Email was the killer app of the Internet, but now it seems to be
killing the bandwidth, thanks to spam. While its impossible to completely get
rid of spam, you can reduce it by following various measures. One is rules based
blocking, which is not sufficient because spammers will always find new ids,
subjects, and body text to send you spam. The next level is using anti-spam
software at the client as well as servers level. These tools use sophisticated
algorithms to filter spam, and also keep updating their filters with fresh
rules. You can also subscribe to DNS blacklists, such as mail-abuse.org and
spamhaus. org, which keep a list of known spamming domains. Even these measures
are not enough. To fight spam effectively, its also important to know how it
is generated and spreads. Plus, you also need proper anti-spam policies.
How Spam is Generated
It all starts when spammers manage to get hold of your email address. The
most common way is when you register with a website, perhaps to download
software or purchase a product. The website could belong to a spammer, or it
might be in the business of selling its mailing databases. Either way you figure
in the spammers list and start receiving unsolicited mail. Subscribing to
newsletters is another common cause of spam. You could do it unknowingly or
worse someone else subscribes you to mailing lists. In such a case, you could
either ignore the deluge of mail or check out the websites (if they have one) of
each newsletter for legitimacy. This is important because most spammers provide
an unsubscribe link in their email. If you try to unsubscribe from the link,
then the spammer gets a confirmation of your existence, and starts sending you
even more spam. So as a rule of thumb, dont fall for the
"unsubscribe" bit in spam mail.
Its also important to know about Web bugs. These are clear or
transparent graphic images, merely 1x1 pixel in size that can be placed in email
or Web pages. These are used to monitor the usage patterns of websites or email.
While the Web bug points to the website from where the image has to be
downloaded, it also sends information about the users machine to the website.
This information can be the IP address and the Web browser used of the machine.
Spammers can use Web bugs to confirm the presence of an email address so they
can continue spamming. Web bugs use cookies for sending back information, so
blocking cookies can stop Web bugs from sending your personal information.
Some Useful |
yMail : yMail is a stand-alone, portable email client with integrated spam-tackling capabilities good enough to make it one of the contenders in our shootout. The portable bit means that you can carry it around on a USB drive as it can be configured to store mail, contact information and the likes in the same folder as the program files. You can download this from www.spacejock.com/yMail.html SpamAware:
SPAMfighter
Mailwasher
Letterman |
Fighting Back
Spammers use clever techniques to avoid getting caught, such as IP spoofing,
using drop boxes and free email websites, finding open relay servers, and using
spamming tools. So you may not be able to find out who is spamming you, but you
can always find out enough to do something about it. Spam mail headers come to
the rescue as they can reveal useful information about the spammer. You can
reach the mail header by choosing the e-mails properties.
The mail header usually tells you the route that the mail has
followed to reach you. In this, look for the IP addresses or domain names in the
"Received" lines. There are two to three such lines that show which
ISPs have relayed the message. The first line will say "Received from
thats your own ISPs domain. The first will be the ISP who relayed this
message to you. Next look at the second "Received" line. This will
most likely be the ISP where the spam originated.
Once you know the ISPs who relayed spam to you, the next step is
to lodge a complaint with them about the spammer. You need to find out the ISPs
contact information like email ids and phone numbers. The most effective way of
doing so is by using tracing tools. These track the entire path used by an email
to get to your mailbox. They can also give complete information about all ISPs
found in this path. This information can include the ISPs complete name, whos
it registered to, phone and fax numbers and the contact email id. There are also
some free websites that can give you this information. Many ISPs provide a
separate email id that you can use to send them headers of all the spam mail youve
received through their servers.
While the process is simple, it may not be easy to execute,
simply because theres too much spam. Therefore, this process is better suited
for companies who can use dedicated staff for the job, rather than individuals
wasting time on it.
Also take measures to avoid getting unwanted subscribers. They
can send an email to new subscribers to check if theyve actually subscribed
or not. This mail should mention that only after the subscriber responds to the
mail would they continue sending newsletters in the future. Those who dont
respond would be removed from the list.
Anil Chopra
maildqindia@cybermedia.co.in