Spam

From WOT Wiki
Revision as of 08:49, 17 September 2009 by Delan Azabani (talk | contribs) (corrected bullets by removing leading spaces which caused it to invoke a <pre> block rather than a list)
Jump to: navigation, search

What is spam?

Spam is the electronic version of "junk mail," unsolicited e-mail that advertises a service or product and may contain malicious or unwanted software.


Where does spam come from?

Most spammers use spam to advertise, some use it to distribute viruses, trojans and worms while others simply use it to annoy. Email accounts are traditionally targeted most but recently spammers have become more innovative. Spam can now be found on blogs; instant messaging; social networking sites, such as MySpace and FaceBook; and even mobile phones.


How does spam affect my computer?

While spam may not necessarily contain viruses or malware, it is a nuisance and results in loss of productivity when you are forced to sift through unwanted messages every day. For large organizations it can mean loaded email servers that threaten the health and operation of their IT systems. In extreme cases, spammers have secretly commandeered computers with malware to act as an email server, which is then used to forward spam messages to other email recipients.


How do I protect myself from spam?

Spam is a common, and frustrating, side effect to having an email account. Although you will probably not be able to eliminate it, there are ways to reduce it. One way is through filtering spam using approved sender lists. For example, you can set Hotmail to deliver only messages from your contacts while the rest is sent to the junk folder. Other e-mail programs let you do the same thing through a filter rule. Remember to scan your junk folder occasionally.


Can any form of spam be distributed from my computer without my consent?

Yes, botnets are a type of potentially unwanted programs that may be installed without your knowledge and may use your computer as a zombie computer to distribute spam. The originator of the botnet software can control and use them for other purposes. Botnets can be removed by running the latest anti-virus or anti-spyware software or blocked by using a firewall software.


How do botnets enter my computer without my consent?

Botnets can be installed by backdoors, drive-by-downloads, web exploits, worms, viruses and Trojan horses.


Help reduce irritating spam:

  • Look for a company's privacy policy before submitting an email address. Every reputable company will have a link to their privacy policy explaining what they intend to do with your information.
  • When you sign up for online accounts or services, make sure you deselect optional choices selected by default.
  • If you follow links or reply to spam messages, you are confirming that your email address is valid and will get even more junk mail, so avoid the temptation to click.
  • Sign up for a challenge/response spam service.
  • Open a second email address specifically for online shopping, chat rooms, signing up for services, etc. to protect your primary address from accumulating spam.
  • Look at the WOT scorecard before clicking to an unknown site. The ratings and user comments can help protect you from a bad experience.