Learn Simple Strategies That Will Stop Spammers From Bombarding Your Inbox!

Spam filter is the solution that most people resort when they try to steam the flood of junk mails and spam.

However, there is a problem!

First: Some spam will still get through.
Second: Some legitimate mails will be stopped as spam.

And that legitimate messages get caught in the spam filters is a big problem. It is a big problem for both the sender and for the receiver. If you use POP accounts on your ISP or use free email accounts like Hotmail you will sometimes be forced to use their spam filters. You are often not even told that legitimate messages may be deleted.

Why will they get stopped?
There are several reasons!

Spam filters may give red flag to an email simply because it contains words which the filters also find in spam messages.

Often newsletters you sign up to get blocked because too many messages are sent out at the same time or some subscriber have complained accusing the sender of spamming. The rules of the spam filters changes over time as this is an ever going arms race between the spammers and the anti spam filter manufacturer.

So how can you stop the flood of spam hitting your email account?

Simple, you have to go stealth!

Look at email spamming as a war.

Using spam filters is like putting on armor. It gives you protection, but it will also cost you and give you less flexibility.

The spam sending gangs, there are estimated to be fewer than hundred worldwide, machine gun bombard only email accounts which they can find.
This means that if they can't find your email address they can't spam you.

So how do they find you?
Contrary to popular beliefs they don't find your email address because you sign up to a newsletter or to legal product information.

Instead they collect or harvest email from web sites using spam boots. The spam boots works in a similar way as web content collecting search engine spiders except they only collect email addresses. They also collect email address from address books found inside email software like Outlook or Eudora. They do this by using viruses and spywares.

Your solution to avoid getting on their lists is to go stealth and become invisible to the spammers!
What do I mean by that?
Simple you hide your email address or addresses from the email harvesting spam boots. But at the same time if you have your own web site you want your viewers to be able to read or click on your contact email.

One common solution is to rewrite the email address on the web site.
Let's say you email is: info@mysite.com
You can rewrite the address as info@REMOVEmysite.com, info @ mysite.com, infoATmysite.com or something similar. The email address is then readable by human viewers, not by the spammers. The downside of this method is that the email address is not clickable from your web site.

Another method which is preferred by commercial web sites is to use a contact form that also hides the address from the spammers.

One solution which I use and have found to work well is to hide the address from the spam boots with java script. The address then becomes clickable for the viewers. You can learn how to use java script and hide your email addresses from the spammers at http://www.data-backup-and-storage.com/stop-spam.html

You should also use firewall and anti virus software as a protection so that spammers don't get access to the email addresses from within your computer. As an extra precaution you should also use spyware removal software. This will remove possible spyware from your computer. All this measures should protect you from spammers and their spying eyes.

However, be careful! With this method in order to work you should adopt a strict email discipline and limit the number of people with access to your email addresses and not spread them around.

But, what if your emails already have been spread into the spammers mailing lists?

It is important to understand that the spammers want new and fresh email addresses.
Therefore they continuously harvest the Internet for addresses.

The answer is, use Google!
With Google you will find the web pages on which your email addresses are located. Just perform consecutive searches using Google typing in one of your email address in the search box.

You can then contact the owners of those sites and ask them to remove the email address.

Result:
The spam will not stop immediately, but after a couple of months the flow will start to recede.

Copyright 2004 Per Strandberg

About The Author

Per Strandberg works with computer security and he also manage an information site dealing with data backup technology. Learn working data backup strategies at ==> http://www.data-backup-and-storage.com/stop-spam.html

Discover different ways to get rid of spam at ==> http://www.data-backup-and-storage.com/stop-spam.html

detailed home cleaning Park Ridge ..
In The News:

Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

Internet Theft and Fraud

My friends in the web hosting business have recently informed... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

How To Stop Unwanted Email Spam

You can stop unwanted email spam, you can choose to... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Spam - How to Report it

I'm sure you find spam just as frustrating and annoying... Read More

Fight Spam and Fortify Your Web Site with RSS

RSS is the answer to the Spam epidemic of the... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

Spam: The Tasteless Internet Meat of Criminals

Spam. You've all heard of the crazy pink meat in... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

E-mail SPAM: Whats The Big Deal?

It absolutely amazes me how many people over-react to receiving... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

What to Do to Avoid Getting Banned

How would you feel if you found a link on... Read More

Demand for Spam? It exists

Do you like spam? No, I'm not kidding. Everybody knows... Read More

express cleaning service Des Plaines ..