SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam email is becoming a bigger issue in the computer world. How do we.

Slides:



Advertisements
Similar presentations
Small Business Resource Power Point Series Guide to Promotion Terminology.
Advertisements

Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Basic Communication on the Internet:
Track-able Bulk Management System. Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits.
Surrey Public Library Electronic Classrooms Essentials.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Fighting Spam Randy Appleton Northern Michigan University
3.06 Understand the use of direct marketing to attract attention and to build brand.
UNIFORM RESOURCE LOCATOR (URL)
3.06 Understand the use of direct marketing to attract attention and to build brand.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Lecturer: Ghadah Aldehim
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topic: Running a business online Name:
Yourcompany.mobi The New Future of Internet Business Advertising.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
3.06 Direct Marketing & Brand Building. Types of Marketing Announcements Announcements Newsletters Newsletters Suggestion selling Suggestion selling.
Job Search 101 Free Geek Instructor: Wayne Flower.
Mahkameh Yaghmaie Tannaz Alinaghi 9/19/ Hotmail.
Computer Ethics.
Introduction to Internet
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
The Internet The advantages and disadvantages. What are the advantages of the Internet as a source of information?  It can be accessed from anywhere.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Introduction To Internet
3.07 Develop Content to Generate Interest. Terms Blind Carbon Copy (BCC): keeps recipients from seeing who else is receiving the same ; used in.
Marketing --one of the most powerful ways to generate leads for a product/service Know the strengths of mktg compared to other ways of reaching.
Done by: Hanadi Muhsen1 Tutorial 1.  Learn the history of JavaScript  Create a script element  Write text to a Web page with JavaScript  Understand.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Presented by: Your Name Your Phone Number Your Website Address How a Mobile Website Can Help You Connect With Local Consumers.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Online Services. Advertising & Marketing Big supermarket companies use lots of different ways of “saving money!” Different ways includes Tesco’s Clubcard,
ONLINE SERVICES ADVERTISING. ONLINE ADVERTISING Search Engine Results Pages Companies register with large search engines so that their websites appear.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Prepared by: Ma. Anna Corina G. Kagaoan Assistant Professor College of Arts and Sciences 3 Things All Affiliate Marketers Need To Survive Online.
The Online World ONLINE ADVERTISING BTEC IC&T – LEVEL 2.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Presentation will begin shortly. (Please Stand By)
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
28th March 2003 SPAM Presenter: Matthew Sullivan.
How do Web Applications Work?
Learn how to protect yourself against common attacks
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
Unit# 5: Internet and Worldwide Web
Presentation transcript:

SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN

Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we keep away from receiving junk ?

Introduction

Junk mail, SPAM, bulk mail are other names of UCE, Unsolicited Commercial s.

Introduction A 2004 survey estimated that the lost productivity costs Internet users in the United Stated about $21.58 billion annually.

Background and History

Why people called junk mail as SPAM? In 1891, an American meat-packing company, Hormel Foods, was found by George Hormel in Minnesota. In 1937, the company was facing a huge crisis that was because they were over stock with meat and unable to sell it. A big amount of money had been “frozen” as well.

Background and History But then, George came up a solution to save his own company. His idea is to mix the meat with many kinds of spices and put them into the tin can. He named this kind of SPICED HAM as SPAM (in short form). As it was a brand new product to the market, the sale number was not very good at first.

Background and History So, the Hormel Foods Company tried to organize a massive advertising campaign. At the end, they succeeded.

Background and History As a result, later on, people call junk mail as SPAM because the word ”SPAM” had became associated with aggressive advertising in people memory. (Note: people also called other type of aggressive advertising like phone- marketing or mail advertisement as SPAM.)

Background and History

The first junk ing was on May 1st, 1978 by a DEC Company marketing employee to every Arpanet address on the West coast. In 1995, the first automatic bulk ing program came out. In response, the first junk filter was created in1999.

Why send junk mail?

Many SPAM contain web site link. By sending junk mail, the business web sites will able to have more potential customers to access which may lead to more business or scam victim.

How to prevent SPAM

Replace characters in the address with human readable-equivalent. For example, will become “abc at yahoo dot com” or “a.b.c.at.y.a.h.o.o.dot.c.o.m.”, etc. By doing this, the people who really want to contact you can still understand you, but the address harvesting software cannot.

Do You need this????

How to prevent SPAM We also can replace characters in the address with html-equivalent. For example, will become “abc@y&#097 ;hoo.c&#111 ;m ” Browser will still display the actual address But those software can only read that long string!!

How to prevent SPAM Spammer will also use “brute-force” and “dictionary” attacks to addresses e.g. etc. So, if your address is long and contains special characters, it is less likely to receive junk mail

How to prevent SPAM Use Software Junk mail filter SpamNet is over 98% successful rate Use Hardware Junk mail filter If a system Administrator put a hardware filter on the system, all the Users in the system can be benefited!!

How to prevent SPAM An Un-proved method: Put this link in your web site. This web page actually have many random generated addresses (which will be re-generated every time you go in) and have a link to the same page(an infinity loop). So as that is an infinity loop, the effectiveness of spamming of a spammer will be reduced. (His computer will keep running for hours for no-reason). So, in theory, the spammer will just skip your web site and search other sites when he found out.

How to prevent SPAM Also, many ISPs have junk mail filter, use them. Also, ISPs like Yahoo SBC will actually detect if their own customers send SPAM and they will void their massive outgoing SPAM.

How to prevent SPAM Many service Providers have junk mail filter, Join them. Also, we can use Disposable Address function. ---When we start receiving junk mail with certain DEA address, we can just delete that DEA address and lose the connection with the spammer

How to prevent SPAM Government Act. Under the new act, all legal SPAM must include a working return address, a valid postal address for the sending company, a working opt-out mechanism, and a relevant subject line.

How to prevent SPAM Also. if we receive any junk mail or possible scam, we can forward it to They will keep it in their data base.

Extra Junk mailers PAY about twenty cents an ounce. That means an eight pound package COSTS THEM about $25. And all of the proceeds go directly to the United States Postal Service (no more business as people use at all). Revenge!!

The End