Spamming
By: Bred • Research Paper • 1,361 Words • April 24, 2010 • 1,056 Views
Spamming
thi sis file for the resserch for the my class
Spam can be defined by various type :- Unsolicited mass e-mail that is deceptive in its subject line and hides the sender or seeks to commit fraud
- Unsolicited mass e-mail even if it comes from legitimate or well-branded businesses
- Unsolicited mass e-mail on subjects or offers that interest them
In addition to wasting people’s time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.
Spamming is economically having normal growth and development because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.
How spammers operate :
For that purpose different techniques are there to operate spam ;
1)Gathering of addresses
2)Delivering spam messages
3)Using Webmail services
4)Using other people’s computers
5)Open relays
6)Open proxies
7)Spammer viruses
8 )Obfuscating message content
Spam can be defined by various type :- Unsolicited mass e-mail that is deceptive in its subject line and hides the sender or seeks to commit fraud
- Unsolicited mass e-mail even if it comes from legitimate or well-branded businesses
- Unsolicited mass e-mail on subjects or offers that interest them
In addition to wasting people’s time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.
Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.
Spamming is economically having normal growth and development because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.
How spammers operate :
For that purpose different techniques are there to operate spam ;
1)Gathering of addresses
2)Delivering spam messages
3)Using Webmail services
4)Using other people’s computers
5)Open relays
6)Open proxies
7)Spammer