“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer.

Slides:



Advertisements
Similar presentations
GAELIC SUMMER CAMP ETIQUETTE University of the Witwatersrand Simon Mofokeng.
Advertisements

Advertising Project ADV 3008 – CRN: Summer B
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Netiquette Rules.
Over 60% of the U.S. population is online with over 170 million users in the United States! The Internet is viewed more than the newspaper industry and.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Gmail Tutorial This tutorial aims to quickly cover some of the basic elements of web based using Gmail - a free service Use the Index on the.
August 15 click! 1 Basics Kitsap Regional Library.
- Part 2 Your teachers are :. Review 1.Did you do your homework? Was it difficult, easy, or just right? 2.Turn to your partner and tell them your.
HOW TO MAKE AN ACCOUNT. By Billy Stonebridge.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
Size and Cost of the Problem Steve Atkins SpamCon Foundation Word to the Wise.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
BILLBOARD MAIL A Patented Direct Mail Piece. Advertisers purchase space on an envelope using it as their Billboard which subsidized the stamps cost. Billboard.
AND SPAM BY OLUWATOBI BAKARE
“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Internet Advertising © 2001 Ann Schlosser, University of Washington Business School.
Could You Use More Traffic?. If you’re like most marketers, the answer to this question is… YES!
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Marketing --one of the most powerful ways to generate leads for a product/service Know the strengths of mktg compared to other ways of reaching.
© 2003 Everett Public Schools Information Systems and Technology Department Getting Started with FirstClass October 10, 2015.
Group 6 Nguyen Lam Thanh Truc - MA2N0229 Tran Le Yen Ha – MA2N0235.
Question # 1 For $100 15$1,000,000 14$500,000 13$250,000 12$125,000 11$64,000 10$32,000 9$16,000 8$8,000 7$4,000 6$2,000 5$1,000 4$500 3$300 2$200 1$100.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
The Radicati Group, Inc. The Real Cost The Real Cost of Spam Masha Khmartseva Senior Analyst The Radicati Group, Inc.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
2015 User Conference Portal Marketing April 24, 2015 April 25, 2015 Presented by: Jeannine Becker Facility Training Coordinator Andrew Hiban Marketing.
v=anwy2MPT5RE By Levi Nichols.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
IP Message Systems By: Michelle Gromala BMA 373 February 20, 2002.
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
Egypt -Saudi Arabia - Kuwait 1 Express Arab Overview
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
March 28, 2006 Phone V 0.93 A Pure Economic Response to Irrelevant Contact Provable Relationships and Personal Interrupt.
The problem of spam from IPv6. Modern filters.
Social Internet Marketing Introduction October 2009 Deb Durkey Social Internet Expertise.
+ “Introduction to Blogging” Katelyn Jacobsen By WordPress.org.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
An objective Cashcrate Review. Can I make money with Cashcrate?
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
I love # . Marketing in 10 minutes WHY? BUILD TARGET TRACK MEASURE.
Q-Man v2 By Harrison Ashrafuz Phong Olid. Introduction Going to some offices and having to queue for a very long time to get any desired service can be.
By: Jack P Mchugh Presented by: Kiel Brown. Spam Unsolicited , often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals,
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Create E-Marketing for Your Customers Jacque Etherton Marketing Coordinator.
1 After completing this lesson, you will be able to: Create and edit hyperlinks in worksheets. Save worksheets and workbooks as Web pages. Send workbooks.
Computer Skills (1) .
& Google Gmail.
Computer Skills (1) .
South Lewis Faculty Meetings
Internet Insecurity The was founded as a tool based on trust
How to manage your s Tips and tricks.
How To Share Calendar in Outlook?. If you are planning to share Outlook calendar with others through Outlook Online with people in your organization,
Instant Solution for Yahoo Mail Account Issues through Yahoo Customer Support.
Internet Safety – Social Media
s.
How to manage your s Tips and tricks.
Communicating in the IT Industry
How to manage your s Tips and tricks.
Presentation transcript:

“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer

Overview Why stop spam mail? Attempts to stop spam Why an anti-spam list does not work What are our options? Spam control plan The final result

Why Stop Spam? Spam mailing grows by 50 % per month Lost productivity  about $10 billion a year To delete one spam mail costs a company between 70 cents and one dollar in lost productivity Threat to general usefulness of Annoying

Attempts to Stop Spam Require spam mailers by law to insert “ADV” as the first three characters in the subject line. (ADV  Advertisement) Create national “do not spam” list. Citizens can register on list and spammers who send mails anyways can be targeted and penalized.

Why a list does not work “Do not spam” list maintenance is expensive Many laws but only few successful persecutions Spammers could use list to send out more s Heavy government intervention is going to stunt growth of internet.

What are our options? Do not wait for government intervention Make sure spam mail contains “ADV” in subject line Keep in mind that spam mail success depends on cooperation of the internet users  Easier to solve problem ourselves

Spam Control Plan Make sure “ADV” are first three letters in subject line Do not cooperate with e-marketer unless “ADV” is in subject line Tell all your friends and colleagues to adopt the “ADV” convention Hundreds of users demanding the “ADV” could easily snowball into thousands and then millions.

The Result Tipping point arrives where it becomes impossible for any product or service to be e-marketed without the “ADV” Business networks and Internet Service Providers could easily sort out spam mails Spam mail can now be easily identified, and if desired ignored

In Conclusion... WE can stop spam mail “ADV” -Cost saving alternative “ADV” -Effective method “ADV” -Beneficial to everyone

Comments/ Questions?