Learn Simple Strategies That Will Stop Spammers From Bombarding Your Inbox!

Spam filter is the solution that most people resort when they try to steam the flood of junk mails and spam.

However, there is a problem!

First: Some spam will still get through.
Second: Some legitimate mails will be stopped as spam.

And that legitimate messages get caught in the spam filters is a big problem. It is a big problem for both the sender and for the receiver. If you use POP accounts on your ISP or use free email accounts like Hotmail you will sometimes be forced to use their spam filters. You are often not even told that legitimate messages may be deleted.

Why will they get stopped?
There are several reasons!

Spam filters may give red flag to an email simply because it contains words which the filters also find in spam messages.

Often newsletters you sign up to get blocked because too many messages are sent out at the same time or some subscriber have complained accusing the sender of spamming. The rules of the spam filters changes over time as this is an ever going arms race between the spammers and the anti spam filter manufacturer.

So how can you stop the flood of spam hitting your email account?

Simple, you have to go stealth!

Look at email spamming as a war.

Using spam filters is like putting on armor. It gives you protection, but it will also cost you and give you less flexibility.

The spam sending gangs, there are estimated to be fewer than hundred worldwide, machine gun bombard only email accounts which they can find.
This means that if they can't find your email address they can't spam you.

So how do they find you?
Contrary to popular beliefs they don't find your email address because you sign up to a newsletter or to legal product information.

Instead they collect or harvest email from web sites using spam boots. The spam boots works in a similar way as web content collecting search engine spiders except they only collect email addresses. They also collect email address from address books found inside email software like Outlook or Eudora. They do this by using viruses and spywares.

Your solution to avoid getting on their lists is to go stealth and become invisible to the spammers!
What do I mean by that?
Simple you hide your email address or addresses from the email harvesting spam boots. But at the same time if you have your own web site you want your viewers to be able to read or click on your contact email.

One common solution is to rewrite the email address on the web site.
Let's say you email is: info@mysite.com
You can rewrite the address as info@REMOVEmysite.com, info @ mysite.com, infoATmysite.com or something similar. The email address is then readable by human viewers, not by the spammers. The downside of this method is that the email address is not clickable from your web site.

Another method which is preferred by commercial web sites is to use a contact form that also hides the address from the spammers.

One solution which I use and have found to work well is to hide the address from the spam boots with java script. The address then becomes clickable for the viewers. You can learn how to use java script and hide your email addresses from the spammers at http://www.data-backup-and-storage.com/stop-spam.html

You should also use firewall and anti virus software as a protection so that spammers don't get access to the email addresses from within your computer. As an extra precaution you should also use spyware removal software. This will remove possible spyware from your computer. All this measures should protect you from spammers and their spying eyes.

However, be careful! With this method in order to work you should adopt a strict email discipline and limit the number of people with access to your email addresses and not spread them around.

But, what if your emails already have been spread into the spammers mailing lists?

It is important to understand that the spammers want new and fresh email addresses.
Therefore they continuously harvest the Internet for addresses.

The answer is, use Google!
With Google you will find the web pages on which your email addresses are located. Just perform consecutive searches using Google typing in one of your email address in the search box.

You can then contact the owners of those sites and ask them to remove the email address.

Result:
The spam will not stop immediately, but after a couple of months the flow will start to recede.

Copyright 2004 Per Strandberg

About The Author

Per Strandberg works with computer security and he also manage an information site dealing with data backup technology. Learn working data backup strategies at ==> http://www.data-backup-and-storage.com/stop-spam.html

Discover different ways to get rid of spam at ==> http://www.data-backup-and-storage.com/stop-spam.html

disinfecting cleaning services Arlington Heights ..
In The News:

Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

What Is Spam?

If you've been around the interenet any length of time... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

The Definition of Spam

Spam can bring down your website faster than a speeding... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

Demand for Spam? It exists

Do you like spam? No, I'm not kidding. Everybody knows... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Internet Theft and Fraud

My friends in the web hosting business have recently informed... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

I Must Be The Luckiest Person Alive! Spam

I must be the luckiest person alive! My inbox is... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

What To Do When You Get Spam

When you go to your mailbox and find pieces of... Read More

Spam with Typos: Why Do They All Have Spelling Errors?

A friend asked me: I don't get it. Why do... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

bathroom cleaning service Mundelein ..