What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,

Slides:



Advertisements
Similar presentations
1 Kentuckys Public Safety Awareness Initiative Program KWIEC Listserv February 13, 2006.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Basic Communication on the Internet:
AND SPAM ITEC 317 AVA BOLOURI SPAMS.
Anonymity and SPAM The Good, the Bad and the Ugly!
XP New Perspectives on the Internet, 4e Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists and Newsgroups.
Department of Information Technology Prepared by: Ms Melinda Chung Chapter 10: Mass Communication on the Internet.
Mass Communication on the Internet
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Spyware and Spamware By Melissa Borri. Spamware… Spamware is unsolicited bulk that is designed to disguise the origin of any bulk it sends.
The University of Hull Centre For Internet Computing Spam ‘n’ chips A discussion of internet crime Angus M. Marshall BSc CEng MBCS FRSA.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Spam Sonia Jahid University of Illinois Fall 2007.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Museum Entrance Welcome to the Lobby Online Safety Safety Blogging Safety Website Safety Internet Safety Museum Octavia Holley Artifact 1.
Computers Are Your Future Tenth Edition Chapter 2: The Internet & the World Wide Web Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
7 1 ADVANCED Using Mailing Lists and Exploring Wireless Options New Perspectives on THE INTERNET.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Area Of Study 2 Information And Communications Technology(ICT)
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Computer-Assisted Communication
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Mailing Lists Tutorial.
USENET Conceptually like reading magazines USENET hosts –Like bookstores Each host has many Newsgroups on specific topics You can read postings to these.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Introduction to Internet Communications Pn. Jamilah Binti Yusof.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
What are mailing lists? A list of names and addresses for a group of people who share a common interest. Messages are automatically forwarded to.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Newsgroups Tutorial.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Electronic Communication Presentation. Attachments Files you attach and send with an message.
HTTP :// LISTS. SUNGARDHE. COM Contact Vincent Small at Taylor University for any questions regarding this brief outline of joining.
Listservs What are they?. Listservs-What are they for? Provide a convenient, fast way to communicate with the class. Give students a sense of publishing.
Chapter 3.  Help you understand and compare different types of facilities found in: ◦ Fax ◦ ◦ Bulletin (Discussion Boards) ◦ Video Conferencing.
BEING SAFE ON THE INTERNET. WHAT TO KEEP SAFE ON It’s very important to keep safe on things like Instagram, Snapchat, Facebook, Xbox live and many more.
Security fundamentals Topic 9 Securing internet messaging.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
 (electronic mail) is the transmission of e  addresses are unique and consist of two parts separated by (‘at’) symbol in the form.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Internet and Communication Basics. Background of the Internet Early origin in 1960s Closely tied to a networking project started by a governmental division.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
TYPES OF INTERNET SERVICES.  WWW—World Wide Web Go to Wikipedia and Describe it  This website gives an overview of the history and uses of the World.
Developing a Basic Web Site HTML Tutorial 2. Objectives Define links and how to use them. Create element ids to mark specific locations within a document.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Objectives.  is short for electronic mail.  It allows you to quickly send a message to anyone else in the world as long as they have their.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
User-Generated Content on the Internet
An Overview.
CNIT 131 HTML5 – Anchor/Link.
ONE® Mail Training Presentation
EDUCATION ON THE INTERNET
Presentation transcript:

What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich- quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

w There are two main types of spam, and they have different effects on Internet users. cancelable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.

w spam targets individual users with direct mail messages. spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. spams typically cost users money out-of- pocket to receive. Many people - anyone with measured phone service - read or receive their mail while the meter is running, so to speak. Spam costs them additional money. On top of that, it costs money for ISPs and online services to transmit spam, and these costs are transmitted directly to subscribers.

w One particularly nasty variant of spam is sending spam to mailing lists (public or private discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.