Spam - Is All of it Created Equally?
Even though e-mail has been one of the most common routes for virus infection for
the past 10 years many plenty of people are still opening attachments from people they don't now. Seconds later a virus is installed and then the trouble really begins.
If the infection that can come from some of these e-mails were to stop at your just your computer, the overall damage would be minimal but unfortunately many viruses are designed to spread over the Internet without any further action on your part and this can infect other computers, which is a much larger problem.
One of the most popular ways for Internet service providers or e-mail service providers to block certain messages is to tell the e-mail client which e-mails are spam and which are not. This is easy enough to do by clicking the "this is junk mail (or SPAM)" button on your e-mail client.
While this makes it easy for you to inform your ISP or ESP that an e-mail is spam, there also some disadvantages to this method. For example, many people use this method to try and unsubscribe from lists that they previously subscribed to. By tagging these e-mails as spam it unfairly tags the sender as a spammer, which is not accurate since you signed up for the e-mails to begin with.
It's easy to identify about 80% of the emails that come into our email boxes. We can easily identify which are SPAM and which are real. The problem is deciding about the remaining 20% of the e-mails. Whether these emails are wanted, or whether they represent spam, is a much more difficult proposition. You might not want a particular email message, but that hardly makes it spam. You may not want to receive political cartoons from your uncle, but receiving them hardly constitutes spam and reporting these e-mails as spam would be unfair.
You can use something called "authentication" which is really nothing more than getting someone to tag the message as being from a trusted or desired source. If you know the source is not going to spam you, you're much more likely to open the e-mail that you receive and much less likely therefore to get a virus or other infection. One method of authentication that you might have seen is 'sender ID'. This requires that every e-mail have a sender ID attached to it so you know immediately if an email comes from a trusted source or whether it does not.
Email postage is another method of authentication. You've probably responded to these e-mails in the past when you've signed up for an e-mail list or to receive e-mails from a particular website; once you do, you immediately receive an e-mail asking you to confirm before you're placed on their email list. This allows you to confirm that you did ask for e-mail from the site and that you will want and welcome the e-mail that you receive.
Some researchers have estimated that as many as 70% of the e-mails we receive are spam while others argue that it's less than 50%. Regardless of what the percentage is, the reality is that most of us receive a number of e-mails every day that we don't want, that are not desirable to us and that in some cases can be dangerous. Whatever method ends up being used most successfully in the future will hopefully be the one to decrease these unwanted e-mails.
If you're tired of wading through an inbox full of spam every day then maybe it's time to invest in a
spam blocker that works! You have no idea how many hours you're wasting deleting all that junk e-mail - discover how you can stop junk e-mail -
http://www.CPUSecurity.comSpam - Is All of it Created Equally?
By: rao
17 Highly-Guarded Strategies to Close Every Sale - Strategy 10 - Closing/Opening Words Safeguarding Tenants Against Nasty Falls How To Get Rid Of Antivir Solution Pro Quick And Easily How to Get Rid Of AntiVirus 7 - Get Malware Off Your PC now How to Uninstall/Remove a SpyDefender 2010 Completely - Perform a SpyDefender 2010 Removal How Do I Get Rid of the AWM Antivirus - Remove AWM Antivirus Completely! Remove the Green Shield Antivirus Completely - How to Perform a Green Shield Antivirus Removal Stop Snoring Mouth Guards - 6 Highly Recommended Models How to Remove Antivirus8? How To Remove Antivirus 7 The Spy Gps How to Remove Antivirus 8-Uninstall Antivirus8 Virus Easily Safeguard Your Upholstery From The Sun With Window Tints
www.yloan.com
guest:
register
|
login
|
search
IP(3.135.202.40) /
Processed in 0.008962 second(s), 7 queries
,
Gzip enabled
, discuz 5.5 through PHP 8.3.9 ,
debug code: 20 , 3936, 317,