Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore.
Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be.
One method used to combat spam is whitelisting. Whitelists are databases of trusted email sources. The list may contain specific email addresses, IP addresses or trusted domains. Emails received from a whitelisted source are allowed to pass through the system to the user's email box. The list is built when users and email administrators manually add trusted sources to the whitelist. Once built, the catch-rate for spam can be close to 100%, however, whitelists produce an inordinate number of false positives.
It is virtually impossible to produce an exhaustive list of all possible legitimate email senders because legitimate email can come from any number of sources. To get around this difficulty, some organizations have instituted a challenge-response methodology. When an unknown sender sends an email to a user's account, the system automatically sends a challenge back to the sender. Some challenge-response systems require the sender to read and decipher an image containing letters and numbers. The image is designed to be unreadable by a machine, but easily recognizable by a human. Spammers would not spend the time required to go through a large number of challenge-response emails, so they drop the address and move on to those users who don't use such a system.
Whitelists are only partially successful and impractical for many users. For example, problems can arise when users register for online newsletters, order products online or register for online services. If the user does not remember to add the new email source to their whitelist, or if the domain or IP address is entered incorrectly, the communication will fail. Additionally, whitelists impose barriers to legitimate email communication and are viewed by some as just plain rude.
Whitelists are not widely used by email users and administrators as a primary tool to fight spam because of the high number of false positives, and the difficulties in creating a comprehensive list of email sources. Because whitelists are not widely used, spammers typically do not develop countermeasures. As with other spam fighting techniques, whitelists are most effective when used in conjunction with other anti-spam tools.
The Solution
When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.
Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting enterprise anti spam solution today.
family-safe home cleaners Morton Grove ..A Privacy Policy can be defined as the policy under... Read More
How would you feel if you found a link on... Read More
News last week that Internet service provider Verizon settled its... Read More
Effectively stopping spam over the long-term requires much more than... Read More
You all tear your hair out in frustration every time... Read More
Spammers get email addresses from web pages using programs called... Read More
This review is taken DIRECTLY from a piece of "junk... Read More
Spam can bring down your website faster than a speeding... Read More
They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More
The temptation among internet marketers to SPAM is greater than... Read More
Why is someone from India, Africa, or elsewhere writing you... Read More
Let me ask a couple of questions:If (potential) customers sends... Read More
6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More
Until recently, spam has been an annoyance, a definite load... Read More
If you're anything like me, you're pretty sick of it,... Read More
You just sat at your desk, opened your email account... Read More
Anyone who uses email knows what Spam is!It's annoying and... Read More
Are you getting too much spam? We all are, but... Read More
With SPAM being such a problem it might seem the... Read More
As the flood of spam increases end users are looking... Read More
While we all admit that unsolicited commercial email is a... Read More
Spam, spam, spam. It's terrible not only for those of... Read More
I imagine you have seen, heard about, or already know... Read More
Effectively stopping spam over the long-term requires much more than... Read More
We receive so much information on the Internet, especially via... Read More
home cleaning services Wilmette ..If you've been around the interenet any length of time... Read More
Email is rapidly becoming the standard means of communication among... Read More
E-mails now have a connection back to their servers. I... Read More
Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More
You're not alone!Who hasn't surfed the web looking for information... Read More
I must be the luckiest person alive! My inbox is... Read More
Did you know that there are software programs that view... Read More
You are familiar with the software applications that you run... Read More
Effectively stopping spam over the long-term requires much more than... Read More
I'm sure I'm not the only person on the planet... Read More
With the number of spam filtering solutions increasing each week... Read More
Spam, as defined in the context of computers, the Internet... Read More
Below is a letter I wrote to the following organizations:S.H.U.... Read More
What comes to your mind when you think about your... Read More
You can stop unwanted email spam, you can choose to... Read More
I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More
Q: I am so sick of all the spam that... Read More
The lifeblood of the spammer is email. They need to... Read More
Spam is out of control! I guess that would be... Read More
It's a nightmare isn't it? You fire up your email... Read More
They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More
A hearty welcome to all the spam fighting filters and... Read More
If you are buried in SPAM then you're not alone.... Read More
Spam, spam, spam. It's terrible not only for those of... Read More
Why is someone from India, Africa, or elsewhere writing you... Read More
Spam Blocking |