Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your e-mail address ► Preventing Spam ► Possible.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Basic Web Design UVICELL Week 5 Choosing a Domain Name, Hosting and Marketing Your Web Site Week 5 Choosing a Domain Name, Hosting and Marketing Your Web.
Threats To A Computer Network
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
Spyware and Spamware By Melissa Borri. Spamware… Spamware is unsolicited bulk that is designed to disguise the origin of any bulk it sends.
SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Fighting Spam Randy Appleton Northern Michigan University
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Spam Sonia Jahid University of Illinois Fall 2007.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
AND SPAM BY OLUWATOBI BAKARE
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Social impacts of the use of it By: Mohamed Abdalla.
All About Creating a Website. How the SIR Websites are Built. SIR Branch 116 Phil Goff July 21, 2011.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Unit 9 Communication Services
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Staying Safe Online Keep your Information Secure.
CCT356: Online Advertising and Marketing Class 2: Marketing/Online Advertising.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Internet Research Practice and Experience Ravi Iyer.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Santa’s s By Becky.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Unit 10 Communication Services
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Creativematch eCRM Creativematch has launched a new eCRM platform providing access to an marketing suite from your own desktop. Our eCRM platform.
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
Welcome to Using How to use Gmail, it’s free!
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
Unit 3 Section 6.4: Internet Security
How do Web Applications Work?
Learn how to protect yourself against common attacks
Unit 4 IT Security.
INTERNET.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
How to manage your s Tips and tricks.
How to manage your s Tips and tricks.
Presentation transcript:

Spam By Dan Sterrett

Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible solutions

What is Spam? ► Unsolicited commercial ► Sent in bulk ► Advertisements (weight loss, prescription drugs, etc)

Problem with spam ► Annoying ► Time consuming  You could have a hundred spam messages for each legitimate message ► Spam filters aren’t perfect ► More internet traffic ► Cheap for the spammer

Example Subject: Adobe Suppose we tell you that you could really lose up to 82% of your unwanted body fat and keep it off in just a few months, would you be interested? We certainly hope so! Please visit our web site - Click here!

Spam Stats ► In a single day in May 2003:  AOL blocked 2 billion spam messages  MSN blocked 2.4 billion spam messages

Where do they get my address? ► Spambots  Search engines that spider the web looking for the sign. ► Newsgroups and chat rooms  Especially in big companies like AOL, people often use their screen names in chat rooms  In newsgroups people leave their actual addresses  Spammers have pieces of software that automatically extract these screen names and addresses

Where do they get my address? ► Websites created specifically to attract addresses Win $1 million!!! Just type your address here!"

Where do they get my address? ► Websites sell your address  Created "opt-in" lists by asking, "Would you like to receive newsletters from our partners?"

Where do they get my address? ► "dictionary" search of the servers of large hosting companies like MSN, AOL or Hotmail  Software opens a connection with the server and sends millions of random addresses and records which ones are “live” ► Spammers sell your address to other spammers

Where do they get my address? ► Spammers buy addresses  Google add

Preventing Spam ► Spam filtering software  Simplest filters use keywords in the subject line to identify spam  Looks for words such as sex, viagra, etc.  Spammers change the spelling ► s-e-x ► Via9ra  Hard for filtering software to keep up  Sometimes blocks legitimate

Spam Filters ► Heuristic filters  Scan message statistically looking at word patterns and word frequency.  Spammers use shorter messages

Prevention ► Large ISPs tried blocking multiple s with the same subject line or message body ► Unwanted side-effect  blocked newsletters  ISPs made "white lists" to identify legitimate newsletter senders.  Then spammers sidestepped the issue by inserting different random characters into each subject line and message body.

Prevention ► You could get an with a subject line  Women Wanted puklq  The letters “puklq” are random and are attached at the end of the subject line for each sent out. ► Organizations that list IP addresses used by spammers (Spamhaus.org is an example) ► Companies that host accounts can check the source IP address

Prevention ► Spammers can get around this by changing IP addresses often  The next person to receive one of these IP addresses won’t be able to send . ► Zombie machines  Viruses can be sent out to recruit “zombie machines”  Usually personal computers of unsuspecting people. Spammers route spam through these machines.  Have been used for DoS attacks on places like Spamhaus.org

Prevention ► Hide addresses on websites  Use javascript, etc.  Simple spambots won’t recognize it

Possible Solutions ► “Do Not Spam List”  Not a good idea ► Online forms  Use instead of  Drawbacks ► Need your own website ► Time consuming to send a message

Sources ► tm ► html html html ► 63.php