Over the past few years you've all become familiar with the terms spam, spam filter, whitelists, blacklists and a whole myriad of other terminology associated with the problem of spam. You now have to add a new and extremely worrying phrase to that list - spam zombie.
With the net closing in around them spammers are looking for new and more inventive ways to send out their junk email. Spam filters and challenge response systems are becoming progressively more intelligent and blocking more spam each day. What was a spammer to do? The spammers took the next step - infiltrating your PC and using it as a spamming tool.
When most of you think of the word zombie you're reminded of old B movies with groaning zombies chasing the terrified actress through a castle, swamp or whatever low cost setting the movie revolved around. Spam zombies are, however, far more real and far more dangerous.
A spam zombie is when your computer is taken over by a type of virus called a Trojan. Once this Trojan virus is on your computer it sets up an SMTP (Simple Mail Transfer Protocol) application which allows it to begin sending email directly from your PC to tens of thousands of victims. This all happens invisibly in the background and can be difficult to detect for even the experienced computer user.
How do these Trojans get onto your computer? As in most cases they come from porn, warez or similar sites. One of the first spam zombie trojans to appear became available via a link on sites promising viewers free access to a porno webcam. One click later and the Trojan is installed on your computer ready to send out spam. Phatbot and Proxy-Guzu are two of the more common Trojans used for the purpose of turning your computer into a spam zombie.
How can you check if your computer has become a spam zombie? Make absolutely certain that both your anti-virus and firewall software have current detection signatures and have been completely patched and updated. Working online without taking these necessary security precautions is simply asking for trouble.
Internet Service Providers are under huge pressure to quarantine the IP address of any computer which has been turned into a spam zombie. This is done on the basis that the ISP risks their entire IP range being blacklisted or banned by some spam filtering services or companies.
The very least you owe yourself is to run a full virus and spyware scan on your computer today. You might be unpleasantly surprised at what you'll find lurking there.
This article provided courtesy of Spam-site.com which reviews spam blocker software and other anti spam utilties.
limousine Ackley .. Lockport Chicago limo O’HareSpam is annoying. Period. Why people would want to send... Read More
Spam can bring down your website faster than a speeding... Read More
2004 was really a year when the whole subject of... Read More
Spam filter is the solution that most people resort when... Read More
One of our Australian clients sent out a campaign using... Read More
Most of us have opened our email program and found,... Read More
Below is a letter I wrote to the following organizations:S.H.U.... Read More
Effectively stopping spam over the long-term requires much more than... Read More
Did you know that there are software programs that view... Read More
Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More
You all tear your hair out in frustration every time... Read More
While we all admit that unsolicited commercial email is a... Read More
No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More
Stop intrusive pop-up ads and regain control of your online... Read More
They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More
There are hundreds of thousands of people who are trying... Read More
Effectively stopping spam over the long-term requires much more than... Read More
For years I didn't worry much about spam.But lately it's... Read More
My friends in the web hosting business have recently informed... Read More
Phishing is rapidly becoming on the largest threats to your... Read More
The lifeblood of the spammer is email. They need to... Read More
Spam, as defined in the context of computers, the Internet... Read More
News last week that Internet service provider Verizon settled its... Read More
How would you feel if you found a link on... Read More
A blacklist, as the name implies, is a list of... Read More
shuttle from O'Hare Alexander ..Each day we all face the same challenge. Spam. It... Read More
RSS is the answer to the Spam epidemic of the... Read More
Q: I am so sick of all the spam that... Read More
If you are buried in SPAM then you're not alone.... Read More
You must be one of them experiencing a lot of... Read More
Effectively stopping spam over the long-term requires much more than... Read More
Spam filters are responsible for deleting a high percentage of... Read More
In 1998, nearly 10% of all email traffic on the... Read More
A friend asked me: I don't get it. Why do... Read More
I'm sure I'm not the only person on the planet... Read More
2004 was really a year when the whole subject of... Read More
Spammers get email addresses from web pages using programs called... Read More
6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More
You may have already received a do not spam list... Read More
A hearty welcome to all the spam fighting filters and... Read More
Am I Just Being Paranoid Or Are The Robots Out... Read More
What is spam ? ... Read More
Spam is annoying. Period. Why people would want to send... Read More
Before we start getting deep into the meat of this... Read More
While the Federal Trade Commission is busy fighting over definitions... Read More
While we all admit that unsolicited commercial email is a... Read More
I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More
Email is rapidly becoming the standard means of communication among... Read More
We all hate spam and get way too much of... Read More
Very often SPAMMERS take advantage of catch-all email setup on... Read More
Spam Blocking |