Spam and Tips to Protect Against It

Spam and Tips to Protect Against It - 1 Ami McCarthy CIS...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Ami McCarthy CIS 101 F01 Frank Alvino January 10, 2010 Spam and Tips to Protect Against It The creative genius minds of the British comedy troupe Monty Python wrote a clever skit about Spam, which aired on the British Broadcasting Company television in 1970, that had a choir singing, “Spam! Spam! Spam! Spam! Lovely spam! Wonderful spam!” Although the group was writing about the Spam food product, there is nothing lovely or wonderful about the spam that invades our email boxes on a daily basis. According to Discovering Computers 2010, spam is “unsolicited email messages or newsgroup posting sent to many recipients or newsgroups at once” (Shelly, 427). Emails suspicious of being spam are those you did not ask for, which are sent in bulk and are from senders you do not know. Some seem friendly and tell me to open a link to an apparently normal website, only to find that my computer has picked up a virus; while others allow that person or company who sent it to gain access into my computer and personal information. The email address has been located and added by, or sold to, numerous companies that are trying to get me to buy, read, or subscribe to something. Fortunately, most spam messages are filtered by the email service websites into a junk or spam folder, so that the user does not have to see those messages; yet a few still manage to get through. The term spammer is used for someone who sends unwanted email, or the act of sending unsolicited email, and spammers use real internet service providers to spread 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
spam over the internet. According to Spamhaus, an international nonprofit organization tracking spam operations on the internet, as of January 5, 2011, there were 103 known spam operations responsible for 80% of spam received by internet users in North America and Europe. These spammers are listed in the Register of Known Spam Operations database at Spamhaus, which reports, “The majority of the spammers on the ROKSO List operate illegally and move from network to network and country to country seeking out Internet Service Providers with poor security or known for not enforcing of anti-spam policies” ( ). These spammers are gangs of one to three professionals, pretending to operate offshore, and claim the spam is being sent by non- existent customers. When a spam organization is caught, the spammers dance through a series of lies to the provider, buying themselves time to move on to another ISP, to continue their spamming operations. Qualified law enforcement agencies track their movements and activities through records kept on a special version of the ROKSO list provided by Spamhaus. Most spam is harmless and annoying; however some spam may be part of an
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 10/29/2011 for the course CIS 101 at Harper.

Page1 / 8

Spam and Tips to Protect Against It - 1 Ami McCarthy CIS...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online