What is spam simple words, its types and what is dangerous

What is spam and how to deal with him

Good day, dear visitor blog inetsovety.ru. What is spam on the Internet, know users who have an email box or a page on social networks. Sometimes uninteresting and completely unnecessary letters literally "fill up" the ribbon of incoming messages and clog it. Of course, it anniversary and angry man, but someone who sends such "letters of happiness" such a newsletter brings income. After all, in such letters often contain dubious proposals aimed at breeding you for money.

But, even facing such notifications every day, not every user can give a clear answer to the question of what spam in email. In fact, sometimes it happens and useful, but in some cases the situation is different. Therefore, we consider the basic provisions on which letters are considered to be spam, who are spammers and how to protect their account from such mailings.

The concept of spam and its main features

Before dealing with the meaning of the term, let's find out what the word "spam" means and where it happened. In fact, the history of the origin of this concept is quite interesting and unusual.

What is spam spam on the Internet

For the first time, people learned about such a word as spam in 1936. It was at that time an American firm with a trademark called SPAM was created. Therefore, it would be more correct to speak not "spam", but "SPEM", but this is not a fundamental question.

The company was engaged in the manufacture of canned meat, but during World War II, they were released so much that they began to deteriorate. In order not to incur losses, the company began to advertise its products everywhere, almost every corner. Advertising was twisted even on the radio.

By the way, if you look for an option to transfer the word spam, it will not have a relationship to what this term implies in a modern context. That is, a logical explanation, why the streams of unnecessary correspondence coming to the phone or e-mail are called the spam, no.

However, such a term "spam mailing", as such, began to be widely applied since 1986. It was during this period that all advertising pyramids began to produce massively and send leaflets to people practically identical to each other. And now the number of spam on the Internet is increasing every year. That is why users are so interested in protecting their accounts from such unnecessary information.

To the contents ↑

We deal with the term

So, what is this spam simple words? If you have not yet managed to solve the meaning of this word, the following definition will be useful for you.

Spam is advertising messages that massively send people without their consent. Such advertising may be commercial, political and other.

In most cases, such a distribution refers only to emails - those that come to the mail, telephone, messengers or personal messages on social networks. However, the spam messages are notifications are considered to receive which the user has not subscribed. It is for this reason that their appearance annoys and annoying.

To the contents ↑

Varieties of spam and their features

Now you know what it means spam, and for what it is used. Such newsletters have their own species on which we will focus more.

So, today it is possible to allocate the following types of spam.

Mass mailing

What does mass spam mean? With such a notion, almost everyone is familiar, since it is one of the most common varieties of such notifications.

What do spam letters look like email

How it works? Spammers acquire the base where users are collected by mail addresses, after which they begin to send letters of a certain content. In addition to advertising information, they may also contain viruses and other unpleasant "bonuses".

On a note. Spammer is a person who is engaged in sending such notifications. It can work as a particular company, and do freelance.

To the contents ↑

Mailing in social networks

What is spam in VK? Previously, spammers created individual accounts to send letters of an advertising or political nature (and not only). But in recent years a less pleasant picture has been identified. The users are unclean to hand over the accounts of other users, and spam transmission from them. As a rule, this is a request for transferring a certain amount of money.

Example spam in VK, when wearsing the page and ask to translate money

Thus, spam in contact is part of a fraudulent scheme, but not everyone can recognize such a catch.

To the contents ↑

Notifications on forums

Often spam mailing is carried out on the forums. For example, interested users leave the necessary notifications in the comments to discussions, as well as write other people in private messages by adding a link to a particular source of information there.

Often such notifications are created and sent to attract a larger visitover to the site.

Spam mailing on sites

Spam comments on the site

Some users love to spam in the comments on different sites. That is why the owners of such resources add more troubles. The purpose of spammers in this case is either in advertising its services or goods, or the promotion of its own projects.

To the contents ↑

SMS-spam

SMS spam on the phone

What is spam message in the phone? The principle of its work is the same as when sending letters to e-mailboxes. Only spammers in this case buy databases from cellular operators. SMS spam comes to the client in the form of a regular text or graphic message. The content of such notifications can be completely different.

To the contents ↑

Spam in messengers

Spam in messengers from fraudsters

In this case, we are talking about spam in Vatsaya, Vaiber and other popular programs that users are installed on phones, tablets or computers. Because they work on the basis of the phone number or email address, to get to accounts of potential "victims" for spammers will be easy.

To the contents ↑

Search spam

What is considered to be a search spam? With such a kind of mailings, every Internet users are familiar, even if he does not suspect about it. Surely, you have come across such a phenomenon as the appearance of the list of sites that are not related to your search query in the browser. Such resources do not carry any use in themselves, but they are perfectly spinning and bring good income to their owners due to the links by reference.

In addition to the above varieties, there are 2 more spam types - harmless and dangerous. The first type includes:

  • advertising legal goods and services;
  • manipulation by public opinion (usually such spam letters have a political subtext, but may be commercial);
  • advertising forbidden products (for example, those who do not need to advertise or implement);
  • The so-called "letters of happiness", intended for mass mailings. Pretty popular is the so-called Face Spam, or sending similar messenges in the social network Facebook. The principle of operation is very simple: in the text it is written "they sent this message 10 (100, 1000) to friends, and today something very good will happen to you." And so on. Of course, such a string is enough not only on Facebook, but also on the expanses of other social networks - foreign and domestic.

Also, spammers are used to send dubious advertising and goods, push notifications. Read more about them by reference https://inetsovety.ru/chto-takoe-push-uvedomleniya/

To the contents ↑

What is dangerous spam for the user

How to deal with spam in the mail, phone, on sites

It all depends on how the subtype of such mailing was collided by the user.

  1. Phishing. This is a fraudulent scheme that is designed to "catch a man on the hook", knocking it out of the gauge. For example, the user comes to an email, a messenger or a phone number that problems have arisen with your bank or virtual account. As a result, you need to follow the link for authorization on the site. This is exactly the whole "salt", since the specified site in the end turns out to be counterfeit. Although it is almost unreal independently identifying it, since it is like two drops of water similar to the official resource of the bank or electronic payment system. How to define spam of this kind? To withdraw fraudsters on clean water is difficult, but it is real. In order not to get caught on the trick, you need all the incoming messages of such a content to check by calling a bank, or authorization in the electronic payment system system via a telephone application or a familiar site.
  2. So-called Nigerian letters. A person comes a letter that he can get a large amount of money, while the prepositions can be the most different. To get funds, the addressee must only "pay minor expenses" to send or transferring money. If the user follows these instructions and makes payment, fraudsters disappear.
  3. Viruses. In letters that massively come to the phone or email, malicious programs can be arranged. The smallest damage from them becomes a breakdown of a computer. Another thing is if these viruses are "hiding" among the files and gradually record all important information - personal data, logins, passwords, etc. and create a virus will later get the opportunity to use this data for their own purposes.
To the contents ↑

What is flood?

Note. There is another concept - flood. It implies the mailing of the same type of messages that have large volumes. That is why users do not always understand what the difference between Flood and Spam.

We looked at the concept of spam, now let's understand what a flood is. He has the second interpretation - this is an attack on the so-called botnet server. Moreover, the flow of information and requests is so large that under its influence the server will stop working sooner or later. Thus, the flood is much more dangerous than spam.

In a safer context, Flood implies "nonsense", "Brad." That is, if someone in response to another person's comment asks "not to flood", it can mean the request "not to carry nonsense."

Now you fully know the meaning of the word spam, and know how to recognize its varieties. But you should not consider the situation hopeless. There are several ways to help protect against such mailings, and now we will consider them in detail.

To the contents ↑

How to get rid of spam?

Many users knowing what the spam means in the mail are wondering how to avoid its appearance. Specialists give one useful advice: you need to start 2 email addresses. One of them must be used to preserve data, doing business correspondence and perform other important operations. The second box can be used for subscriptions to different channels, sites, communities. Such addresses are most often exposed to attacks of spammers.

The Second Council is to create an email box on reliably protected services - for example, on Gmail. There is a specially created folder where such notifications are moving.

What is it antispam in the phone? This is a special application that blocks incoming messages from unwanted addressees. It can be downloaded and installed on your mobile device, then set up the desired way. As practice shows, this method of combating spam gives pretty good results.

Sincerely, Victoria - Blog inetsovety.ru

What is spam and what he doesI think, each familiar is such a situation when messages from unfamiliar numbers with advertising content, such as the offer of goods or services for special offers or participation in the draw in the mail or SMS messages. So this is spam, and what it is and what it does with users we will tell in more detail.

Spam is an advertising newsletter on the basis of users without their consent. As a rule, such a base is bought at mobile operators, if we are talking about SMS-distribution or an increase in the e-mail base to parsing the client base from a source.

What is spam

The meaning of such spam dispuses is to attract the user's attention and make a potential client from it. But most often it turns out on the contrary - this advertisement causes only negative emotions in humans, since some companies too often spam letters to users, so they are often blocked and fall into the "black list".

What is spam in the phone: spam call

Spam in the phone, or rather, spam mailing, which occurs through the phone, or by calling, or SMS messages. That is, arbitrarily, at any time commercials come, or call experts, so to speak "cold calls" that offer companies on which they work.

What is spam in the phone

Of course, there are those who begin to conduct a dialogue with the manager and ultimately leave an application for the search promotion of the SEO website if we are talking about this service, or immediately orders it and pays.

But, most often, on calls of this kind, people are responsible with neglect or even aggression, or simply do not take the phone at the sight of an unfamiliar room, especially if the call is carried out from the contact center.

What is spam on the Internet

Many know that spam on the Internet in their structure and the use algorithm is similar to spam in the phone. But on the Internet the distribution possibilities of spam is much more than in the phone. Here spam mailing is not limited to simple letters or online calls.

You can disseminate spam on the Internet through commercials, banners or email emails or on the messenger in the phone or PC.

Recently, this practice has entered the turn - as a commercial before watching the film. You know such a situation when you turn on the movie and before viewing it is necessary to watch advertising. It can be safely called spam, since users did not give their consent to show this advertising.

The same applies already in games and applications. For example, if you play in the game and it is proposed to start going on after watching advertising, and even at all, so to speak, they begin to show it. Many have long been dissatisfied with this marketing move, but it does not affect numerous advertising shots.

What is spam in VKontakte

If we started talking about spam on the Internet, then the topic of spam in the social network, and especially spam in VKontakte here as never by the way, because the main proportion of spam in social. Networks are on VK.

What is spam in VKontakte

This type of message until recently came a very large amount - in the comments, in private messages, until the developers made the "Close Profile" function or "Close Messages". Thus, messages can only send the users of the user, so sending spam messages has decreased sharply.

But now people who send this very spam began to massively send a request "as friend" and those who respond to it, as massively send spam in private messages. But, as a rule, people already know such schemes do not add such people already, so they simply "hang" in subscribers.

What is spam in whatsapp

Spam in WhatsApp is also a very common species spam in social networks. The same people who are hired specifically for mailing are recorded in WhatsApp and send the ready-made, reserved database of accounts.

Plus, for spam in WhatsApp is that there, unlike VKontakte, there are no prohibitions for sending messages with the services of the site promotion under Yandex or the offer of some kind of products.

What is spam in whatsapp

What is the essence of spam

The essence of spam is that it is, in fact, one of the types of advertising. Yes, not the most successful, since very obsessive and causes irritation from users. But, if you study in detail how to use sales funnel, you can calculate how many people from the total number of the base will respond to the message, and who will make an application and buy goods.

Therefore, after all, spam, although in small quantities, but works. But many entrepreneurs are already refused to spam, since the spam newsletter also needs a budget.

Firstly - the very compilation of advertising by the marketer, secondly, to resign the base, you need to buy it from the owner. And the latter is the mailing itself. Each letter or call stand a little, but this is also money.

What is spam in email

With spam in e-mail, those who have many accounts in different socialists are most often faced. Networks or on other sites are tied to the e-mailbox. Moreover, it doesn't matter how this search system includes this box.

If you regularly come with letters containing spam from the same address so that it is over, you can put the newsletter on the email, as spam and then no letters come from this account.

What is spam in email

What is spam in classmates

Also, there is spam and classmates. The distribution principle is similar to all the previous ones or in messages or in groups of interests, as well as in the comments.

But the developers also have provided a way to prevent spam dispatch unprepared to users. To do this, just click on the "Mark As Spam" button. If we are talking about personal messages, then next to the message will be the "Complain" icon.

What is dangerous spam

Despite the fact that spam has a low cost of spam distribution, its excessive use can be dangerous for both users who are sent to the spam and for its sender. Due to numerous locks and negative user feedback, the site rating that makes the newsletter can "fall" to a minimum, or even in minus.

Accordingly, the attendance of the site will drop sharply, or will be reduced to zero. Many who do not know about the KPI indicator: what is it and how to count on it, just fruit spam newsletter, without even thinking about what they can do it.

For users, spam is also not the best phenomenon. But, despite the many negative sides of the spam, it is not used that less often, but even more often. According to calculations of scientists more than 80 percent in the electronic box is spam.

Comes spam: what to do

Many people when coming spam are lost and do not know what to do. Everything is simple - if the message is interesting to you, then follow the link and get acquainted with the commercial offer.

If the offer does not apply to your interests and demands, just block the letter, or the account from which it was sent. Also, if this spam comes in the comments, then it can also be blocked.

Comes spam: what to do

Or a person who regularly sends messages to you, without any idea what a commercial offer is simply fills it with references and "empty" text.

What is the difference between spam from flood

The difference between spam from flooding is that spam is, as already mentioned, advertising messages containing any commercial offers. And the flood is, as a rule, an incentive, non-beam, "empty", as it is called on the network, the message, but large in its text volume.

Fluda is usually sent in large quantities, in order not to convey information to the recipient, but simply to "fill up" by his messages. So to speak, a kind of "attack on the psyche", because from the numerous flow of messages not every person will remain calm indifference.

What is the difference between spam from flood

Well, I think, after our detailed notice of Spam, that he represents his main distribution methods and how to deal with him, you received a maximum of useful information. Those who nevertheless decided to apply spam newsletter in promoting their business or a certain product or service - think about it would not cost you "sideways".

Spam

Spam is a mass distribution of messages to users who have not gone to their receipt. It is carried out in order to advertise certain products, disseminate information, theft of personal data, etc. This is an obsessive advertising of something. In most cases, spam is presented in the form of mailing emails, but in fact it is used everywhere, where there is open access to information distribution: social networks and media, forums, comments on sites, messengers, emails, SMS for phone. Even in offline space there is spam. For example, advertising booklets in your mailbox. People dealing with spam newsletter are called spammers. Spam advertising is one of the cheapest methods for promoting the network, but not the most effective. Such mailing is negatively perceived by the audience, which does not allow it to use all companies. Those who are important reputation and image are not used spam.

Where did the word "spam" come from

The word "spam" first appeared in the 40s of the 20th century, in the post-war time. Initially, it meant the name of canned foods included in the meat diet of soldiers. After the war, they had to be urgently soldered until the shelf life expired and they did not deteriorate. This led to the fact that advertising this product was everywhere: on the streets, in newspapers, in transport. She was specially aggressive, imposing the need for the acquisition of canned data. It was this event that this event was remembered when this kind of advertising began to be actively used on the network. Aggressive and obsessing the distribution of advertising messages received the corresponding name - SPAM. Since then, the word "spam" means the "mass distribution of obsessive advertising". The user did not ask, did not subscribe, and he send letters into the contents of which he was not interested. At first (as soon as Internet and emails appeared), spam advertising on the network was more efficient than now. People are not accustomed to such, and advertising "blindness" was not yet. But he still remains one of the most inexpensive ways to cover the maximum audience, which allows him to stay afloat, as one of the most sought-after ways to promote its services and goods.

Spam Ataca

Spam Ataca

Spam attack is a distribution of skimming messages with an increased concentration on certain sites or channels. For example, spammers found out that on a specific forum a high level of return. This information has spread in the circles of people engaged in spam and a huge wave of messages with obsessive advertising collapsed to the site. Such an event is called spam attack. Spammer attacks are not always produced due to the high recoil site. Sometimes they happen at someone's evil intent in order to harm the site and its owner. For example, they are carried out unfair competitors.

Types of spam

All spam can be classified by several features.

In the area of ​​distribution:

By the distribution method:

  • Automatic mailing - messages are sent using automated software (programs, services);

  • Manual messages are sent manually.

By the degree of danger:

  • Safe - mailing is carried out with the purpose of advertising the product, services, events; The contents are not able to harm the user;

  • Dangerous - mailing is carried out in order to theft of data, money.

Most popular sites and electronic boxes have sufficient protection against dangerous spam. They use spam filters. Messages capable of actually damage are blocked automatically. The most dangerous of them are removed irrevocably, less dangerous or just dubious placed in the "Spam" folder. Often the system erroneously places messages to the "Spam" folder, not carrying any harm to the user, such as a letter confirming the registration on some site. For the system, this is unfamiliar sources, therefore she does not trust them. Therefore, check your "Spam" folder regularly and remove the necessary letters from there.

Safe

To the safe form of spam referred to a newsletter that cannot anybody to hinder users. Is that stealing their time. This spam refers:

  • Commercial advertising. Includes newsletter messages with advertising of various kinds of goods, services, sites, etc. As mentioned earlier, spam mailing is one of the most inexpensive ways to promote online. Consequently, it is in demand among Internet entrepreneurs. They simply chose spam as one of the promotion channels;

  • Advertising, which is prohibited by law. In Russian legislation, there is a list of goods and services, which is prohibited. Most popular channels (search engines, social networks) adhere to these requirements, and sometimes add their own. This causes certain difficulties in advertisers. Electronic mailing of such restrictions does not have, which allows advertisers to freely advertise any goods and in any form;

  • Manipulating public opinion. Often spam used as a tool for influencing the public opinion of the audience. These are not only political motives, but also commercial. For example, someone decided to send a compromising material on a competitor or make a newsletter from anyone's one in order to obtain a negative reaction in response. Such newsletter does not harm users, but can cause certain moods in society;

  • Newsletter asking for sending a message. Particularly popular view of spam in social networks. As a rule, it does not bear any semantic load and does not pursue any goals. These posts in the spirit "switched to this letter 20 friends and next year you will find the love of life." Oddly enough, but there are people who continue to do it. Rarely may contain hidden advertising.

Example of mailing asking for sending a message to friends.

Dangerous (malicious)

This kind of spam is able to apply real harm to users - steal his personal data (logins, passwords), access electronic wallets, infect computer viruses, etc. Most often the contents of such letters include references or attachments. In no case do not go along and do not download. Types of dangerous spam:

  • Phishing newsletters. This is a format of mailing, in which the letter by the letter is predicted by your bank, supporting the electronic wallet service, etc. You write that you have any problems and ask for the link to solve them. Naturally, the site for which you will fall, - fake (fake). Gullible users go, which is already a serious threat, and leave personal data there. An example of a phishing message in Gmail.The email address can be formed under this. It changes one or two letters, the order of words, specialists. The inattentive user does not notice this and thinks that communicates with the real representative of the service.

  • "You got the inheritance." Pretty popular way of deception lately. The user comes a letter that allegedly he is a descendant of some rich man living somewhere in Switzerland. This man died and the only heir is a user. They may even contact by name and surname, call some other personal information to cause more confidence. The essence of deception is that for the design of the inheritance, you must send a certain amount of money for related expenses. Of course, after sending money, their recipient stops responding.

  • Messages with malicious software. The contents of such mailing can harm the security and performance of your PC. Infection occurs after downloading the file in the attachment. Sometimes the computer stops working immediately, and sometimes the virus is able to hide and secretly collect all your personal data (logins, passwords). To protect yourself at the maximum, you should not go on unfamiliar links and download dubious investments in the letter.

Dissemination sites

Where can I meet spam?

  • Email - the most common place for skimming messages. Before sending a letter, moderation does not pass, therefore, their contents are not limited. As a rule, spam filters are used already after sending.

  • Forums are very popular among spammers, those sites are used, where there is no moderation, as it allows you to freely publish any information. Forums where all messages are tested are not used at all or used to publish hidden advertising.

  • Comments on sites - similar to the forums those sites where there is no moderation, enjoy high popular among spammers.

  • Social networks - Recently, the number of skum messages in social networks has only grown. Personal messages and comments are the most popular information dissemination tool. Spam on social networks is characterized by a greater "friendliness". Senders, as a rule, do not just send you an advertising message, and try to go to the dialogue, meet. Of course, such an unexpected desire to communicate is caused only by commercial purposes - to sell the goods, service.

  • Messengers - In recent years, with an increase in the popularity of messengers (Viber, Telegram, WhatsApp) has grown and the number of skimming messages in them.

  • SMS - Probably, everyone received an SMS phone with advertising from unfamiliar numbers. This is spam.

As spammers find addresses for mailing

One of the most popular questions - "How does spammers know my address or phone number?" Find the contacts of the users is not a big problem. You can get them in several ways.

  • Generate with special software. Such programs randomly select addresses, including non-existent. Next, from a variety of contacts received remains to select real (belonging to real people). The program interface for generating email addresses EPOCHTA.

  • Monitor data from publicly available sources. For example, email addresses left in personal profiles of the social network. If this information is not hidden, spammers will not be difficult to resolve it with the help of special programs.

  • Find contact with a hacker way. This method is rarely used for special purposes. Hacking a database of various sites, services, you can access personal information of registered users, including their contacts.

  • Buy database. There are special sites in the network, where you can purchase lists of users of the users for a small fee.

  • Get it with the help of worms. Worms are a kind of malware (virus), which collects all contacts on the victim's device. Worms are distributed using all the same spam newsletters.

Based on the above, the conclusion suggests: do not leave your contact details where it fell. Create several postal addresses - one for important correspondence and important services, the other - for the rest. If spam and overtake you, then let it be in the second mailbox.

How to disable spam

In some cases, turn off the spam easily - just click the "Unsubscribe" button in the letter. The method works if you yourself sometimes subscribed to the source. Sometimes a subscription is executed automatically after registering on the site.

How to disable spam in Google mailbox. The "Cancel subscription" button at the end of the letter.

But be careful. Sometimes spammers draw up links in the form of the "Unsubscribe" button. Of course, after pressing no unsubsion will happen. You will simply move to a promotable resource. If the source seems to you unfamiliar, it is better to use the following way and block it to get rid of annoying letters. In most mail services, as well as on social networks, you can block addresses and users from which unwanted letters come. How to block spam (on the example of Gmail mail):

  1. Open your mailbox.

  2. Go to the "Inbox" tab. Disable spam mailing in Google Mail. Go to the "Inbox" section.

  3. Open a spammy message.

  4. Call the menu (three points in the upper right corner). Lock source. Call a menu in Gmail mailbox. Button with the theme dots.

  5. Choose the item "Block the sender ...". Blocking the sender's address in the mailbox. How to disable spam.

  6. I confirm.

Ready! After actions made, the selected address will not be able to send you letters. Now he is in the blacklist. Similar actions can be performed on social networks.

Splock spammer in the social network "VKontakte". How to disable spam.

Spam protection methods

In order not to carry out the blockage of each spammer manually (because sources can be hundreds), it suffices to follow simple tips and advice on spam protection.

  • Do not publish your address and contacts in publicly available and dubious places.

  • Get the second box for unimportant messages and use it.

  • Do not cross the links in letters from unfamiliar senders.

  • Do not download files in the attachment.

  • Use only popular mail services (in them the maximum level of protection against spam).

  • Create a more complex mailing address. The easier the address, the easier it is to generate it to spammers.

The most secure mailboxes

From the point of view of protection against spam mailings, the most secure mailboxes are considered:

  • Google-Mail (Gmail);

  • Yandex-Mail;

  • Mail.Ru-Mail.

It is important to understand that 100% of the defense will not give any service. Always slip promotional letters. After all, spam methods are improved every year, becoming more sophisticated and secretive, spammers constantly find new ways to bypass filters. But minimizing the number of unwanted messages The above-described services are capable.

(Votes: 22, Rating: 3.91)

I think, each familiar is such a situation when messages from unfamiliar numbers with advertising content, such as the offer of goods or services for special offers or participation in the draw in the mail or SMS messages. So this is spam, and what it is and what it does with users we will tell in more detail.

What is spam and what he does

Spam is an advertising newsletter on the basis of users without their consent. As a rule, such a base is bought from mobile operators, if we talk about SMS-mailing or Increase E-mail Base Parsion client base with any source.

What is spam and what he does

The meaning of such spam dispuses is to attract the user's attention and make a potential client from it. But most often it turns out on the contrary - this advertisement causes only negative emotions in humans, since some companies too often spam letters to users, so they are often blocked and fall into the "black list".

What is spam in the phone: spam call

Spam in the phone, or rather, spam mailing, which occurs through the phone, or by calling, or SMS messages. That is, arbitrarily, at any time commercials come, or call experts, so to speak "cold calls" that offer companies on which they work.

What is spam and what he does

Of course, there are those who begin to conduct a dialogue with the manager and ultimately leaves the application for Search promotion SEO website If we are talking about this service, or immediately orders it and pays.

But, most often, on calls of this kind, people are responsible with neglect or even aggression, or simply do not take the phone at the sight of an unfamiliar room, especially if the call is carried out from the contact center.

What is spam on the Internet

Many know that spam on the Internet in their structure and the use algorithm is similar to spam in the phone. But on the Internet the distribution possibilities of spam is much more than in the phone. Here spam mailing is not limited to simple letters or online calls.

You can distribute spam on the Internet through commercials, banners or email emails or on Messenger in the phone or PC.

Recently, this practice has entered the turn - as a commercial before watching the film. You know such a situation when you turn on the movie and before viewing it is necessary to watch advertising. It can be safely called spam, since users did not give their consent to show this advertising.

The same applies already in games and applications. For example, if you play in the game and it is proposed to start going on after watching advertising, and even at all, so to speak, they begin to show it. Many have long been dissatisfied with this marketing move, but it does not affect numerous advertising shots.

What is spam in VKontakte

If we started talking about spam on the Internet, then the topic of spam in the social network, and especially spam in VKontakte here as never by the way, because the main proportion of spam in social. Networks are on VK.

What is spam and what he does

This type of message until recently came a very large amount - in the comments, in private messages, until the developers made the "Close Profile" function or "Close Messages". Thus, messages can only send the users of the user, so sending spam messages has decreased sharply.

But now people who send this very spam began to massively send a request "as friend" and those who respond to it, as massively send spam in private messages. But, as a rule, people already know such schemes do not add such people already, so they simply "hang" in subscribers.

What is spam in whatsapp

Spam in WhatsApp is also a very common species spam in social networks. The same people who are hired specifically for mailing are recorded in WhatsApp and send the ready-made, reserved database of accounts.

Plus, for spam in WhatsApp is that there, unlike VKontakte, there are no prohibitions for sending messages with services Website promotion under Yandex or the offer of some products.

What is spam and what he does

What is the essence of spam

The essence of spam is that it is, in fact, one of the types of advertising. Yes, not the most successful, since very obsessive and causes irritation from users. But if you study in detail how to use funnel sales You can calculate how many people from the total number of the base will respond to the message, and who will make an application and buy the goods.

Therefore, after all, spam, although in small quantities, but works. But many entrepreneurs are already refused to spam, since the spam newsletter also needs a budget.

Firstly - the very compilation of advertising by the marketer, secondly, to resign the base, you need to buy it from the owner. And the latter is the mailing itself. Each letter or call stand a little, but this is also money.

What is spam in email

With spam in e-mail, those who have many accounts in different socialists are most often faced. Networks or on other sites are tied to the e-mailbox. Moreover, it doesn't matter how this search system includes this box.

If you regularly come with letters containing spam from the same address so that it is over, you can put the newsletter on the email, as spam and then no letters come from this account.

What is spam and what he does

What is spam in classmates

Also, there is spam and classmates. The distribution principle is similar to all the previous ones or in messages or in groups of interests, as well as in the comments.

But the developers also have provided a way to prevent spam dispatch unprepared to users. To do this, just click on the "Mark As Spam" button. If we are talking about personal messages, then next to the message will be the "Complain" icon.

What is dangerous spam

Despite the fact that spam has a low cost of spam distribution, its excessive use can be dangerous for both users who are sent to the spam and for its sender. Due to numerous locks and negative user feedback, the site rating that makes the newsletter can "fall" to a minimum, or even in minus.

Accordingly, the attendance of the site will drop sharply, or will be reduced to zero. Many who do not know about KPI indicator: what it is and how to count it , just fruit spam newsletter, without even thinking about what they can do it.

For users, spam is also not the best phenomenon. But, despite the many negative sides of the spam, it is not used that less often, but even more often. According to calculations of scientists more than 80 percent in the electronic box is spam.

Comes spam: what to do

Many people when coming spam are lost and do not know what to do. Everything is simple - if the message is interesting to you, then follow the link and get acquainted with the commercial offer.

If the offer does not apply to your interests and demands, just block the letter, or the account from which it was sent. Also, if this spam comes in the comments, then it can also be blocked.

What is spam and what he does

Or a person who regularly sends you messages, without any concept, What is a commercial offer , just fills it with references and "empty" text.

What is the difference between spam from flood

The difference between spam from flooding is that spam is, as already mentioned, advertising messages containing any commercial offers. And the flood is, as a rule, an incentive, non-beam, "empty", as it is called on the network, the message, but large in its text volume.

Fluda is usually sent in large quantities, in order not to convey information to the recipient, but simply to "fill up" by his messages. So to speak, a kind of "attack on the psyche", because from the numerous flow of messages not every person will remain calm indifference.

What is spam and what he does

Well, I think, after our detailed notice of Spam, that he represents his main distribution methods and how to deal with him, you received a maximum of useful information. Those who nevertheless decided to apply spam newsletter in promoting their business or a certain product or service - think about it would not cost you "sideways".

Spam (eng. spam ) - mailing commercial and other advertising or other types of messages (information) to persons who have not expressed their desire to receive. [one]

In the generally accepted value, the term "spam" in Russian for the first time began to be used in relation to email emails. Unlimited messages in instant messaging systems (for example, ICQ) are called SPIM  (eng.) Russian (eng. Spam Over IM. ).

Spam's share in world postage traffic is about 80% (2011) [2] .

The origin of the term

Canned ham (spam)

Modern view of banks

Initially, the word "spam" appeared in 1936. It decryled as spiced HAM (sharp ham) and was a trademark for canned meat company HORMEL FOODS CORPORATION  (eng.) Russian - acute sausage minced pork.

After World War II, there were huge reserves of canned data, made for supplying during the war not only American soldiers, but also the soldiers of the Allies on the Land Liza program. In order to sell its products not the first freshness, Hormel Foods conducted the first advertising campaign in its kind. The word "spam" rushed into the eyes at every corner, with the showcases of all cheap stores, it was written on boards of buses and trams. This word could be read on house facades and newspapers. Advertising Canned "SPAM" was continuously broadcast on the radio.

Worldwide fame in applied to annoying advertising The term "spam" received thanks to the famous Squach "Spam"  (eng.) Russian From the famous television show "Flying Circus Monti Paiton" (1969) of the Comic Group from the UK "Monti Paiton".

The meaning of the sketch is reduced to the fact that in one cafe all dishes in the menu contain "spam", some even several times. When the main hero of Sketch, who came to this cafe, together with his wife, asks to bring him a dish without "Spama", the waitress offers a dish with a "small amount of Spama".

The visitor is indignant, and the choir of Vikings, sitting at the neighboring tables, begins to sing the wise song "Spam": "Spam, Spam, Spam, Spam ... Lovely Spam! Wonderful Spam! " ("Spam, Spam, Spam, Spam ... Favorite Spam! Wonderful Spam!") , making it impossible to dialogue of waitresses and visitors (that is, "Spamming" dialogue - "Saspen" dialogue ), after which the sketch is immersed in chaos. At the end of the sketch, the wife of the hero exclaims: "I do not like" spam ""! (eng. "I DON'T LIKE SPAM!" )[3] . The word "SPAM Terry Jones, Michael Spam Palin, John Spam John Spam John Spam Cleese and others) was also added in the titles to the names of the actors of the actors. In total, this word is mentioned in Sketch 108 times. [four] .

In 1986, a set of identical messages from a certain Dave Rowan, who advertised a new financial pyramid appeared in UseNet conferences. The title was reading: "Earn a lot of money," and the instructions in the letters contained how to do it. The author with enviable perseverance continued to duplicate his texts, and they were such a subscriber to subscribe that they began to compare with canned food advertised in Sketch.

So, for the word "spam", a new meaning was entrenched, which later turned into computer terminology to indicate the annoying advertising newsletters.

The most common types of spam

According to Kaspersky Lab, [five] In February 2010, the postal spam on the Internet has been distributed on topics as follows: 18.9% - Education, 15.7% - Recreation and travel, 15.5% - Medicines, Products / Health Services, 9.2% - Computer Fraud , 6.5% - Computers and Internet, 5.2% - Replicas of elite goods, 4.1% - Advertising spam services, 2.7% - for adults, 2.2% - Real Estate, 2.2% - Legal services , 1.9% - personal finance, 1.4% - polygraphy.

Advertising

Some companies engaged in legal business advertise their products or services with spam. The attractiveness of such advertising is low cost and (presumably) great coverage of potential customers. However, such advertising may also have the opposite effect, causing alertness from recipients.

Advertising illegal products

With the help of spam, advertise products that cannot be reported in other ways - for example, pornography, counterfeit goods (fakes, confiscated), drugs with circulation limitations, illegally obtained closed information (databases), counterfeit software.

This also includes advertising spam dispatch services themselves. [6] (Legislative spam is prohibited in Russia, but the fight against spammers is extremely difficult to combat [7] ).

Anti Plalama

Forbidden information on advertising legislation - for example, discrusive competitors and their products, can also be distributed using spam.

Nigerian letters

Sometimes spam is used by fraudsters to lure money from the recipient of the letter. The most common way was called "Nigerian letters", because a large number of such letters came from Nigeria. Such a letter contains a message that the recipient of the letter can receive a large amount of money in any way, and the sender can help him. The sender of the letter asks to translate him some money under the pretext, for example, paperwork or opening an account. Laundering this amount and is the goal of fraudsters.

The narrower name of this type of fraud - scam or scam 419. (by article number in the Criminal Code of Nigeria).

Phishing

"Phishing" (eng. Phishing from Password. - Password I. Fishing - Fishing) - another way of fraud. It is an attempt by spammers to put out the recipient of his credit card numbers or passwords access to online payments. Such a letter is usually masked under an official message from the bank administration. It says that the recipient must confirm information about himself, otherwise his account will be blocked, and the address of the site (owned by spammers) is given to the form that you need to fill out. Among the data you want to report, are also present by those needed by fraudsters. In order for the victim to not guess about deception, this site design also imitates the design of the official website of the bank.

Other species spam

  • Letters of happiness
  • Propaganda.
  • DOS and DDOS attacks.
  • Mass mailing on behalf of another person in order to cause a negative attitude towards it.
  • Mass distribution of letters containing computer viruses (for their initial distribution).
  • The distribution of letters containing a dying history (as a rule, about the patient or affected by the child's accident) with information that for each transfer of a letter of a certain Internet provider allegedly pays the family of the victim to a certain amount of money "for treatment". The purpose of such a distribution is to collect e-mail addresses: after numerous forwarding "All familiar" in the text of such a letter often contain e-mail addresses of all to whom it has been vested earlier. And among the next addressees, it may well be and initiated by its spammer.

There are also two types of mass mailings that are usually not refer to the spam category, because they are in unintento.

  • Mail worms of a certain type distribute themselves using email. By infecting the next computer, such a worm scans the computer in search of e-mail addresses and sends itself to those found addresses.
  • Mail server, rejecting the letter, can send the sender Notification of lack (eng. NON-DELIVERY REPORT, NDR ). Since the sender's address in the spam is forged, unrelated to the newsletter, the user can get a set of short-quality messages to its address. English term for this phenomenon - backscatter.
  • Similar behavior demonstrate some antivirus programs and spam filters. However, such a behavior is found only in very old programs - released even before the problem of spam on the Internet rose in full [8] .

Methods of distribution

Folder with spam in the postcard window

Kmail.

Email

The largest spam stream is distributed via email (e-mail). Currently, the share of viruses and spam in the overall email traffic is from different estimates from 70 to 95 percent. [nine] . The spam is often found advertising popular specific products: Rolex (fakes), Viagra (generic), etc. [ten] [eleven] [12] [thirteen] [14] [15]

Spammers collect e-mail addresses using a special robot or manually (rarely) using web pages, usenet conferences, mailing lists, electronic bulletin boards, guest books, chat rooms ... Such a robot program is capable of collecting thousands of addresses and create from them Database for further distribution on them spam. Some companies are engaged only by collecting addresses, and the bases are then sold. Some companies sell the email spammers of their customers who ordered goods or services by email. There is another way to get a large list of e-mail addresses: addresses first generated randomly on specified templates, and then checked by a special validator program for their validity (existence).

Often, spam take undesirable information to which the user nevertheless subscribed to independently - expressed consent to the newsletter when installing a program or registration on the site, filled out the form in the store, etc. Such mailing will be sent centrally and officially using special services that have relevant resources. The activity of such services is hampered by the complaints of recipients and often the newsletter is blocked by the largest postal services.

To send spam, the poorly protected or incorrectly configured computers are used. It can be:

  • Servers that are mistakenly configured in such a way that you allow free shipping mail (Open Relay, Open Proxy).
  • Webmail Services allowing anonymous access or access with simple registration of new users (which special robots programs can perform).
  • Computers-zombies. Some spammers use known vulnerabilities in software or computer viruses in order to capture the management of a large number of computers connected to the Internet, and use them to send spam.
  • Mail servers sending a bounce message when it is impossible to deliver a letter. Spammers send a letter to a deliberately non-existent address, indicating the fake address of the sender (the one you want to deliver spam. The server generates a letter with an error message and sends it at the specified address, often placing in it and the text of the source letter. It should be noted that such a server behavior complies with the standards adopted on the Internet, moreover, in some cases, this is the only way to notify the sender about the problem (for example, when sending a letter through several serial servers); However, in manuals for system administrators, it often contains the recommendations to configure the mail server in such a way that when trying to deliver a letter to a non-existent address of the server, instead of forming an error message to break the connection.
  • Using different kinds of non-obvious vulnerabilities and incorrect (or conservative) settings for mail servers for unauthorized spam mailing numbers.

To make it difficult to automatically filter the spam, the message is often distorted - instead of letters, similar to the figures, the Latin letters instead of Russians are used, gaps are added at random places. Other techniques are used.

Different tricks are used to make sure that the message is received and read. Among them:

  • Request confirmation of delivery. Some postal clients can send it automatically.
  • Letters containing images that are downloaded from spammer-controlled sites.
  • Links to web pages that offer additional information.
  • The offer to cancel a subscription to this newsletter, sending a letter at the specified address (in reality the newsletter, as a rule, does not stop).

If spammers receive confirmation that the postal address is really used, the spam stream may increase repeatedly.

Usenet.

Many Usnet newsgroups, especially unemployed, were abandoned by users and now contain almost exclusively advertising, often not even on the topic. Instead of others, modistered conferences were created.

Instant messages

With the development of instant messaging services, spammers began to use them for their own purposes. Many of these services provide a list of users who can be used to send spam.

The narrower name of this type of spam - SPEY (Sp. am +. Instant MEssenger).

Social networks and dating sites

Recently, a significant part of personal messages coming to users of popular social networks and dating sites is spam, which is often selected on behalf of users, logins and passwords to whose accounts have fallen into the hands of spammers (which facilitates bypassing various restrictions). In addition to personal messages, other ways of communication can also be used in social networks - invitations to groups / community, applications for "friendship", "walls" / "Guest books" and so on.

Blogs, wiki, forums, bulletin boards

Recently, websites have become popular on which you can leave comments (for example, forums and blogs) or those that can be freely edited - wiki. Since these pages are open to free editing, they can be placed spam - Splogs. Such spam is the more annoying that it is more difficult to delete (as a rule, only privileged users can edit messages in forums and blogs - respectively, an ordinary participant must contact someone from them).

Spam in the comments pursues two objectives: an increase in the number of incoming references to a promotable site (in particular, to increase Google PR or Yandex Titz), as well as to increase the attendance of the progressable site (if the comment is left on a more popular resource).

Another type of spam blogs is a vigorous, often automatic, making users to the list of "friends" without familiarizing with their personal pages, as a rule, with the aim of artificially raising its own rating by obtaining "mutual" friendship, or attracting attention to network advertising, placed In the magazine spammer. This type of spam is sometimes called "FRENDOSPAM" (from English. Friend. - friend).

Special attention should be paid to the placement of spam on the bulletin boards. Usually on such boards place information of commercial and semi-dimensional content. Often spammers post their ad in all available sections to increase the relevance of the message in the indexed page mechanisms. The announcements themselves are masked for a commercial announcement, sometimes every word looks like a hyperlink. Sometimes in one declaration you can see more than a dozen links leading to different pages. Modifying bulletins of ads with a large number of ads is very difficult, often the human factor is triggered - inattention.

Search spam

Search spam - Pages and Web sites created in order to manipulate the results in the issuance of search engines, for example, Dorveli - pages with keywords and automatic redirection to the "desired" site.

Network messages

Network message with advertising

(Advertised address is deleted)

Sometimes spam is sent over the local network through the Messenger embedded in Microsoft Windows SMB. Such messages appear in the form of pop-up windows (if there is no third-party software processing them differently). In this case, to disable their reception, for example, to stop the Messenger service team Net Stop Messenger [16] . In versions of Windows NT, starting with Windows XP SP2, this service is already stopped by default, so this method of mailing is occurring less and less.

SMS messages

Spam can be distributed not only via the Internet. Advertising messages and letters with a request sent to mobile phones using SMS messages are especially unpleasant to the fact that they are harder to defend them.

Email Address Collection

Spammers find out user email addresses in different ways. Here is some of them:

  1. The address of the user's mailbox is published on a publicly available site - most often in the guest book, the forum, personal card, etc., where he can find a special program (Harvester), scanning sites like the indexing robot of search engines.
  2. User mailbox address is published in UseNet.
  3. If the postcase address is not a unique word, for example, a common name or name, then it can be selected by the dictionary. Spammers have special dictionaries, including simple words, names of people, the names of geographic objects and some of the most popular combinations of a network slang. Combining this dictionary and a list of domain names (openly published), spammers receive a list of addresses for mailing.
  4. If the computer of the person with whom the owner of this box was rewritten, was infected with the Trojan program, then all the addresses from its address book can get to the spammer.
  5. A customer database of any company can be stolen or even sold by the company's employees themselves.
  6. If the user voluntarily agreed to receive advertising letters [17] .

Harmful

The mass spam mailing has a low cost for the sender in the settlement. However, a huge amount of useless messages applies obvious harm to recipients. First of all, we are talking about the time spent wasted on the screening of unnecessary mail and searching among her certain necessary letters. Very often, Internet traffic is expensive, and the user has to pay for obviously unnecessary letters. It is believed that spam can be beneficial to providers, as it leads to increased traffic. In fact, providers also carry additional costs due to an increase in the useless load on the channels and equipment. It is providers that have to spend resources for excess equipment and spam protection systems. According to public statistics [18] , not less than 80% of sent letters currently constitutes spam (according to some studies on one Internet user today accounts for 70 spam posts per day [19] ). Most of it cuts out by mail servers during receipt. But even the remaining smaller part is enough to complicate the life of users. Providers carry additional costs due to the constant need to combat spammers (redundant equipment, excess channel capacity, special spam recognition software).

Spam also harms the reputation of adherents of this method of marketing. A simulation of spam mailing can be used to discredit goods (which is advertised) and / or the telecom operator, from addresses of which it (allegedly or indeed) is carried out, that is, spam can be used in unfair competition and the "black" pian.

According to specialists of the Russian Association of Electronic Communications (RAEC), in 2009, the damage to the Russian economy from spam was 14.1 billion rubles. Meanwhile, analysts of FBK, argue that every year spammes cause losses in the amount of 31.3 to 47.2 billion rubles each year [twenty] .

Russia was on the fourth place in the ranking of the most active spam distributors. The list was the British company Sophos, which is engaged in the protection of data and the development of antivirus software [21] .

Evaluation of efficiency

Testing and analyzing the results of spam mailing invariably shows its exceptionally low efficiency, and often almost complete intactness. For example, during an advertising campaign in California, 350 million notices for the sale of a new natural-based drug were sent out of 75869 computers. As a result, the company received 28 orders [22] .

Spammes

American Sanford Wallace on nicknamed King Spam was fined at 4, 234 and 711 million dollars (2006, 2008 and 2009, respectively).

The famous Russian Spammer Leonid Kuvaev, who occupies second place in the list of the most malicious spammers of the Internet, began his business in America, but in 2005 he came under court - the General Prosecutor of Massachusetts determined that the Spamers network Kuvaeva, including the Badcow's partner program, generate to him $ 30 million annually - and led from the Russian Federation a fine of $ 37 million was awarded from the Russian Federation. However, he left back to Russia, from where it could not be achieved even with the help of the FBI. His sites continued to sell "Viagra" without a license and send spam through a botnet. In December 2009, Kuvaev was arrested in Moscow for pedophilia, the case was transferred to the court for sixty episodes of harassment to minors.

Fighting spam

Ideology

Obviously, spam brings economic benefits to its customers. This means that users, despite the hostility to spam, are still enjoyed by advertised by spam service. As long as the return from spam exceeds the cost of overcoming protection, spam will not disappear. Thus, the most reliable way of struggle is the refusal of services advertised by spam. There are proposals for the use of public condemnation, up to termination of communication, against persons buying advertised goods and services [23] .

Other ways are aimed at difficulty spamming access to users.

Preventive protection measures

The most reliable way to combat spam is not allowed spammers to find out the email address. This is a difficult task, but some precautions can be taken.

  • You should not publish your address on public sites.
    • If for some reason the email address has to be published, it can be encoded like "u_s_e_r_ (a) _d_o_m_a_i_n _._ n_e_t". Spammers use special programs to scan sites and collect mail addresses, so even such a camping address can help. It should be remembered, however, that in the most simple cases, the "encoded" address will be able to recognize the program. In addition, it creates inconvenience not only for spammers, but also for ordinary users.
    • Most public sites do not publish email addresses of registered users, but allows you to send a message on nickname. The real address is substituted by the server from the user profile, and other users are invisible.
    • The address can be represented as a picture. There are online services that make it automatically (however, one should not forget that some of these services can assemble and sell mail addresses entered by users). In addition, it can be done in any graphic editor [1] or simply write an email address from hand and photograph.
    • On web pages, email addresses can be encoded using JavaScript.
  • You can make a special box for registering in services that do not cause special trust, and do not use it for normal work. There are even services issuing disposable email addresses specifically in order to indicate them in doubtful cases. The most famous of them - Mailinator.com.
  • You should never be answered on the spam or go to links contained herein, including on the links intended to be allegedly for an unsubscribe. This action will confirm that the email address really exists, is actively used, and its recipient reads spam, and will lead to an increase in spam.
  • The fact of downloading pictures included in the letter, when reading, can be used to verify the activity of the postal address. Therefore, it is recommended when requesting a mail client on permission to download the picture to prohibit the action if you are not confident in the sender.
  • When choosing an email address, if possible, stay on a long and uncomfortable to guess the name. So, there are less than 12 million names consisting of no more than 5 Latin letters. Even if you add numbers and the symbol of the underline, the number of nicks is less than 70 million. A spammer can send mail to all such names and sake those from whom he came the answer "The addressee does not exist." Thus, it is desirable that the name is not shorter than 6 characters, and if there are no numbers in it - no shorter than 7 characters. It is also desirable that the name does not have a word in any language, including common names of their own, as well as Russian words recorded by Latin. In this case, the address can be guessed by the part of the words and combinations according to the dictionary.
  • You can change your address from time to time, but this is related to the obvious difficulties: you need to inform the new address to people from which I would like to receive mail.
  • Companies often do not publish their address, instead using CGI to communicate with users.

All methods of concealing the address have a fundamental disadvantage: they create inconvenience not only to the estimated spammers, but also to real addresses. In addition, it is often necessary to publish the address - for example, if this is the contact address of the company.

Filtration

Since advertising letters are usually very different from the usual correspondence, a common method of combating them has been chipping from an incoming mail stream. Currently, this method is the main and most widely used.

Automatic filtering

There is software (software) to automatically define spam (so-called spam filters). It can be intended for end users or for use on servers. This software uses two main approaches.

The first is that the content of the letter is analyzed and the conclusion is made, the spam is or not. A letter classified as spam is separated from other correspondence: it can be marked, moved to another folder, removed. This software can work on both the server and the client's computer. In the latter case, the user does not see the filtered spam, but continues to carry costs associated with its reception, since the filter software receives each letter and only then decides, show it or not. On the other hand, if the software works on the server, the user does not carry the costs of transmitting it to his computer, however, in this case, the user risks not receive a letter erroneously perceived by the filter as spam.

The second approach is to, apply various methods, identify the sender as spammer, without looking into the text of the letter. It can only work on a server that directly accepts letters. With this approach, additional traffic is spent only by the server to communicate with spam mail programs (i.e., on refusals to receive letters) and access to other servers (if necessary) when checking.

There are also specialized online services, such as Kaspersky Lab (Kaspersky Hosted SECURITY), Outcom "Spairzhez, an" Antispam Post ", ContrSPAM incap, antispamus providing paid protection against spam. Changing the MX record in the domain name of the enterprise (see . DNS. ) A special way allows you to redirect mail to a protected domain to a specialized mail server, where it is cleaned of spam and viruses, and then sent to a corporate mail server. The method is suitable for corporate users and is not suitable for possessors of mailboxes in public postal systems.

Another problem of automatic filtering is that it may mistakenly mark both spam useful posts. Therefore, many mail services and programs at the request of the user may not erase those messages that the filter accounts spam, but put them in a separate folder.

Methods of automatic filtering

Automatic filtering programs use a statistical analysis of the content of the letter for making a decision, whether it is spam. In practice, the methods of Bayesian filtering spam are popular. For the work of these methods, preliminary "training" of filters is required by transferring to hand-sided letters to identify the statistical features of normal letters and spam.

The method works very well when sorting text messages (including HTML). After studying on a fairly large sample, it is possible to cut off to 95-97% spam. To bypass such filters [24] Spammers sometimes put the meaningful part into the picture invested in the letter, the text is either absent or there is no case that does not allow the filter to draw up statistics to recognize such letters. In this case, you need to use text recognition programs (most of the modern mail programs do not support this), or use other methods.

The guarantee of the reliable operation of the Bayesian method is the constant duty of the filter and indicating to the errors performed. In the postal programs, it is possible to manually mark the message "Spam / non-spam", and in the postal services on the Internet - the "Complain on Spam" button.

Non-automatic filtering

Many programs and email services on the Internet allow the user to set their own filters. Such filters may consist of words or, less commonly, regular expressions, depending on the presence or absence of which the message falls into or falls into the trash box. However, such filtering is time consuming and inflexible, in addition, requires the user to a certain degree of acquaintance with computers. On the other hand, it allows you to effectively cut off part of the spam, and the user knows exactly which messages will be filled and why.

Black lists

The blacklist is a list of physical or legal entities, which is entered into the appropriate list, which for any reason is recognized as unfriendly in relation to the subject-compiler.

Affiliation, use, efficiency

These include:

  • Lists of IP addresses of computers that are known that spam mailing is being conducted with them.
  • (widely used) lists of computers that can be used for distribution - "open relays" and "open proxy", as well as - Lists of "Dialapes" - client addresses, on which there can be no mail servers
  • (Possible use) Local list or list supported by someone else.
  • (Widespread due to the simplicity of implementation) Black lists, the request to which is carried out through the DNS service. They got the name DNSBL ( DNS. BLack LIST). Currently, this method is not very effective. Spammers find new computers for their purposes faster than they have time to put into black lists. In addition, several computers sending spam can compromise the entire mail domain or subnet, and thousands of law-abiding users for an indefinable time will be devoid of opportunities to send mail to servers using such a black list.
  • (found) lists of preaching rather radical theories (for example, equating viral messages to malicious spam, etc.).

Wrong use

Often, irresponsible and improper use of black lists of resource administrators, leading to blocking a large number of innocent users.

Example: Using lists without accurate views of what addresses and how to include, using postal black lists for Web resources, etc.

Irresponsible use

Example: failure to provide the user (or administrator) of the blocked address of the list of information on the list (as there are a great set) or guelding in their actions by the principle of presumption of guilt.

RECEQUET from the head of black lists

Recently, there are more complaints on the Black List Administrators, which blackmail Internet providers and hosting providers refuse to remove IP addresses, from which spam once may be sent (addresses fall into black lists on anonymous complaints that often It is impossible to check). In addition, many require "donations" from the owners of IP addresses for deleting records from black lists. [The source is not specified 1285 days ]

Authorization of mail servers

Different ways were offered to confirm that a computer sending a letter really has the right (Sender ID, SPF, Caller ID, Yahoo Domainkeys, Messagelevel [one] ), But they have not yet been widespread. In addition, these technologies limit some common types of mail servers functionality: it becomes impossible to automatically redirect correspondence from one mail server to another (SMTP Forwarding).

The practice of the Mail Provider is responsible for its users ": The email service provider establishes the rules of its use that limit the massability of possible newsletters, and ensures their implementation. Public providers for this use authentication both when receiving and when sending mail. Internet providers allow clients to install SMTP connections only with their (provider) servers forbiving connections with other servers or "transparent" forwarding them to their server. This allows you to block the spam newsletter directly - on the SMTP of the recipients of letters, but delivers the inconvenience to send mail through your SMTP server (for example, corporate or public, which is particularly relevant for mobile computers). The solution here may be dividing the flow of sending email programs (through 587 port with mandatory authorization, RFC 4409) and the flow of letters between SMTP servers (through the 25th port), which is supported for many servers today (including public, for example , Mail.Ru, yandex.ru). However, this is not the standard for almost all default email programs to send mail to the 25th port.

Gray lists

The gray lists method is based on the fact that the "behavior" of software designed to send spam, differs from the behavior of ordinary mail servers, namely, spam programs are not attempting to re-send an email when a temporary error occurs, as required SMTP protocol. More precisely, trying to bypass protection, with subsequent attempts, they use another relay, another return address, etc., so it looks for the host as an attempt to send different letters.

The simplest version of the gray lists works as follows. All previously unknown SMTP servers rely on the "gray" list. Mail from such servers is not accepted, but does not deviate at all - they are returned to the temporary error code ("Come later"). In case the sender server repeats its attempt at least after a while T_G.(this time is called Delay ) The server is entered into the white list, and the mail is accepted. Therefore, ordinary letters (not spam) are not lost, but only their delivery is delayed (they remain in the queue on the sender's server and are delivered after one or more unsuccessful attempts). Spammer programs are either not able to re-send letters or the servers used by them have time during the delay to get into the black lists of DNSBL.

This method currently allows you to cut out up to 90% of spam to virtually risk to lose important letters. However, it is also impossible to be called flawless.

  • There may be mistaken letters from servers that do not execute the SMTP protocol recommendations, for example, mailing with news sites. Servers with such behavior as possible are entered into white lists.
  • The delay in the delivery of the letter can reach half an hour (or even more), which may be unacceptable in the case of urgent correspondence. This disadvantage is compensated by the fact that the delay is made only when sending the first letter from a previously unknown sender. Also, many implementations of gray lists automatically, after a period of "dating", the SMTP server is introduced into the white list. There are methods of interspersonal exchange with such white lists. As a result, after the initial period of "memorization", actually delayed less than 20% of letters.
  • Major postal services use several servers with different IP addresses, moreover, a situation is possible when several servers are trying to send one and the same letter . This can lead to very large delays in the delivery of letters. Server pools with such behavior are also entered into white lists.
  • Spammer programs can be improved. Support for re-sending the message is fairly easy and largely leveals this type of protection. The key indicator in this struggle is the ratio of the characteristic time of spamming in black lists T_B.and typical delay time "gray" lists T_G.. For T_B \ GG T_GGray lists in perspective are useless; for T_B \ LL T_GGray lists are difficult for spammers.

Other methods

  • General tightening requirements for letters and senders, for example - refusal to accept letters with the wrong return address (letters from non-existent domains), checking the domain name on the IP address of the computer from which the letter is coming, and so on. With the help of these measures, only The most primitive spam is a small number of messages. However, not zero, therefore, the meaning in their application remains.
  • Sorting letters in the content of the header fields allows you to get rid of some spam. Some client programs (for example, Mozilla Thunderbird or The Bat!) Make it possible to analyze the headlines without downloading the entire letter from the server, and thus save traffic.
  • Call-response systems allow you to make sure that the sender is a person, not a robot program. Using this method requires the sender to perform certain additional actions, it may often be undesirable. Many implementations of such systems create an additional burden on postal systems, in many cases they send requests for fake addresses, so in professional circles such solutions do not enjoy respect. In addition, such a system cannot distinguish a robot causing spam from any other, such as those that send news.
  • Systems for determining the symptoms of communication, such as Razor and Distributed Checksum Clearinghouse. The modules embedded in the software modules are counting the checksums of each letters passing through them and check them on Razor or DCC services servers that report the number of emails on the Internet. If the letter appeared, for example, several tens of thousands of times - probably it is spam. On the other hand, a mass message may be a legitimate mailing list. In addition, spammers can vary the text of the message, for example, adding a random set of characters to the end.
  • The general change in the ideology of the e-mail operation, in which the sender's system must perform a certain "cost" action to accept the recipient server, for example, to report the result of the work on the resource-intensive mathematical algorithm. For ordinary users sending dozens of letters, this will not be difficult, while the cost of spammer is multiplied by the number of letters sent to them, usually measured by millions.

Nonpic Methods

An interesting story happened to Alan Ralsky (Alan Ralsky), which is among the top five largest spammers of the planet. User of one of the western forums

"He offered a witty idea to give Ralski to feel all the charm of the sensations of the victim, which was collected by spam tons. It was said - Made by: the efforts of thousands of enthusiasts were found electronic and physical postal address of the entrepreneur, after which they were signed for thousands of a wide variety of distribution lists, free newsletters, etc. The result did not slow down to affect: after a couple of weeks, the kilograms brought out of himself (!) Daily entering his paper advertising drawer and many hundreds of electronic messages, Alan complained of the press on the "surviving misfortunes", threatening to file them into court [25] "

Legal aspects of the problem

In some countries, legislative measures are taken against spammers. Attempts by legislative prohibition or restriction of spammers are encountered for a number of difficulties. It is difficult to determine the law, which newsletter is legal, and what is not. The worst thing is that the company (or person) causing spam can be in another country. In order for such laws to be effective, it is necessary to develop agreed legislation, which would operate in most countries, which seems to be difficult to achieve the foreseeable future.

In Russia, spam is prohibited by the "Law on Advertising" (Article 18, paragraph 1) [26]

The distribution of advertising on telecommunication networks, including through the use of telephone, facsimile, mobile radiotelephone communication, is allowed only under the condition of the preliminary consent of the subscriber or recipient to receive advertising. At the same time, advertising is recognized as a subscriber or addressee, without the prior consent of the subscriber or a recipient, if the advertiser does not prove that such consent was obtained.

In official comments from the federal antimonopoly service authorized to carry out the functions of monitoring compliance with this law, was indicated by the applicability of this provision for Internet mailing. For violation of Article 18, the advertiser is responsible in accordance with the legislation on administrative offenses. However, the FAS does not have the authority to carry out operational-search activities for the establishment of a person responsible for spam, and authorized bodies cannot be carried out in connection with the lack of responsibility in Russian administrative and criminal legislation for the spam newsletter. Therefore, despite the periodic publications of materials on attracting violators to justice [27] , Currently, this legislation is ineffective.

From January 1, 2004, a federal law operates in the United States, called CAN-SPAM ACT. Attempts are made to attract spammers to court, and sometimes such attempts turn out to be successful.

American Robert Soluey lost the process at the Federal Court against the Small Oklahomsk Internet Service Provider, the operator of which accused him of the spam. The verdict of the court included the compensation of losses in the amount of $ 10,075,000 [28] [29] .

The first time when the user won the case against the company engaged in the spam sending, took place in December 2005, when a businessman Nigel Roberts from Alderney Island (Norman Islands) won the court against Media Logistics UK, receiving 270 £ [thirty]

In October 2009, the Facebook social network has sued Sanford Wallace, which occupied Spam on this site, 711 million dollars. It is noteworthy that for Wallace on the nickname "King Spam" it was not the first court: in 2006, he was fined $ 4 million for illegal advertising in the USA with pop-up windows, and in 2008 - by $ 234 million for spam in social network myspace [31] .

An example of history with the Russian provider Majordomo is interesting [32] [33] Blocked for spam mailing, allegedly conducted with addresses belonging to him.

The adopted anti-spam laws may contradict the Constitution. So the Supreme Court of Virginia canceled the verdict of the Sport Jeremy Janes and recognized the unconstitutional law on the fight against spam [34] As violating the right to freedom of speech.

In November 2010, deputies of the State Duma of the Russian Federation and the participants of the Internet industry prepared amendments to the Law "On Information Protection", introducing the legal definition of spam [35] .

see also

Notes

  1. In principle, the legality of mass distribution of certain types of messages, for which the recipient consent is not required, can be enshrined in the country's legislation. For example, it may concern reports on impending natural disasters, mass mobilization of citizens, etc., however, this does not apply to the form of mailings falling under the concept of "spam". For, it is obvious that these messages are not advertising.
  2. Dubbown statistics according to the "Kaspersky Lab"
  3. Monty Python - Skatch on YouTube
  4. With full text Sketch, you can find here: Text Sketch (inaccessible link)
  5. Maria Vsmennikova Spam in February 2010. SecureList.com (03/10/2010). Archived from the primary source on August 22, 2011. Checked on March 25, 2010.
  6. Russian spammers earned more than 100 million dollars over the year. News portal "SUS @ NIN" (04.02.2010). Archived from the primary source on August 22, 2011. Checked on March 25, 2010.
  7. Increased spam in Russia contributes to imperfect legislation. Clerk.ru (02/05/2010). Archived from the primary source on August 22, 2011. Checked on March 25, 2010.
  8. For example, the program Spamex. Such a function is considered in the journal "Submarine" № 9 for 1998
  9. Report "Kaspersky Lab" about spam for July 2007
  10. Rich Kawanagh. The Top Ten Email Spam List of 2005. ITVIBE NEWS, 2006, January 02, http://itvibe.com/news/3837/
  11. Say Good Bye to Viagra, Rolex and Other Unwanted Bogus Emails ... - http://www.spamsafemail.com/index.html
  12. Avalanche of Viagra Ads and Rolex Pitches http://dir.salon.com/story/tech/feature/2005/01/19/microsoft_spam/index.html
  13. Recent Upsurge in Rolex Spam http://www.well.com/conf/inkwell.vue/topics/236/brian-mcwilliams-spam-kings-page02.html
  14. Viagra and Rolex Watches Junk E-Mails! http://www.combat-diaries.co.uk/diary30/spam%20Viagra ,%20rolex.htm.
  15. Informe de Retarus Sobre Spam En Junio ​​Del 2008: "Viagra" Supera A "Rolex" http://ivr.tmcnet.com/news/2008/07/03/3529512.htm
  16. More logical or completely disable it, or configure the firewall to block packets with messages. Both of these methods are described in Art. 330904 Microsoft Knowledge Base
  17. Reading advertising mail for "Money" (rus.) . Encyclopedia fraud. Archived from the original source August 4, 2012. Checked on June 29, 2012.
  18. Spam statistics for the period 14-20 December 2009.
  19. Article on the study of the problem of spam on the Cybersecurity information portal
  20. Rest of spam. // The New Times, 11/22/2010
  21. Russia became the fourth in the rating of spam distributors, API-Ural
  22. Science and Life, No. 6 (2009), p. 51.
  23. Andrey V. Stolyarov : Spam: who is to blame
  24. Bypassing filters customized email service providers
  25. Do not spit into the well, you will go to it, the magazine "ComputerR" №49 of December 15, 2002
  26. Federal Law "On Advertising" from 13.03.2006 N 38-ФЗ
  27. Publications about bringing to responsibility for spam from the official site of the FAS Russia
  28. Braver v. NEWPORT Internet Marketing Corporation et al - U.S. District Court - Western District of Oklahoma (Oklahoma City) , 2005-02-22
  29. The article "Computer Market" magazine argued that the largest amount of fine spam members amounted to 1,260,000,000 dollars. However, no references to sources were not given. Search in the Google system according to the summary and word SPAM at the time of publication did not return any results, except for reference to the article itself in the "Computer Market".
  30. Businessman WINS E-Mail Spam Case - BBC NEWS. , 2005-12-27
  31. Spammer pays 711 million dollars
  32. http://www.cnews.ru/news/line/index.shtml?2006/06/15/203651
  33. http://yro.slashdot.org/yright/06/06/17/1319233.shtml
  34. The court recognized the ban on spam violation of freedom of speech
  35. News Newsru.com :: State Duma plans to introduce criminal liability for spam

Links

Fighting spam
Free by
  • Spamassassin - Filtering Program using several different methods, including based on the Bayes Theorem
  • Popfile - multiplatform open spam filter implemented as POP3 / SMTP / NNTP-proxy. For classifying texts, the Bayes Theorem is used. To connect to the mail server, it serves its XMLRPC interface (used in particular in ESERV). Russian description Popfile.

In the most common sense spam This is a mass distribution of advertising letters to users who have not allowed their consent to it. Let's start with the origin of the word.

Where did the word "spam" come from?

Word "spam" (English version – "SPAM") has a rather fun origin. Originally spam This is a trademark of the American company, under the name of which in 1936 began to produce canned meat. During World War II, there were so many that I had to urgently hold an advertising campaign It was necessary to sell them before the expiration date. These canned goods were advertised everywhere, even on the radio even on the radio.

What is spam and how to deal with him

This situation was collapsed in one of the episodes of the "Flying Circus Monti Paiton", and the current meaning of the word spam acquired in 1986, when the stream of identical advertising messages of the notorious financial pyramid appeared.

Types of spam

  1. Mass mailing letters. The most famous view of the spam. Spammers buy the databases of postal addresses, and then send letters with commercial proposals (which most often contain viruses, phishing and so on).
  2. Messages in social networks and messengers . Previously, these were the same promotional messages as in the letters, but now the popular scheme is becoming the user's account, and then the messages are sent to translate the enyn amount of money.
  3. Spam on the forums . Spammers show their activity and on forums: leave messages in discussions and send private messages to users. Sometimes it is used to build a reference mass of any site.
  4. Spam in comments on the site . The view of the spam, which is the strongest hate the owners of sites. The purpose of spammers is still the same either to advertise their products or services or increase Thematic citation index (TIC).
  5. Spam in catalogs and on announcements boards . Catalogs are used to promote sites (although now less), and bulletin boards For fraudulent ads.
  6. Spam on SMS. . As with the sending emails, spammers buy databases of users of cellular operators and send spam messages of an advertising or fraudulent nature.

Safe and Dangerous Spam

Spam messages can be divided into two large groups Safe and dangerous. The first are unpleasant, but we are threatened with only spoiled mood and spending time, but the second can harm the computer and finance.

Safe spam

  1. Advertising legal goods or services. These are the usual letters of an advertising nature, but with the difference that users did not give their permission to receive them.
  2. Advertising goods or services prohibited by law. If the law prohibits advertising a product or service, then spammers begin to actively use mailing. There is nothing to lose.
  3. Complementing letters. May be associated with policies; They are sent to defame competitors, as well as allegedly can be sent on behalf of competitors to change the opinion of them for the worse.
  4. "Letters of happiness." Messages (including in messenger) with a request to send the text to other users, so that something good happened or something bad did not happen. Sometimes such letters use spammers to collect the address database for subsequent mailings.

Dangerous spam

  1. Phishing . Fraudsters send a message similar to a standard letter from partners, bank, beloved resource. It contains a link to a fake site that looks the same (or very similar), as is the original site. Similar domains are often used: sberbank.su instead of sberbank.ru, maiil.ru instead of Mail.Ru and so on. On the fraudorate site users are asked to enter personal data. In order to encourage users to make it quickly, in a letter or on the page some "terrible" information can be reported: you have come a new penalty, a loan is decorated for you, the account will be blocked and so on. Spam letterIf the user goes on the link or enters personal information on the site, its data is leaking to fraudsters. In the case of banknotes, it threatens serious financial losses.
  2. Nigerian letters . They received such a name, as was originally distributed in Nigeria. The essence of the letter is reduced to the fact that the user promises a large amount of money (inheritance, for the services performed, and so on), but before that he must pay a small contribution. Naturally, as soon as the scammers receive money, they immediately cease to get into touch. Nigerian letter - example
  3. Malware. In a letter or in the following link, a virus, worm or trojan can be caught from it. Trojan programs They infect the computer, and then steal the data, give the hackers remote access to the computer or perform some other task. Network worms Can actively distribute (distribute user contacts) and harvest a variety of people.

In general, Spam is a far from a harmless thing, so anyone similar to spam messages should be treated very carefully.

How to deal with post spam

In order to maximize the amount of spam in its mail, you need to understand what How users get into mailing lists .

  1. Inattention at registration on the site . Often, in the form of registration, it is immediately worth a tick consent to receiving promotional materials. However, to refuse spam in this case is easy: at the end of each letter there must be a link "Unsubscribe from mailing."
  2. Breaking into . Scammers wake up the websites and mail of users, thereby getting access to databases (contacts).
  3. Sale . The database of addresses, unfortunately, sometimes selling sites themselves.
  4. Phishing . The user enters its data on submarine sites.

Tips

The chief advice that has repeatedly showed its effectiveness: Register at least two email addresses. One for personal and work contacts, and the second to register on commercial sites, sites with dubious content and so on.

Next advice Choose a reliable postal service (eg, Gmail. ). Spam filtering works well in such postal services, so most of the fraudulent letters will fall immediately to the Spam folder.

If a letter is still "broken" in the main folder with letters, be sure Check it as spam All further letters from this user will go there.

Also to get rid of spam can be use filters and create rules (for example, in Yandex mail ).

Conclusion

Due to dangerous links and files that can be inside the letter, spam is a serious problem, especially for non-check-in users. Therefore, even if you are sure that you will never go to the fishing fraudsters, then you must tell about the dangers of our family and loved ones.

Spam, what is it such simple words? We will talk about this in detail. After all, many users are interested in this issue and want to get rid of spam.

Spam that it is such simple words how it works

Spam what is such simple words

Hello, readers! We all use the Internet to communicate, earnings and other entertainment. But sometimes or often, peace of man violates spam. Therefore, today I decided to talk to you about spam, in addition, help you defend yourself from him.

So, spam, what is it simple words? This word comes from English SPAM, which means mass mailing. This information is in Wikipedia. Simple words, a person receives in the mail, in the personal messages of the social network of various types of advertising with various references. Usually spam are engaged in figures of financial, shopping pyramids, people who do not know how to sell, fraudsters wishing to quickly get money from the user.

If you send spam to the mail, then it is in the section "Spam" (Screen 1).

spam what is such simple words

It is also celebrated on the social network.

Now, briefly consider how Spam works. There are special programs to search for e-mail addresses on the Internet. They are managed by spammers that are collected using the address program and send spam. Wants this person or not. It all depends on the spam, what kind of advertising he will dislode you. In addition, spam can send the services on which you were registered.

Next, we will disassemble the types of spam to understand what to deal with and consider the methods of protection from it.

Types of spam

There are many types of spam. Let's analyze every kind of order:

  1. Post spam. Mass mailing with an advertising offer can come to your email. If your mail address is registered on one service, it still can come spam. From this no one is insured.
  2. Sending spam in social networks. Imagine, you are calm, for example, in the social network of the VC and after a few seconds you begin to send several messages in a row. This is spam. It is rigidly controlled by social networks, but spam still apply.
  3. Telephone spam. Have you ever called unfamiliar numbers? It can be spam. In addition, people send various messages, for example, constantly comes SMS from the megaphone company with reference to their services.
  4. Spam on your blog pages. If you blog on the Internet, it is important to protect yourself from spam. After all, comments posted under the article can harm your readers and reputation to bloggers.

These are the main types of spam. There are still spam on bulletin boards, forums, on YouTube and other resources on the Internet.

Spam protection methods

Consider ways to protect against mass distribution or spam:

  • Use multiple mailboxes to work on the Internet;
  • Try to unsubscribe from spam, if possible;
  • Sign up only on verified sites on the Internet;
  • You can use programs to protect against spam attacks.

Now I will explain the above in detail.

First, create two mailboxes. Preferably gmail mail or Yandex mail. Why do it? The fact is that you can register an account account from one mailbox, and the other to use for personal purposes, for example, send letters to your friends.

You can delete spam from mail, using the "Clear folder" button (Screen 2).

What is spam

True after some time, Spam will appear again, but at least you will not go to unsafe links. On the site spam is removed in the same way as in the mail. To do this, mark a message, like spam in the Comments section (Screen 3).

how to get rid of spam

You need to register accounts on official sites. For example, proven resources like YouTube, classmates, VK and other resources. Look carefully on the domain, it should be protected by the HTTPS protocol if it is without s it is to fear this site. At the same time, find similar domains on the Internet and can easily distinguish the fake. After all, you can compare official domains from phishing sites.

The active PC user can set the program to a computer from spam. Next, several such programs will be considered.

Spam Programs

So, a list of programs that protect against spam:

  1. Spam Terrier. A simple and convenient program by which the mail spam is filtered. Here you can download the utility to the computer "programnew.ru/antispam/95-spam-terrier.html" and install.
  2. Antispamsniper for The Bat. This application will clean your mailbox from spam and will not allow him to appear again. Link to the program - "ProgramNew "/antispam/4703-antispamsniper-dlja-the-bat.html".
  3. Spamihilator. With this program, incoming messages on the mail are analyzed and removed spam. It is available here - "programnew.ru/antispam/116-spamihilator-16.html".
  4. AVS Antispam. This program helps to remove promotional letters of a dubious character and protects against spam. Link to it - "ProgramNew.ru/antispam/115-avs-antispam-11234-2.html" ..

On the Internet there are hundreds of similar programs, such as Avast or Kaspersky Anti-Virus, fights well with spam on the Internet, if they are properly configured.

What is the difference between postal sending from spam

Some people believe that the postal service and spam is the same. But no, there are differences.

The main difference between the postal sending from the spam is that the person himself subscribed to the newsletter to receive the author's letters, a blogger. In addition, people currently growing up with their reputation will not send you spam, since the address base of subscribers is reliably protected. Of course, and many authors come from spam from many authors, but it already depends on the efficiency of the service. For example, there is practically no such problem in Gmail.

Another difference is utility. In the postal sendings you can come links to training events, useful products. And in the spam can send links to investment projects and other unnecessary services.

Video on the topic of the author of Sergey Yolchev article:

Conclusion

The article considered the issue, spam, which is such simple words. Types of spam were shown, spam protection methods. If you come across spam or found out about it today, use this article as an instruction on spam protection. You can also add it to the bookmarks of your browser to go from time to time and repeat the studied.

Thank you for attention!

Sincerely, Sergey Yolchev.

P.S. More articles on the blog:

A program to optimize a computer, a defragler utility, where to take ideas for blog and other.

Spam (English Spam Email) is a distribution of letters (SMS, messages, making calls) without explicit consent to the recipient.

You certainly received letters or calls that were not waiting - proposals to earn a lot of money in a few minutes, buy a super pan, get a conditionally free legal service, etc. This is all called short and excumbrances - Spam.

Spam is a rather unpleasant phenomenon, since he is always intrusive and inappropriate, and takes time and attention to the most inconvenient moment. But this is not the worst. Spam can threaten your budget, nervous system and computer.

Make a small excursion in history. The word "spam" has an interesting origin. After World War II in the United States, there were too many canned meat from the manufacturer of Spam. And in order to get rid of the surplus of this product, an aggressive advertising campaign was organized. Calls to buy canned foods went away from everywhere, but instead of sales only irritated. However, the name has become nominative and now so called unwanted electronic newsletter, SMS messages, obsessive and inappropriate messages in the comments in social networks and phone calls to sell goods or services.

You may also be interested: CloudFlare - tool to protect your site and acceleration

Channels spam comment

Spam is different, comes from different channels and now we will try to classify spam by allocation of its main types.

  • Classic spam - Mass mailing letters on e-mail. It may be an interesting and necessarily "profitable" offer, containing not only discounts, but also viruses, phishing and other "bonuses".
  • Spam on SMS. . People come to the phone about the fact that they won a car in the lottery in which they did not participate, or the proposal to pay the prize shipment that they did not win. These messages are fraudulent. Spammers buy databases of telephone numbers from the operators to send such messages and, to great regret, the elderly are often conducted to these messages.
  • Calls by phone . To offer your services or goods, some companies also buy databases of phone numbers and lead the call, despite the fact that no one has given no numbers.
  • Comments on the site . Very often, site owners face such a situation: a new article appears on the site. Under the article, of course, is the possibility of commenting. And in the comments spammes come to advertise their goods and services. And it is especially unpleasant if these goods and services are similar to those sold on this site.
  • Spam in messengers and social networks . There are different options - or advertising messages or account break and send information to the necessary intruders.
  • Spam on ads, forums, catalogs . Most often are comments in the topics, private messages to users, etc.

Safe and Dangerous Spam

All spam can be divided into safe and dangerous. Safe spam is not threatened with anything, except that spoiled mood or loss of some time. But because of the dangerous you can lose money or it hurts your computer.

Safe spam

Advertising goods and services. This is an ordinary advertising of perfectly ordinary things - clothes, shoes, equipment or car service. You did not subscribe to her, but your address got to the owner of this business, and he decided to advertise his goods through this channel.

Advertising forbidden goods. For such goods Spam - almost the only one, and certainly the main channel for sale. But you still do not threaten anything - you are not going to buy what is forbidden (suddenly it is harmful to health).

Comcross. As they say, slander boldly - something will remain. Therefore, spammers use letters with unsightly information if you need to define a new competitor store or some kind of good name before the elections.

"They switched this letter to her friends so that they were always healthy and happy." Such text is often used by spammer to extract new and new addresses to its base.

As you can see, this kind of spam will not do anything bad, except that it will cause annoyance. But there is another form to be feared.

Dangerous spam

Phishing. Cybercriminals send you a letter in which supposedly on behalf of your bank (payment system, etc.) scare you a problem. Well, let's say you need to pay a big fine.

The problem, according to them, you need to solve immediately. To solve the issue, you are offered to go through the link to the official (there is really no) the Bank's website. The domain is necessarily very similar, and the site itself as two drops of water will be similar to the site of your bank.

For example, the domain may be like this:

www.priivat24.ua.

Only in rare cases, people pay attention to an excess letter or a digit in the domain, so the fraudsters are quietly used. Next, you will be asked to introduce your personal data to solve the problem indicated in the letter. After that you can lose all your savings.

Malware. In a letter from an unknown addressee, a Trojan program can come, which will infect the computer, after which the leakage of your personal data (logins, passwords) in the hands of fraudsters occurs.

As an option for even the worst development of events - attackers can get remote access to your computer and have already entertained how to conscience.

In addition, with the help of letters, network worms are sent - a special kind of malicious programs that independently disagree on your contacts and infect computers of acquaintances and friends.

Nigerian letters. From the first lines of the letter you will immediately please - you got a lot of millions inheritance! From a relative from <any country away, often African>.

All these letters are pretty the same type and they are written according to the scheme: "Congratulations on you with such unprecedented happiness and immediately transfer it to your account, only we need some money for related expenses."

If you believe that you could have a long-term millionaire relative in a distant African country and translate a little money, usually $ 200-300, then you will not be disturbed anymore. Although relatives can be found in other countries.

As you can see, not all spam harmless, there are very dangerous varieties.

Why send spam?

The main goal of the spammer is to make money on you. Send spam by email much cheaper and easier than to do the same in paper. Every day around the world is sent about 250 billion letters and almost half of this amount - spam.

Letters with proposals to lose weight in the shortest possible time, restore male health and quickly earn money by putting small money right now - these are the most popular species of spam.

How did they get my e-mail?

  • The address found randomly. Free access on the network is a large number of email addresses, and spammers collect them where only possible. For example, on social networks, on forums, guest books, etc.
  • The address was stolen from the contacts. If spammers hacked by the mail of any of your friends, they scatter the address book and find your contacts.
  • Data leakage. In any large company, data leaks occur from time to time. And the most unpleasant is that most addresses that are rocked into the hands of spammers are active. If you are registered on LinkedIn or Last.fm, or on the same Facebook - this can be expected.
  • Generated. If you take, say, the name of Masha and put it to the mail domain @ Gmail.com, you can generate a valid E-mail, which can be sent to spam. Scammers generate such addresses, and after sending the newsletter on them. If the letter was open - then the address is valid and you can continue to spam on it.
  • The address was purchased. Together with a large number of other addresses that are selling unfair companies.

How to deal with spam

Here are some tips that make it possible if you do not stop the spam stream, then at least reduce it, as well as avoid infection with a computer with malicious programs.

  • Do not leave your e-mail to unknown or suspicious companies. Great is the likelihood that they will sell it spammers.
  • Do not open letters with spam. Fraudsters often send letters with a small picture inside and track whether it has trained. If it was loaded - then the letter was open and an e-mail active. And then spam will come 3 times more.
  • Do not follow the links in spammers. If a letter came to you from an unknown address and you have already opened it, then at least do not follow the links. You can or catch the virus on a computer or get to the fraudulent site.
  • Make 2-3 mailboxes. At least two is one for workers and personal contacts, and the second is to register on various sites, if there is such a need.
  • Choose longer and challenging addresses for your postal boxes - attackers will be difficult to pick up to stumble upon them with a random selection.
  • Suspicious and obviously skid letters mark both spam and send to the appropriate folder in their email service or client. After that, the mailing of this additive will be in spam always.

What should I do not get into spam?

Let us now expand the situation at 180 degrees and imagine that you are the owner of the business and you need to carry out mass distribution to promote your products or services. What to do to your letters not fall into spam?

  • You should not send newsletter users without their consent. The laws are currently such that you need to send letters to those users who expressed unequivocal agree to send them to sending them.
  • Before sending a newsletter to a large number of addresses, check your letters using special tools that define your letter to spam. For example, with the help of SPEED24.RU. This will help determine how to treat your spreadsheet of spam filters.
  • Do not send letters of the Namaum. Try to explore your audience (gender, age, interests) so that your newsletter is relevant for them. This will help to avoid (or at least reduce the number of complaints and sending your letters to spam.
  • Track out how your letters opens. The high openness of letters is a sign that your newsletters are interesting, which means that the percentage of letters delivered will be higher. Popular postal services have appropriate tools for this, for example, https://postmaster.mail.ru/
  • Do not make a mass newsletter too often, otherwise postal filters will consider all your letters spam.
  • Be sure to unsubscribe from the distribution of those users who abandoned it, as well as those who could not deliver and the mail server sent a delivery error.
  • If you send a newsletter through your own server - ask your administrator to configure the recovery in the DNS, as well as SPF, DKIM and DMARC.

What we do for customers in the Antispama Plan.

As a hosting provider, we cannot conduct too tough anti-spam default policies, because Different clients have different needs and it is impossible to predict them in advance.

However, we give the client tools with which he himself can customize the postal system as he wants: antispam filter Spamassassin. and gray lists mechanism ( Greylisting. ). With their help, customers can fully effectively protect their mailboxes from spam.

Conclusion

As you can see, spam is a rather serious problem that can either simply annoy, or cause really big trouble to users of the network. But we hope that now, knowing about spam anymore, you will understand how to treat one or another nature of spam and do not lose time or money.

Добавить комментарий