By Hina Patel TCM 471 Introduction SPAM? Solicited email Unsolicited email How spammer gets the email address Prevention from spam Conclusion.

Slides:



Advertisements
Similar presentations
Information and resources
Advertisements

Basic Communication on the Internet:
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Surrey Public Library Electronic Classrooms Essentials.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Assisted Communication. Terms Asynchronous Blog Bulletin Board – Discussion Board Chat Chat Room.
Bartology, Inc. “We’re Cool. We can make you cool too.”
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Promoting Your Business Online Chris Wellings
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
I NDIANA U NIVERSITY C A N N I N G S P A M A T Copyright Notice Copyright Merri Beth Lavagnino, Marsha Waren, and Rick Jackson, This work is the.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
CREATING AN ADDRESS (And then using it!). Open the Internet.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Tutorial 2: Basic Communication on the Internet: .
INTERNET SAFETY. There are basically two dangers associated with visiting WEB SITES! You may come across material that is sexual, hateful, violent, or.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Area 05 Training Session Oostkamp, 30 augustus 2014 Liesbet Van Landegem Electronic communications.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
1 1 Best Practices for End Users Anti-Spam Research Group IETF 56 - San Francisco March 20, 2003 John Morris ftp://67.cdt.org/pub/ietf56-asrg-spamreport.ppt.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Etiquette. Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
How to keep unwanted and spam away. References us/windows-vista/block-spam-and-other- unwanted-
How to use the MEL Yahoo system Click for next page To post a message to everyone, just send an (your regular way) to
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Arizona’s Fly Fishing Portal
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Information Security Session October 24, 2005
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
How to manage your s Tips and tricks.
Bell Ringer How can you protect your self online?
How to manage your s Tips and tricks.
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Tips to Stop Spam in Gmail Account |Gmail Customer Helpline Number
Presentation transcript:

By Hina Patel TCM 471

Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion

SPAM - Un solicited - 38% traffic is spam - $400 per box per year - 15 minutes

Solicited - Voluntary - Commercial message, newsletter

Unsolicited - Commonly known spam - message or posting ( have not requested)

How spammer gets address Preexisting software collector program (web page, business site, directory of public domain information) News groups Other firms

Prevention from spam - Don’t Publish on web - Be conservative who you give information - Do Not reply spam s - Use second address in newsgroups - Use spam filter - Never buy anything advertised in spam

Conclusion - Freedom of speech - Ignore spamed - Never respond Unsolicited - Delete junk same as trashing junk post