What To Do When You Get Spam

When you go to your mailbox and find pieces of junk mail mixed in with important correspondence, you throw it out. It is a mild nuisance and you probably don't even give it a second thought. Unfortunately, most people do the same when spam arrives in their inbox. They just delete it.

While that does get rid of an individual email, more needs to be done to control what can become an overwhelming problem. Liken spam to cockroaches; see one in your cabinet and you know that you likely have an infestation that needs to be dealt with swiftly.

To begin with, do not respond to the spam ? ever. There are usually two ways that spam recipients make this mistake. First is the opt-out clause that appears at the bottom of the email. It appears to be a legal statement giving you the right to remove yourself from this mailing list. Unless you legitimately authorized the company to send you mail, in which case this is not spam, do not follow this link. Most often this link is simply a way for the spammers to identify your email address as valid. Now they can sell your address to other spammers and thank you for making their work easier by continuing to send you the spam you didn't want in the first place.

The second manner in which this error occurs is when, out of total frustration, you reply to the sender with a firm statement of your disgust. This usually happens when the spam is pornographic material and despite your best efforts, keeps appearing in your inbox. Sometimes the reply will not work because the sender's email address is a fake one and it will just bounce back to you as undeliverable. Count yourself lucky because the alternative means that they now have a confirmation of your address.

Next, read the email header. The header contains the full path of computers through which the email passed to get to you. Most pieces of email pass through at least four computers ? the spammer's, their ISP, your ISP, and finally yours. Since the stated from address is usually a fake one, this is the most reliable way to track down the spammer's ISP, at the very least.

Each computer that the spam travels through will add lines to the header stating who they are, who the mail came from, and where they are sending it. Headers can seem complicated, but in most cases you will be able to at least recognize other ISPs. If your mail is through Yahoo and you see "juno.com" in the mix, then you know that you can report the spam to Juno.

When reporting spam, you will need to cut and paste the full header path into the email to give the experts the opportunity to track down the offender. To read an email header, you typically just right click on the email and then choose properties, options, or header depending on which email program you are using.

Finally, forward the spam to a number of authorities. The first would be the spammer's ISP. If you cannot tell who that may be, send the spam to your ISP. Additionally, several websites are available to help you report spam, like spamcop.net.

Second, forward the spam to the Federal Trade Commission at uce@ftc.gov. While they will not take action on your behalf, they will add the spam to a database compiled on known UCE (unsolicited commercial email).

If the spam is a "419 Scam", or Nigerian Advance Fee Fraud, fax a copy of the email and its headers to the United States Secret Service. You will know this spam when you read it ? an exiled African leader of some sort needs your help and bank account information. These scams have defrauded many and need to be taken seriously.

Now you may delete the spam.

Lewis Leake is the webmaster of emailcash.com. There you will find articles, resources, books and product reviews on eMail Marketing Strategies and Tactics. You will also find a number of articles on SPAM and how to prevent it. Get Your FREE Mini-Report emailcash.com

Olympia Fields cheap limo service .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says Hipshipper, which is used by eBay, Shopify and Amazon sellers, exposed millions of shipping labels.
Boxabl’s Baby Box is a 120-square-foot foldable home that can be set up in 60 minutes and has off-grid features. Kurt “CyberGuy" Knutsson says it's designed to maximize functionality.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Major IoT data breach: Mars Hydro database with 2.7 billion records exposed. Kurt “CyberGuy" Knutsson says the breach is a reminder of the risks that come with using IoT devices.
Unitree H1 robots dance at gala, blending AI and tradition. Tech expert Kurt “CyberGuy" Knutsson examines the convergence of cutting-edge technology and traditional culture.
For the first time ever, SpaceX launched a rocket into space from Florida and landed the booster the Bahamas, allowing for future polar-orbit spaceflight missions.
Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.

Demand for Spam? It exists

Do you like spam? No, I'm not kidding. Everybody knows... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

Internet Tip of the Week: Cease and Desist

While we all admit that unsolicited commercial email is a... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

The Trouble With Spam Is....

Each day we all face the same challenge. Spam. It... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

Ignoring These Tips Could Result in an Inbox Full of Spam

Although there still seem to be some differences among the... Read More

Protecting Your Business From Spam

Even being as careful as possible with my email address,... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

What SPAM Means: Stupid People Annoying Me

English, German, Italian - It's All SPAM To MeHas anyone... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

Internet Tip of the Week: Outsourcing

It's no secret that the US economy has slowed down,... Read More

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

Is Your Website Blacklisted?

A blacklist, as the name implies, is a list of... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Internet Theft and Fraud

My friends in the web hosting business have recently informed... Read More

prom limo Belle Rive ..