SlideShare une entreprise Scribd logo
1  sur  17
Spam   is the practice of sending unwanted, unsolicited
emails to a large number of people.


Spam  is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.


Or   -
•Emails     you did not ask for that were
•sent     in bulk
•from     senders you do not know


Above points are suspicious of being spam.
   Spammers manipulate search engines results in
    order to target users. Motive can be:
     Commercial
     Political
     Religious

 Approximately 10-15% of web pages are spam
 Most spam promotes get-rich-quick schemes,
  questionable products, fraudulent offers, or pseudo-
  legal services.
Spam is of two types-
A)Cancelable Usenet
B)Email spam-
o Harvested Address Spam

o Virus Spam

o Domain Name Spam

o Dictionary Spam

o Windows Messenger Spam

o Hacked Mail Service Spam

o Hoax Spam
It refers to spam email in which a single message is sent
to 2 or more Usenet groups.

      This type of spam is directed as “lurkers”, or individuals
who read newsgroups but who either do not or infrequently
post or give their email addresses away.

     Cancelable Usenet spam reduces the utility of
newsgroups by forcing through advertising, and as such
decreases the ability of administrators and managers of
newsgroups to manage accepted topics. This spam is run at a
low cost to those sending out spam.
It refers to spam email that is directed at individual users
with direct addresses.

      Email spam lists are usually created by scanning Usenet
postings, sterling Internet mailing lists or searching the Web
for addresses.

       A variant of this form of spam is sent directly to mailing
lists and email discussions that are used by public and private
forums. Email spam costs individuals submitting spam email
money; for example, ISPs and online services need to pay to
transmit spam directly to subscribers.
   The spammers use a computer system (spider or
    spam-bot').

   The 'spam bot' looks for the '@' symbol.

   Collects the bit either side of the '@' symbol to
    capture your email address and add it to the
    spammers database of millions of harvested
    addresses
   Someone else's computer (not yours) gets infected with a
    virus.
   The address book on their computer has your email address.
   The virus sends a spam to every address on the address
    book.
   The virus 'spoofs' the 'from address' in the email it sends i.e.
    the spam does not appear to have come from the senders
    email address, instead it says it came from another address
    taken from the address book.
   This is why you might receive emails from people saying you
    sent a virus to them, when you know your computer is clean
You can sometimes receive dictionary spam
when you use a well known email service.

        The spammers know that there is going to
be a janesmith@bigmail.xyz.

      They setup computers to spam billions of
names at that mail service simply by targeting every
persons name.
Some ISPs or webmail services may be
hacked by spammers or the addresses may be sold
to spammers.

       Read the small print when signing up for an
email account. Look hard for that box that says 'we
might give your address to a 3rd party, tick here if
you do not want to receive marketing info from
other companies...'.
      These are messages that innocent people may
    forward to you with some kind of hoax warning or way to
    make a fortune.


      Never respond to or forward this kind of message.
    They are hoaxes, see real example below. If you 'CC'
    (copy in) your friends and contacts you may be
    providing a way for spammers to harvest the email
    addresses of your friends/contacts. These rubbish
    emails sometimes end with something like: "Try it; What
    have you got to lose?"

   What you have to lose is your privacy and credibility!
   The following keywords can be used to identify web
    spammers in this industry. (23 April 2008 results)
a)Use a separate email address.

b)Consider acquiring multiple email addresses for
   different purposes.

c)You can subscribe to services online that provide
   you with disposable addresses.
•   http://email.about.com/library/weekly/aa072002a.htm
•   http://sneakemail.com
•
d)Remove your email address from your website.

e)Never buy anything from a company that spam-
over 95% of spam offers are scams!


f)Filter your email-
For more anti-spam filtering information, visit:
   http://email.about.com/cs/spamfiltering/
   http://email.about.com/library/howto/htnegativespamfilter.htm


g)Consider subscribing to a spam prevention service.
Web spam
Web spam

Contenu connexe

Tendances (6)

3 pervasive phishing scams
3 pervasive phishing scams3 pervasive phishing scams
3 pervasive phishing scams
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Survey on Password Security 2019
Survey on Password Security 2019Survey on Password Security 2019
Survey on Password Security 2019
 
Avoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax SeasonAvoiding IRS Scams during Tax Season
Avoiding IRS Scams during Tax Season
 

Similaire à Web spam

Final paper
Final paperFinal paper
Final paper
JDonpfd3
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
Chinmayee Behera
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
siewying
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
AbdulHaseebKhan34
 

Similaire à Web spam (20)

Final paper
Final paperFinal paper
Final paper
 
Spam!
Spam!Spam!
Spam!
 
Spam
SpamSpam
Spam
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Spam and hackers
Spam and hackersSpam and hackers
Spam and hackers
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 

Dernier

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Web spam

  • 1.
  • 2. Spam is the practice of sending unwanted, unsolicited emails to a large number of people. Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Or - •Emails you did not ask for that were •sent in bulk •from senders you do not know Above points are suspicious of being spam.
  • 3. Spammers manipulate search engines results in order to target users. Motive can be:  Commercial  Political  Religious  Approximately 10-15% of web pages are spam  Most spam promotes get-rich-quick schemes, questionable products, fraudulent offers, or pseudo- legal services.
  • 4. Spam is of two types- A)Cancelable Usenet B)Email spam- o Harvested Address Spam o Virus Spam o Domain Name Spam o Dictionary Spam o Windows Messenger Spam o Hacked Mail Service Spam o Hoax Spam
  • 5. It refers to spam email in which a single message is sent to 2 or more Usenet groups. This type of spam is directed as “lurkers”, or individuals who read newsgroups but who either do not or infrequently post or give their email addresses away. Cancelable Usenet spam reduces the utility of newsgroups by forcing through advertising, and as such decreases the ability of administrators and managers of newsgroups to manage accepted topics. This spam is run at a low cost to those sending out spam.
  • 6. It refers to spam email that is directed at individual users with direct addresses. Email spam lists are usually created by scanning Usenet postings, sterling Internet mailing lists or searching the Web for addresses. A variant of this form of spam is sent directly to mailing lists and email discussions that are used by public and private forums. Email spam costs individuals submitting spam email money; for example, ISPs and online services need to pay to transmit spam directly to subscribers.
  • 7. The spammers use a computer system (spider or spam-bot').  The 'spam bot' looks for the '@' symbol.  Collects the bit either side of the '@' symbol to capture your email address and add it to the spammers database of millions of harvested addresses
  • 8. Someone else's computer (not yours) gets infected with a virus.  The address book on their computer has your email address.  The virus sends a spam to every address on the address book.  The virus 'spoofs' the 'from address' in the email it sends i.e. the spam does not appear to have come from the senders email address, instead it says it came from another address taken from the address book.  This is why you might receive emails from people saying you sent a virus to them, when you know your computer is clean
  • 9. You can sometimes receive dictionary spam when you use a well known email service. The spammers know that there is going to be a janesmith@bigmail.xyz. They setup computers to spam billions of names at that mail service simply by targeting every persons name.
  • 10. Some ISPs or webmail services may be hacked by spammers or the addresses may be sold to spammers. Read the small print when signing up for an email account. Look hard for that box that says 'we might give your address to a 3rd party, tick here if you do not want to receive marketing info from other companies...'.
  • 11.
  • 12. These are messages that innocent people may forward to you with some kind of hoax warning or way to make a fortune.  Never respond to or forward this kind of message. They are hoaxes, see real example below. If you 'CC' (copy in) your friends and contacts you may be providing a way for spammers to harvest the email addresses of your friends/contacts. These rubbish emails sometimes end with something like: "Try it; What have you got to lose?"  What you have to lose is your privacy and credibility!
  • 13. The following keywords can be used to identify web spammers in this industry. (23 April 2008 results)
  • 14. a)Use a separate email address. b)Consider acquiring multiple email addresses for different purposes. c)You can subscribe to services online that provide you with disposable addresses. • http://email.about.com/library/weekly/aa072002a.htm • http://sneakemail.com •
  • 15. d)Remove your email address from your website. e)Never buy anything from a company that spam- over 95% of spam offers are scams! f)Filter your email- For more anti-spam filtering information, visit: http://email.about.com/cs/spamfiltering/ http://email.about.com/library/howto/htnegativespamfilter.htm g)Consider subscribing to a spam prevention service.