Advertisement
Guest User

What can I do to avoid receiving spam email?

a guest
Nov 9th, 2016
884
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.82 KB | None | 0 0
  1. Spam has increasingly become a problem on the Internet. While every Internet user receives some spam, email addresses posted to websites or in newsgroups and chat rooms attract the most spam.
  2.  
  3. To reduce the amount of spam you receive:
  4.  
  5. Filter your email
  6. Don't reply to spam
  7. Be careful releasing your email address, and know how it will be used
  8. Use a secondary email account
  9. Be proactive
  10.  
  11. Filter your email
  12.  
  13. Indiana University uses enhanced email filtering services, which analyze all mail delivered to IU Exchange accounts. Any spam messages you receive are quarantined for five days in a Junk E-Mail (IU Exchange) folder in your account. After five days, the spam service deletes these messages automatically. For more, see At IU, what is the spam quarantine service?
  14.  
  15. Your email client or web-based email provider may have other methods for setting up email filtering. Many offer blacklisting, which prohibits mail sent from email addresses that you list. Even more restrictive is whitelisting, which blocks mail sent from anyone except those that are on the list.
  16.  
  17. Don't reply to spam
  18.  
  19. If you reply to spam, the spammer or the automated program on the other end will then know that your address is connected to a live person, and the spammer will then bombard you with even more spam, and circulate your address to other spammers. It is critical that you pause and think before replying to any spam. Consider the following guidelines:
  20.  
  21. Setting up your email account to generate automatic responses while you are away can have the unfortunate side-effect of verifying your email address to every spammer that sends you spam.
  22. If the message appears to come from a legitimate company, the company may have obtained your email address from some transaction between you and the company. In fact, you may have inadvertently provided your email address (e.g., if you didn't check a box marked Don't send me product updates). In these cases, it is usually safe to reply and ask to be removed from the mailing list.
  23. If it is not a company you recognize, use your judgment. To be safe, copy and paste the link to the company's site into the browser rather than clicking it in the email message.
  24. If you don't see a decent privacy policy listed on a company's site, UITS recommends that you do not reply or conduct any business with them.
  25. If the spam is clearly from a disreputable source, never respond. Do not follow the (probably bogus) unsubscribe directions. In most cases, if you never reply, the network of spammers will eventually decide your email address is a dud, and will stop using it as often.
  26.  
  27. Be careful releasing your email address, and know how it will be used
  28.  
  29. Every time you communicate on the Internet or browse a website, there are opportunities for spammers to intercept your communications to obtain your email address and other personal information.
  30.  
  31. Otherwise reputable companies may sell or exchange your email address with other companies, and this information may eventually find its way to a spammer. At worst, spammers will use automated programs to bombard these lists of email addresses with spam. Consider the following guidelines:
  32.  
  33. Subscribe only to essential discussion lists, and ensure that they are moderated.
  34. Think twice before offering your email address to a website. You may wish to check the site's privacy policy first to be sure it uses secure technology, and that the company does not share your email address with others.
  35. If you need to list email addresses on your website, present the addresses in a way that makes them less vulnerable to collection and abuse by spammers.
  36. Every time you are asked for your email address verbally or on paper, think carefully about whether or not you want to receive any information from that company or organization. It is usually best to decline to provide your email address.
  37. Whenever possible, advocate that organizations you are involved in or do business with default to the opt-in model. This requires you to specifically request to be added to their email lists, rather than the opt-out model, where they add you to email lists automatically, and then give you the option of asking to be removed.
  38.  
  39. Use a secondary email account
  40.  
  41. If you have your email address listed on a web page, you should also consider opening a free account. If the website listing your contact information is for Indiana University business, you could get a departmental account and list that address rather than your personal address. For information, see Requesting IU computing accounts for groups or departments.
  42.  
  43. You should also consider opening a free account for performing potentially spam-inducing activities such as posting to Usenet newsgroups, bulletin boards, or unmoderated mailing lists, spending time in chat rooms, or using an online service that displays your address.
  44.  
  45. You should also consider using a disposable email address service such as spamex or mailshell. For a fee, these services allow you to create a new disposable email address discreetly linked to your real address whenever you need to supply one. If spam starts coming to one of the disposable addresses, you can simply turn the address off. Because you can give out a different disposable address on every occasion, you can easily determine who supplied your address to spammers.
  46.  
  47. Be proactive
  48.  
  49. Adjusting the security settings in your web browser is a good preventive measure. For a higher level of security, have your browser disallow:
  50.  
  51. Accepting cookies
  52. Listing your name and other personal information in your browser profile
  53. Filling in form fields for you
  54.  
  55. This will help reduce the amount of personal information transmitted to sites at the expense of full functionality, since many legitimate websites require you to accept cookies.
  56.  
  57. Do not contribute to the spam problem by producing any of it yourself! In particular, learn about chain mail and do not forward chain mail jacob.xtrememedia@gmail.com to others. Also, if you receive an email message that appears to warn of some horrible thing happening (a virus that reportedly deletes all your files, for example) or is a touching sob story (about helping to save a poor sick girl or boy, for example), be suspicious.
  58.  
  59. Nearly every instance of chain mail is a hoax. The message may even come from someone you know and respect who is simply not aware that it's a hoax. Learn about hoaxes and the sites available to verify hoaxes, and do not forward them to others. For more, see How can I tell if a computer virus alert is a hoax?
  60. Additional resources
  61.  
  62. For information about what IU does to help reduce the amount of spam received, see What does IU do to protect users from spam and virus-infected email?
  63.  
  64. The Federal Trade Commission has conducted extensive studies regarding spam. You can access information regarding these studies at ftc.gov.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement