfiltering/ http://email.about.com/library/howto/htnegativespamfilter.htm g)Consider subscribing to a spam prevention service.