Technology Computer & Networking security

How Webmasters Can Fight Spam

Because the central attraction of spam is the low cost to benefit ratio, making spam more expensive is the best way to fight spammers.
Spam is cost effective because automated spambots troll the Internet, harvesting email addresses.
These automated programs collect email addresses and compile them into large lists-lists that are both for direct marketing and resold for profit.
There are many small steps computer users can take to combat the problem of spam.
Ultimately though, it is the webmaster or internet provider who possesses the best tools to fight this scourge.
Using some of the same tools, webmasters and individual users can work together to reduce spam.
Step One: Disguise Spambots are limited by their programming, so taking steps to disguise a publicly visible email address will make most spambots pass you by.
Spambots look for character strings such as JohnDoe @ email.
com.
Simply adjusting your email address to JohnDoe-at-SPAMFREEemail.
com might be enough to fool most spambots.
While some spambots may be able to harvest your disguised email address, it will require extra work, or scrubbing, to make it usable.
Because there are so many possible variations (replace SPAMFREE in the above example with the word of your choice), scrubbing must be done by humans rather than by programs to be effective.
Webmasters can prevent spambots from harvesting email addresses by embedding them in graphics rather than in plain-text format.
Very few spambots possess the ability to read and translate a graphic into text; the program codes are simply not that sophisticated.
If you do disguise the emails on your website, don't forget to tell users to remind recipients to insert the @-sign and to delete the extra text before replying.
If you take the graphic route, users will have to work a little harder because copy, paste and reply-to will not work.
Some webmasters have chosen to eliminate visible email addresses completely.
They rely on feedback forms to reach users, whose contact information is stored in unsearchable areas of the website.
Others use javascript to encrypt the information; encoding is easy, cracking the code is virtually impossible for automated spambots.
Step Two: Build Walls Efforts to disguise email addresses can make communication difficult, and unfairly place the burden on users and webmasters rather than on spammers.
Webmasters can reverse this trend by working to block spambots entirely.
Most spambots can be easily spotted by their signature, IP address, or process name.
Webmasters can also find spambots by watching out for non-browser User-Agents.
By blocking unwanted IP addresses and processes, webmasters can block spambots.
To block unwanted processes, simply start a cron job that will scan for the process name and terminate the associated process ID.
Skilled webmasters can create a daemon that "sleeps" until a given process name is activated.
Once the process is activated, the daemon will wake up and kill the process before harvesting begins.
If you need help with this technique, sample programs can be found by searching the Internet.
Finally, there are programs available that can rig a spambot trap that will block incoming requests based on patterns of excessive searching.
Because this technique involves defining patterns and modifying them to handle a variety of spambots, it requires a more complex program code.
Searching the internet will give you some sample scripts to work from if you want to pursue this avenue.
The Bottom Line Always remember- spamming is a big business with large profit margins.
Spammers depend on soft targets to allow them to do their work cheaply and easily.
Every step you take to make your website a hard target increases the cost and effort necessary to obtain your information.
By reducing the rate of return for spammers, webmasters can help drive them out of business.
Legislative efforts to fight spam, constantly improving junk mail filters, and the imposition of penalties for sending spam have already begun to have an impact.
New proposals to fight spam are always being considered, measures that once implemented across a wide range of websites will make spam nothing more than a minor annoyance.
SHARE
RELATED POSTS on "Technology"
Use Online Backup to Keep Your Valuable Data Safe
Use Online Backup to Keep Your Valuable Data Safe
'Problem occurred while doing OST sync operation' Error and Recovery
'Problem occurred while doing OST sync operation' Error and Recovery
Data Recovery - Important Factors to Consider
Data Recovery - Important Factors to Consider
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Speed Up XP Software - Download Right Now!
Speed Up XP Software - Download Right Now!
The Right Time To Use A Registry Cleaner Windows XP Optimizer
The Right Time To Use A Registry Cleaner Windows XP Optimizer
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
How to Get Rid of Spyware on My Computer
How to Get Rid of Spyware on My Computer
How to Avoid a Malware Infection?
How to Avoid a Malware Infection?
Outstanding Registry Cleaner
Outstanding Registry Cleaner
Why You Should Be Using Vipre Internet Security?
Why You Should Be Using Vipre Internet Security?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
How to Remove Virus Protector Spyware Automatically-Manually
How to Remove Virus Protector Spyware Automatically-Manually
Data Recovery of IBM Drive
Data Recovery of IBM Drive
What Are the Best Registry Cleaners For Windows?
What Are the Best Registry Cleaners For Windows?
Protect Your Laptop and the Data It Holds
Protect Your Laptop and the Data It Holds

Leave Your Reply

*