SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Jujuan RomeRome1<br />Professor Stephanie Quinn<br />English 2950<br />Final Research Paper<br />Introduction:<br />It is a new day at the office, and workers are getting online to check their electronic mail, only to find that it has been overrun by unsolicited junk mail.   This mail, more commonly referred to as spam has been around since the beginning of the Internet, and as the Internet has grown, so has spam .A recent study by Star Internet, based on the typical number of staff spending ten minutes a day checking their mail, indicates that spam costs companies because time is money.  This is just one reason why bulk unsolicited or spam e-mail is costly, time consuming, and should be banned. The term spam for unsolicited e-mail is believed to have originated from a Monty Python skit in which the dialogue was drowned out by shouting out the word quot;
spamquot;
.<br />You ever get that email from that unknown address saying that you’ve won something?  What about the text message from a 5 digit number telling you that something is on sale?  No?  Well you’ve had to have seen the ads on the websites you go to that tells you that you have won a million dollars. What about the sexual enhancements ads?  Everybody that has ever been on the internet has at least seen one of the above. What to know what it is?  Keep reading!<br />Information:<br />Rome2<br />Spam is flooding the internet with many copies of the same message, in an attempt to force the message on people who would otherwise choose not to receive it.   In the Cheryl Bowman article “What Is the Meaning of Spam”, she says, “The modern meaning of spam is unsolicited commercial emails sent to thousands of users simultaneously.  Most spam is commercial, electronic junk mail or email chain letters.   Spam cost senders very little to send and is paid by the recipient or the carrier, not the sender.   Email spam targets individual users with direct mail messages.<br />Email spam lists are often created by scanning Usenet postings, stealing internet mail lists and searching the web for addresses.  One particular option of email spam is sending spam to mailing lists.  Since mailing list limits activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible.   They then use the mailing lists as a direct target for their attacks.   <br />Never reply to spam, this let spammers verify that this is a known good address.  Be careful where you place an email address on the web.  A lot of spam comes from us putting our emails on websites that we expect newsletters from.  Something you can do if you dislike getting all that spam is to create a second email address.  You should use your personal address for all personal items, and only use the second email on the web for sites that you think you could get spam from.  <br />Rome3<br />In addition to wasting people’s time with unwanted email, spam also eats up a lot of network bandwidth.   Network Bandwidth is a measure of available or consumed data communication resources expressed bit/s or multiples of it.  There are many software developers who have taken it upon themselves to fight spam with a variety of techniques but because the internet is public, there is really little that can be done to prevent spam or junk mail.  However, some online services have instituted policies to prevent spammers from sending spam to the subscribers.   With this in mind there’s an antispam organization out there that’s fighting for you.  CAUCE, the Coalition against Unsolicited Commercial E-mail, is an all-volunteer global entity.  They put all their efforts into getting legislation passed that would help stop and penalize spam.<br />Although spam is a problem for businesses, it is certainly not limited to them.   A large amount of spam mail is targeted at anyone who has an e-mail address, and many adults are therefore concerned at some of the content that is sometimes received with these inconvenient messages.   Some spam messages may contain explicit content, such as subject headers that display sexually explicit words and phrases that may be unsuitable for children who have access to the Internet.  You should install a parental control on your computer but on the other hand, <br />Even though spam can contain some sexually explicit material, there are generally twelve spam scams that seem to be popular.  Many spam messages may contain promises of business <br />Rome4<br />Opportunities, making money scams, work-at-home schemes, health and diet scams, easy money, getting free merchandise, chain letters, getting free merchandise.  Investment opportunities, cable scrambler kits, guaranteed loans or credit with easy terms, credit repair, and vacation prize promotions.  You should always use junk mail filters and refrain from opening or responding to unknown and unfamiliar emails.  Not only could they be just spam but they may also contain a virus which may be a bigger threat to your computer and cost more money in the long run.<br />According to Dorothy Frank, “A quick test to see if your email is in the spam database is to attend Google and type in your email address.  If any results come up then your address is in the public domain and spammers have open access to it.”  You can prevent opening up spam messages through your email or commercial by understanding the anatomy of it.  There are about six key things that you can observe right before you decide to click on an email or advertisement.  Look at the sender.  Usually the name would be in capital letters and would be a name that is unbelievable and looks as if the computer just made it up.  Looking at the sender can be used to spot spam.  You can observe the e-mail address.  It would clearly look fake but if you don’t catch on at first you can look at the domain after the @ sign and Google about it and see if its offers are related to the email. <br />The subject also can cause a red flag with its bad spelling. It avoids mentioning what the message is actually about which might help it sneak past some spam filters.  The body of the <br />Rome5 message is actually an image rather than text.  Again this is another trick to defeat spam filters.  Finally there is the extra text.  Spammers regularly use large lumps of text to try to convince filtering systems that a message is legitimate.  What should be noted is that nowhere in this mail does the text actually mention what the message is about.  The only mention what it is offering for sale is in the image.<br />When you hear the word spam, your immediate thoughts go to the more well-known and common form of spam: e-mail spam.  However, other types of spam are found in a variety of internet communication mediums such as instant messaging, discussion boards, mobile phones with text messaging, newsgroups, internet telephony, blogs — basically any device or client that provides a means for communications.<br />Conclusion:<br />At the end of the day, you probably won’t be able to stop spam.  What you will be able to do is contain and prevent it from getting special information. Taking all precautions will do this.  Make sure to have a good security/virus protector.  Avast and AVG are my top recommendations.  Try to put the least personal information on the internet as you can.  Internet shopping is okay, just make sure that the site you are shopping on is guaranteed site.  Guaranteed meaning confirmed or referred.  Most sites have comments that you can read, read those.  Other than that, there’s not much you can do.  You don’t have to worry that much because according to Mike Grunch, “It is extremely important to pay attention to internet security but on the other hand, there is no reason to get paranoid”.  We all should be alright.<br />
Final paper
Final paper
Final paper
Final paper
Final paper

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Informationebooker97
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerJillian Stone
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Gamecynthia.warner
 
Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;ddbennett
 

Was ist angesagt? (16)

Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Email Etiquette Script
Email Etiquette ScriptEmail Etiquette Script
Email Etiquette Script
 
Email basics
Email basicsEmail basics
Email basics
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 
Allan Watt
Allan WattAllan Watt
Allan Watt
 
Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
School presentation
School presentationSchool presentation
School presentation
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
 
2016 NGH Convention Newsletter 6
2016 NGH Convention Newsletter 62016 NGH Convention Newsletter 6
2016 NGH Convention Newsletter 6
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;Healthcare Internet Conference\' You have Mail&quot;
Healthcare Internet Conference\' You have Mail&quot;
 
Myspace
MyspaceMyspace
Myspace
 

Andere mochten auch

Jeofizik Odasına Üye Olmak İstiyorum
Jeofizik Odasına Üye Olmak İstiyorumJeofizik Odasına Üye Olmak İstiyorum
Jeofizik Odasına Üye Olmak İstiyorumAli Osman Öncel
 
ÖNCEL AKADEMİ: DEPREM EVİ
ÖNCEL AKADEMİ: DEPREM EVİÖNCEL AKADEMİ: DEPREM EVİ
ÖNCEL AKADEMİ: DEPREM EVİAli Osman Öncel
 
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİ
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİ
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİAli Osman Öncel
 
Photo series : intimate portraits of the people of morocco
Photo series : intimate portraits of the people of moroccoPhoto series : intimate portraits of the people of morocco
Photo series : intimate portraits of the people of moroccoCrimson Avalanche
 
Günümüzde Teknolji̇ Geli̇şti̇rme
Günümüzde Teknolji̇ Geli̇şti̇rmeGünümüzde Teknolji̇ Geli̇şti̇rme
Günümüzde Teknolji̇ Geli̇şti̇rmeAli Osman Öncel
 
Coopérer à l'échelle européenne : le projet SoNetTE
Coopérer à l'échelle européenne : le projet SoNetTECoopérer à l'échelle européenne : le projet SoNetTE
Coopérer à l'échelle européenne : le projet SoNetTEShona Whyte
 
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage Risk
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage RiskFEA Based Design Optimization to Mitigate Anchor Cage Impact Damage Risk
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage RiskAltair
 
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携について
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携についてRICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携について
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携についてDevice WebAPI Consortium
 
Gamification for social good - Social Maker Lab
Gamification for social good - Social Maker LabGamification for social good - Social Maker Lab
Gamification for social good - Social Maker LabErcan Altuğ YILMAZ
 
Incorporating More Geological Themes into Ecotourism - A Basis for Mores Suc...
Incorporating More Geological Themes into Ecotourism -  A Basis for Mores Suc...Incorporating More Geological Themes into Ecotourism -  A Basis for Mores Suc...
Incorporating More Geological Themes into Ecotourism - A Basis for Mores Suc...Leisure Solutions®
 

Andere mochten auch (18)

Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
Abdelrahman eraky 2cs
Abdelrahman eraky 2csAbdelrahman eraky 2cs
Abdelrahman eraky 2cs
 
Jeofizik Odasına Üye Olmak İstiyorum
Jeofizik Odasına Üye Olmak İstiyorumJeofizik Odasına Üye Olmak İstiyorum
Jeofizik Odasına Üye Olmak İstiyorum
 
ÖNCEL AKADEMİ: DEPREM EVİ
ÖNCEL AKADEMİ: DEPREM EVİÖNCEL AKADEMİ: DEPREM EVİ
ÖNCEL AKADEMİ: DEPREM EVİ
 
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİ
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİ
ÖNCEL AKADEMİ: EĞİTİCİNİN DEPREM EĞİTİMİ
 
Presentation
PresentationPresentation
Presentation
 
Photo series : intimate portraits of the people of morocco
Photo series : intimate portraits of the people of moroccoPhoto series : intimate portraits of the people of morocco
Photo series : intimate portraits of the people of morocco
 
Geotourism Course
Geotourism CourseGeotourism Course
Geotourism Course
 
Günümüzde Teknolji̇ Geli̇şti̇rme
Günümüzde Teknolji̇ Geli̇şti̇rmeGünümüzde Teknolji̇ Geli̇şti̇rme
Günümüzde Teknolji̇ Geli̇şti̇rme
 
Coopérer à l'échelle européenne : le projet SoNetTE
Coopérer à l'échelle européenne : le projet SoNetTECoopérer à l'échelle européenne : le projet SoNetTE
Coopérer à l'échelle européenne : le projet SoNetTE
 
Reproductive immunology quiz week 2
Reproductive immunology quiz week 2 Reproductive immunology quiz week 2
Reproductive immunology quiz week 2
 
Analysis of design brief
Analysis of design briefAnalysis of design brief
Analysis of design brief
 
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage Risk
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage RiskFEA Based Design Optimization to Mitigate Anchor Cage Impact Damage Risk
FEA Based Design Optimization to Mitigate Anchor Cage Impact Damage Risk
 
Les réponses immunes en implantologie dentaire 4 année 2016
Les réponses immunes en implantologie dentaire 4 année 2016Les réponses immunes en implantologie dentaire 4 année 2016
Les réponses immunes en implantologie dentaire 4 année 2016
 
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携について
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携についてRICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携について
RICOH様全天球カメラTHETAとエプソンスマートグラスMOVERIO連携について
 
Gamification for social good - Social Maker Lab
Gamification for social good - Social Maker LabGamification for social good - Social Maker Lab
Gamification for social good - Social Maker Lab
 
Incorporating More Geological Themes into Ecotourism - A Basis for Mores Suc...
Incorporating More Geological Themes into Ecotourism -  A Basis for Mores Suc...Incorporating More Geological Themes into Ecotourism -  A Basis for Mores Suc...
Incorporating More Geological Themes into Ecotourism - A Basis for Mores Suc...
 
Cours complement pharmacie 2016
Cours complement pharmacie 2016Cours complement pharmacie 2016
Cours complement pharmacie 2016
 

Ähnlich wie Final paper

LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSaneBox
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ictsiewying
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 

Ähnlich wie Final paper (20)

Spam!
Spam!Spam!
Spam!
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Spam
SpamSpam
Spam
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
IST
ISTIST
IST
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
Web spam
Web spamWeb spam
Web spam
 
Spam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont'sSpam Email: 8 Dos and Dont's
Spam Email: 8 Dos and Dont's
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
spam
spamspam
spam
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Email Marketing The Easy Way
Email Marketing The Easy WayEmail Marketing The Easy Way
Email Marketing The Easy Way
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 

Final paper

  • 1. Jujuan RomeRome1<br />Professor Stephanie Quinn<br />English 2950<br />Final Research Paper<br />Introduction:<br />It is a new day at the office, and workers are getting online to check their electronic mail, only to find that it has been overrun by unsolicited junk mail. This mail, more commonly referred to as spam has been around since the beginning of the Internet, and as the Internet has grown, so has spam .A recent study by Star Internet, based on the typical number of staff spending ten minutes a day checking their mail, indicates that spam costs companies because time is money. This is just one reason why bulk unsolicited or spam e-mail is costly, time consuming, and should be banned. The term spam for unsolicited e-mail is believed to have originated from a Monty Python skit in which the dialogue was drowned out by shouting out the word quot; spamquot; .<br />You ever get that email from that unknown address saying that you’ve won something? What about the text message from a 5 digit number telling you that something is on sale? No? Well you’ve had to have seen the ads on the websites you go to that tells you that you have won a million dollars. What about the sexual enhancements ads? Everybody that has ever been on the internet has at least seen one of the above. What to know what it is? Keep reading!<br />Information:<br />Rome2<br />Spam is flooding the internet with many copies of the same message, in an attempt to force the message on people who would otherwise choose not to receive it. In the Cheryl Bowman article “What Is the Meaning of Spam”, she says, “The modern meaning of spam is unsolicited commercial emails sent to thousands of users simultaneously. Most spam is commercial, electronic junk mail or email chain letters. Spam cost senders very little to send and is paid by the recipient or the carrier, not the sender. Email spam targets individual users with direct mail messages.<br />Email spam lists are often created by scanning Usenet postings, stealing internet mail lists and searching the web for addresses. One particular option of email spam is sending spam to mailing lists. Since mailing list limits activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible. They then use the mailing lists as a direct target for their attacks. <br />Never reply to spam, this let spammers verify that this is a known good address. Be careful where you place an email address on the web. A lot of spam comes from us putting our emails on websites that we expect newsletters from. Something you can do if you dislike getting all that spam is to create a second email address. You should use your personal address for all personal items, and only use the second email on the web for sites that you think you could get spam from. <br />Rome3<br />In addition to wasting people’s time with unwanted email, spam also eats up a lot of network bandwidth. Network Bandwidth is a measure of available or consumed data communication resources expressed bit/s or multiples of it. There are many software developers who have taken it upon themselves to fight spam with a variety of techniques but because the internet is public, there is really little that can be done to prevent spam or junk mail. However, some online services have instituted policies to prevent spammers from sending spam to the subscribers. With this in mind there’s an antispam organization out there that’s fighting for you. CAUCE, the Coalition against Unsolicited Commercial E-mail, is an all-volunteer global entity. They put all their efforts into getting legislation passed that would help stop and penalize spam.<br />Although spam is a problem for businesses, it is certainly not limited to them. A large amount of spam mail is targeted at anyone who has an e-mail address, and many adults are therefore concerned at some of the content that is sometimes received with these inconvenient messages. Some spam messages may contain explicit content, such as subject headers that display sexually explicit words and phrases that may be unsuitable for children who have access to the Internet. You should install a parental control on your computer but on the other hand, <br />Even though spam can contain some sexually explicit material, there are generally twelve spam scams that seem to be popular. Many spam messages may contain promises of business <br />Rome4<br />Opportunities, making money scams, work-at-home schemes, health and diet scams, easy money, getting free merchandise, chain letters, getting free merchandise. Investment opportunities, cable scrambler kits, guaranteed loans or credit with easy terms, credit repair, and vacation prize promotions. You should always use junk mail filters and refrain from opening or responding to unknown and unfamiliar emails. Not only could they be just spam but they may also contain a virus which may be a bigger threat to your computer and cost more money in the long run.<br />According to Dorothy Frank, “A quick test to see if your email is in the spam database is to attend Google and type in your email address. If any results come up then your address is in the public domain and spammers have open access to it.” You can prevent opening up spam messages through your email or commercial by understanding the anatomy of it. There are about six key things that you can observe right before you decide to click on an email or advertisement. Look at the sender. Usually the name would be in capital letters and would be a name that is unbelievable and looks as if the computer just made it up. Looking at the sender can be used to spot spam. You can observe the e-mail address. It would clearly look fake but if you don’t catch on at first you can look at the domain after the @ sign and Google about it and see if its offers are related to the email. <br />The subject also can cause a red flag with its bad spelling. It avoids mentioning what the message is actually about which might help it sneak past some spam filters. The body of the <br />Rome5 message is actually an image rather than text. Again this is another trick to defeat spam filters. Finally there is the extra text. Spammers regularly use large lumps of text to try to convince filtering systems that a message is legitimate. What should be noted is that nowhere in this mail does the text actually mention what the message is about. The only mention what it is offering for sale is in the image.<br />When you hear the word spam, your immediate thoughts go to the more well-known and common form of spam: e-mail spam. However, other types of spam are found in a variety of internet communication mediums such as instant messaging, discussion boards, mobile phones with text messaging, newsgroups, internet telephony, blogs — basically any device or client that provides a means for communications.<br />Conclusion:<br />At the end of the day, you probably won’t be able to stop spam. What you will be able to do is contain and prevent it from getting special information. Taking all precautions will do this. Make sure to have a good security/virus protector. Avast and AVG are my top recommendations. Try to put the least personal information on the internet as you can. Internet shopping is okay, just make sure that the site you are shopping on is guaranteed site. Guaranteed meaning confirmed or referred. Most sites have comments that you can read, read those. Other than that, there’s not much you can do. You don’t have to worry that much because according to Mike Grunch, “It is extremely important to pay attention to internet security but on the other hand, there is no reason to get paranoid”. We all should be alright.<br />