What is report spam. Spam on the Internet - what is it and how to deal with it. More serious consequences

There are quite a few methods of attracting a person's attention, but spam has become widespread these days. What is spam and what does it represent?

Regular Internet users, who have been such for a long time, most likely already know what spam is, by the way they have encountered it more than once in their daily activities. But if most people are aware of the existence of spam, then their knowledge is usually limited, but spam requires more attention.

Without a doubt, spam is one of the cheapest ways to get people's attention. And many advertisers use spam without remorse. But it is difficult to get customers for illegal products or materials that even adults do not need to familiarize themselves with in a pious way, for which spam is almost ideal, and sometimes even the only distribution option.

What is spam and how to understand it

In everyday understanding, spam can be considered absolutely all unwanted information that sometimes arrives in a not entirely clear way on email, this is certainly correct, but only modern spam is no longer limited to e-mail. Now spam is distributed not only through the Internet, it is part of the Internet. Spam can be considered an excessive presence of any information that a person has to meet or even interact with without his consent, thereby not only interfering and slowing down his activity, but provoking a danger to both the confidentiality of personal data and other unfavorable phenomena.

Based on the same e-mail, then some messages may not be spam, but let's say it will be unwanted information. In fact, it will be correct if everyone singles out for themselves what is junk mail and what is spam.

Spam- this is a mass mailing of unwanted information to users, the overwhelming majority of which is automatic, in turn, which initially do not need it. This is a slightly outdated definition, although it can be associated not only with mail, but also with other types of messages.

Samo spam concept, is a kind of disease of the Internet, it applies not only to junk mailing lists, but also to services instant messaging, social networks and even websites, search results, etc. For a spammer, spam in some cases is a way to attract attention, advertising and anti-advertising, and sometimes it is a way to enrich the ignorance of the final recipient of information.

Why are mass mailings and mass publications used? Everything is simpler than it might seem, because with a large list, both mailing list, and recipients of information found in other ways, if it is advertising, you can find it almost without difficulty more potential clients or attracting visitors to the site. Also, the possibility is not ruled out, and usually it is pursued, this is the search for potential victims of fraud.

The emergence of spam, how it all began

The term Spam itself comes from the overabundance of advertisements for canned meats left unused by US soldiers after the end of World War II. They were called spicy or peppered ham from the English. SPicedhAM. People for a long time remembered the SPAM they encountered, and subsequently one of the unintentional mass mailings of e-mail messages was now associated with this parietal in 1993. This was caused by a program written with an error, with the help of which 200 exactly identical e-mails were sent. But that spam was just a mistake, which is not true of many of today's mailing lists.

Types of spam and where you can usually find it

As mentioned earlier, such junk mailings cost practically nothing to a spammer, but the recipient, for the wrong actions, can pay quite seriously. In addition, each Internet provider has its own tariffs and rates, and searching among unwanted mail and web spam for the necessary information due to traffic overruns can cost more.

except various ways self-collection of e-mail addresses, including automated ones, whole organizations are engaged in this not the most noble way, and mailing lists can also be purchased. Mailing can also be carried out using any poorly protected computer, which is possible after activating specialized software on it.

Spam email

The existence of the possibility of obtaining potential threat is no longer a rarity, which in the end can force or convince to transfer any amount of money to an unknown account. This is nothing more than extortion of money, and for an attacker, the dissemination of such information is a simple and sure way. The spammer hopes that due to the large number of recipients of spam, whoever responds to it and falls into a trap.

In order not to fall for a scam, you need to understand the meaning of Phishing, this method of mailing fraud is used to lure out confidential information. Such information can actually be information about a bank account, the attacker's goal may be the ability to obtain his login and password. Such mailings are disguised as closely as possible as official organizations with their own clones of official websites, on behalf of which the message was allegedly received. As you know, serious organizations do not ask you to provide them with personal information by e-mail.

Very often, mailing lists may contain attachments, sometimes even the first time you don’t understand what the content is computer virus or a mail worm, which, for example, is self-propagating, they can collect all possible necessary information and all this is sent to the correct address.

Comments on websites: blogs, forums and bulletin boards

At the moment, there are quite a lot of spammers, especially among webmasters, who want to leave a link in the comments of a blog or forum, which, with the right approach, can be a plus for his site, and for a site with too many outgoing links, this can be a verdict, because such the Internet resource for the search engine will be spammed. Owners of such sites should not forget about the need to moderate posts and comments.

As for bulletin boards, texts very similar to real ads can be published, with a large number of outgoing links, and if an inattentive moderator missed this type of spam, this will affect not only the fact that the search engine considers the board, the site spam, but users will react with a warning to such Internet resources, strange ads will arouse suspicion.

Increasingly, you can stumble upon the supposedly blog of a taxi driver Roman, who earns millions, weight loss methods and other sites that are actually useless for a person. Separate sites are created to praise their site, which, apparently, due to its low information content and usefulness, cannot achieve the desired traffic. What can we say about filling such sites with machine text. An overabundance of advertising, including pop-up windows that interfere with viewing the necessary information, which is not always possible to close without difficulty, is the lot of dishonest site owners.

Search engine spam is a type of clogging search results with sites that do not carry anything useful, except for the needs for which they were created by the owner. These sites very often appear in the first places in the search results, but thanks to the constantly improving search algorithms, they also quickly fall under the filter, still be vigilant.

Spam on social networks

What is spam is most likely already clear from some of the material read, but social spam is a slightly different method of attracting attention.

For spam on social networks, hacked accounts of the most ordinary users are very often used, as well as accounts can be created on purpose, false groups are created. You and your friends can also get into such trouble, and the strange message that has arrived can only testify to his not quite human activity. Just as with receiving suspicious mail and spending time on the site, you should beware of fraud.

Often people using social media, invite them to groups they don't need, invite them to be friends, since this can be a mass invitation, this method is rightfully considered spam. Many social media pages networks to which attraction is carried out can have, like sites, not reliable information, offer low-quality goods, although this is not a regularity, but the administration is constantly fighting this type of fraud.

SMS messages can also be spam

SMS messages with advertisements or spam are no longer uncommon for mobile phone, and here, as elsewhere, it is necessary to distinguish truth from lies. Otherwise, it is possible to subscribe to paid SMS news channels, the availability of which will be known only over time. Spam for smartphones is not much different, in such messages it very often sends links to malicious programs, under the pretext of, for example, viewing a photo or updating a browser.

A few years ago, the request of a parent to replenish the account for any amount was especially popular, in connection with a problem with a child, but there were those who fell into such a trap.

How to protect yourself from spam and its consequences

How would you like to have a short and beautiful name mailbox - this will not be a good option to protect yourself from spam, because such addresses most often end up in the mailing list.

If possible, you should refrain from publicly publishing your email address in places accessible to everyone. In addition to manual addition, such addresses can be added completely automatically using specialized software to the spam database. Even if the need for such publication is still required, you need to do this with minor changes, for example, change the @ symbol to the word of the same name or separate some characters with a space.

This method will help, albeit a little, but protect against automated matching of your email address to a spam database. Actually, approximately this method can be used for ICQ and other network identifiers.

To register on sites, it would not be bad to have an additional mailbox, thereby securing your main one. On GSM devices, you just need to ignore the incoming message, and also not respond to it, the principles of the attackers' work remain practically unchanged.

If the message - spam nevertheless reached you, then you should not follow the links in it and test the security of your computer by opening unknown attachments, and the response to such a message will only confirm that the mail is being used, and the spam has reached the addressee.

Modern mail clients, provide one of better ways anti-spam is the filtering of incoming messages. Although there are a lot of automatic filtering methods, all of them are not ideal, so the most ordinary message can be blocked, so I create many services separate folder for such messages, the contents of which the user can familiarize himself with.

Also, to combat spam, you can set up rules that automatically transfer messages from permanent spam addresses to a specific folder, this is possible with most email clients. As for the fight against spam on sites, a lot depends on their owners, and avoiding such web resources, perhaps, the best way to secure your computer.

Spam has become so integrated into our lives that many people don't even notice it. What can we say about the Internet? When asking what spam is, you need to look around, on the poles, in your mailbox you can sometimes notice a lot of excessive advertising, which can also be called spam, albeit household.

Spam is the distribution of letters of an advertising nature of a political or commercial nature to those people who did not subscribe to it. Spam refers to emails received on the user's email, phone, in social applications such as whats app, skype and many others. Main theme emails can be different: from visiting a resort to an offer to earn big money or receive a prize for some action that the user has never done.

The first episode of spam took place in the nineteenth century. In 1864, British politicians received telegrams by telegraph advertising dental services. In the twentieth century, a similar term was used as a trademark of Hormel Foods Corporation. This was an abbreviation SPAM stands for SPiced hAM, which means "spicy ham" in translation. After the war, advertisements about the remaining unused canned food were broadcast at every step - from the radio, newsstands, on trams and buses. There was a sketch called "SPAM" on a television show in Britain. Hence the modern name.

Sometimes spam from harmless letters turns into a real black PR. For example, with its help, one company can denigrate another by sending Internet and phone users some messages that discredit the reputation of the latter. With the help of such mailings, pornography, drugs and much more is advertised, which is prohibited by law.

Disguised as spam extortion of money. For example, a woman receives a message in the mail that her son had an accident and asks to send money for a complex operation and a number where savings should be sent. Those women who have never experienced such actions believe and send money. And then it turns out that the son is healthy and nothing happened to him. More details about the types will be discussed below.

Types of spam

The most common type is advertising. With the help of advertising, companies sell services, offer goods. Such advertising is permitted at the legislative level. But many recipients are still wary.

Another type are Nigerian letters". The name was formed due to the fact that a large number of such messages were received in Nigeria. The recipient of such a letter is promised a large amount of money, but it is necessary to arrange the opening of an account, shipping costs, which the fraudster allegedly will pay only when the recipient sends the money to him.

Almost the same in appearance is phishing". Allegedly, the bank administration will block the recipient's account if he does not send his details and confirm the data on the site, under which the link of the spammer site is hidden. Thus, the scammers will receive all the necessary data in order to transfer the money in the recipient's account to themselves.

happiness letters, common among schoolchildren and the adult population, in our country are also one of the varieties. They are based on the requirement to forward the message as more friends. And in return, a miracle will happen in the life of the recipient in a few days. Sometimes such messages may contain a negative character. For example, to threaten punishment from heaven if a person does not forward a certain number of letters to friends.

All these legal and illegal actions are committed by people who are called spammers. They can be mailers, database collectors, software vendors, and even the average user. If a person wants to report something to many people without their request or consent, he automatically becomes a spammer.

This type of mailing brings benefits to customers of letters. Fighting this species is difficult, but possible.

How to deal with spam

You can deal with mailings yourself. If you often receive messages from a particular group or user, you can always add a person to black list and make sure that messages get into a specially designated block. On the site mail.ru, or Yandex.Mail, it is called "Spam".

For a user who wants to protect himself from spammers, Not recommended publish your mailing address on public websites. Or create a special box if you have to register in unreliable groups and communities. Not recommended reply to messages like this or follow the links in them. Perhaps a script is already hidden in the link that will block your computer or phone at best. At worst, it will get access to your cards and bank accounts.

There are special software, which protects against annoying mailings. Typically, such anti-spam modules are built into the anti-virus or installed separately. Kaspersky Lab, Antispamus, Counterspam are the best of these programs.

In phones, it is recommended to blacklist such senders. Letters will be coming in separate block under the name "Antispam" in the phone. And the recipient, if he wants, can look, if not, he can put on automatic deletion after a certain number of days.

You can find examples below in the pictures. Such are harmless mailings are also called spam on the Internet.

These are examples of mailings from ordinary users. There are entire companies, for example, computer repair, window installers, that do this kind of mailing, inserting links to their pages in usernames or in words. Below is an example:

What to do with spam emails

Why spam is dangerous

First of all, it is dangerous because in a pile of various mailing lists you will have to look for a really useful letter from a friend or worker for a long time. By opening a spam email and clicking on a link, you are exposing yourself and corporate network infection with various viruses. Thirdly, the additional load on the network.

If you have ever worked with e-mail, you are familiar with such an unpleasant phenomenon as spam - a mass mailing of advertising messages carried out without the consent of the recipient. Usually it is carried out not centrally, from one server, but with the help of the so-called spam network, simultaneously from many computers connected to the Internet. Moreover, the owner of such a PC does not need to know that his work station is a spammer. Many users do not attach much importance to spam: just think, a promotional letter has arrived, delete it - and you're done.

However, not everything is as simple as it seems. Firstly, such emails often contain viruses (usually so-called bots that include your computer in an existing spam network, which, in turn, can lead to it being blacklisted). Secondly, spam mailings generate huge traffic, thus creating a very serious load on network resources. It would seem that the size of one letter is small, but imagine that such messages are sent in millions of copies, and this already seriously slows down the Internet and forces you to pay for extra traffic, especially if your computer is a bot in a spam network. Thirdly, spam emails often contain fraudulent emails. Among them, the two most common types are distinguished - "Nigerian letters" and phishing. The first is so named because of the large distribution in Nigeria and other states of the African continent. Usually in these letters the addressee is asked to help in the implementation of a multi-million dollar operation, for example, receiving an inheritance from a rich uncle, referring to various difficulties in his native country. Nothing is required of you - give a small bribe to an official or open a bank account and put a certain amount on it and the like. Of course, in any case, the victim will not see the promised money, because they simply do not exist. The name of the second type of fraud - phishing - comes from the English fishing, i.e. "fishing". Its purpose is to lure users into confidential information about bank accounts, numbers credit cards, passwords, etc. It works in the following way: you receive a letter supposedly from the bank administration with a request to confirm your data in the near future, otherwise your account may be blocked. It also contains the address of the resource where you need to fill out an online form, which, among others, contains the fields required by scammers. Its design is often made in the style of the real site of your bank, and the address (domain name) may differ by only one or two letters. So when receiving such correspondence, you should be extremely careful.

Hello, dear readers of the blog site. Surely you have already encountered spam, even if you did not know exactly what this disgrace is called. And this is not even necessary. Spam pours with enviable regularity into a regular mailbox - these are the same countless advertising booklets that are slipped to you in the hope that you will order or buy something.

So here it is spam is just there is an annoying, climbing from all sides advertising(but not only advertising - it can be worse). You didn’t order it, you don’t need it, but it rushes and rushes from all cracks. In this heap, the information you need can easily be lost and you have to spend a lot of time sifting it out.

In our computer age, the main source of spam is . Besides advertising spam mailings can also be dangerous both for your wallet (phishing, social engineering, wires) and for your computer (viruses, worms, trojans).

What does the word Spam mean, what it is and how you can fight it, you will learn by looking at this short note. I hope it will be interesting (well, certainly useful - I promise you).

Spam - what is it

What does SPAM mean?

Samo spam word comes from the name of canned meat, which was vehemently advertised after the end of the Second World War (obviously, it was necessary to urgently sell the soldiers' meat rations).

Advertising was so aggressive, comprehensive and ubiquitous that this word (and the “sediment” associated with it) was remembered, but already about the intrusive advertising that appeared along with it in conferences (then still in the fidonet, if anyone remembers).

The word has taken root, especially since intrusive advertising has not become less, but rather the opposite. When e-mail gained popularity, then unauthorized mass advertising and malicious mailings of letters became commonplace. Such mailings were beneficial for spammers, because without special expenses necessary information delivered to a large number of people.

But Email is not limited. They spam in the personal of social networks, on forums, in instant messengers, on bulletin boards, in comments on blogs, it is open for editing and adding text by everyone. They also spam on your phone, for example, by advertising calls or by sending promotional SMS messages.

Where can you find it on the internet?

  1. Email- it's just a Klondike for spammers. With the help of mass mailings, you can sell anything, you can cheat and rob, you can infect computers and send worms. Bases for mass mailings are collected independently (with the help of programs), or bought from those who do this professionally.
  2. Forums, comments blogs, wikis, and message boards - basically everyone is allowed to post here, and it's hard for spammers to stop spamming. This is not always advertising - often in this way webmasters try to get a free link to their site so that it ranks higher in search results Yandex or Google for different requests. This brings them traffic and money.
  3. Social media and dating sites - spam is very common among incoming personal messages. It is also available in the comments to the posts.
  4. Messengers (like ) are also subject to this scourge.
  5. SMS- messages from unknown people of an advertising nature. Probably everyone is familiar.
  6. Search spam- a rather specific thing, but familiar to everyone. Did you have such that you enter a query into Yandex (Google), and in the answers there are entirely sites with some kind of gibberish that have nothing to do with the case. These are the so-called doorways (sites with automatically generated useless texts). They spam the results of search engines, but they earn on visits to them by visitors (in various ways).

Those. all letters in your mailbox (or messages on the forum, comments on the blog, messages in PM) of an advertising or other nature from an unknown sender - this is spam. True, the mailing lists to which you subscribed can also be annoying, but you can still unsubscribe from them (refuse to receive them further).

By itself, spam is annoying and disturbing, because it litters where it appears. Most often this is your mailbox, and it can be quite difficult to separate the wheat from the chaff when there are too many unwanted messages. But spam can also be a real danger to both you and your computer. Let's deal with all this.

We understand the varieties of spam (harmless and dangerous)

From now on, I will mainly talk about spam email messages, because it is this channel that is considered especially susceptible to this phenomenon. Everything else is not so neglected and not so actively used by spammers, and this does not apply to all network users. And here is the problem of their protection from unwanted messages is acute.

Varieties of harmless spam

  1. Advertising of legal goods and services- in this case, the business owner simply chose spam mailings as one of the channels to attract customers and buyers, because it is not expensive, fast and brings results. Naturally, he does not really think about the moral (or rather immoral) side of this matter.
  2. Prohibited advertising- there are goods and services that are prohibited by law from advertising, and for them spam mailings can be the main channel for attracting customers. By the way, spammers also advertise their services with the help of mass mailings, because this activity is prohibited by law. This also includes advertising discrediting competitors, because this is also prohibited by law (praise yourself, but do not scold others).
  3. Impact on public opinion- very often spam becomes a good choice for those who are trying to manipulate public opinion in the right direction. It can be politics, as well as. Letters in general can be sent ostensibly from some person in order to compromise him, change his opinion about him or use his authority for profit. But personally, this does not pose a danger to you.
  4. Letters that ask to be forwarded to others- these can be varieties of so-called "letters of happiness" (send it to 10 friends and you will be happy), or asking to send information to friends for some other reason. Often such emails are used by spammers to collect or replenish an existing email database for subsequent mass mailings.

High-risk spam - what it can be

If normal (harmless) spam can only slightly affect your peace of mind and mental health, then the examples below can be quite dangerous for your wallet or computer. And this is not a joke.

I myself (the one who teaches and teaches everyone) a couple of years ago "bought" a letter of this kind (phishing) and parted with several thousand rubles (read ""). I just wrapped myself up and did everything “on the machine”, just to fall behind, well, and when I realized it, it was too late.

  1. - very effective method deceiving not only gullible, but also simply busy or inattentive people (anyone has his own hook). They send you a letter supposedly from your bank, service electronic money or from somewhere else. In this letter, you are sure to be taken aback by something (unsettled) and asked to log in to the site to solve the problem. You log in, but the site will be fake (although it looks like a real one as two drops) and the data you provided is immediately used to steal all your money.
  2. Nigerian letters- you will find out that you can get a large amount of money (the pretexts are different - from an unexpected inheritance to helping a prince in exile). You do not believe for a long time, but you are convinced. When you believe it, you will be asked to transfer some money for "related expenses." You transfer and no one will bother you anymore.
  3. Viruses, worms, trojans- the letter may contain an attached file with a malicious program (or a link leading to a site with a virus). She can immediately cause problems with the computer or sit quietly in a corner and carefully record all the passwords you enter, logins and other useful things in the household. Worms, among other things, also know how to send themselves to your friends at the addresses found in the Email contacts (as they will then be ...).

Spam Protection

Where do spammers get email databases from?

  1. Spammers (those who produce mass mailings) collect email addresses from all available sources. These can be forums, guest books, chat rooms, social networks and other sites where email addresses can be publicly available.
  2. Hackers manage to get to some databases of addresses stored on websites.
  3. Emails are collected in most cases program method(with the help of search bots - harvesters) and it does not require much effort (only time is not very much). Moreover, such email spam databases you don’t have to collect, but buy them from those who specialize in this business ().
  4. Billions of mailing addresses are registered all over the world, and therefore you can simply try to generate emails using special programs using the appropriate dictionaries. With a high degree of probability, many of them will actually exist. Read below to learn how spammers check the reality of addresses.
  5. There are special worms (viruses) that can send themselves to the database of addresses found on the victim's computer. The base assembled in this way will already be cleared of non-working mailboxes.

How do spammers clean the databases from inactive email addresses?

Those who collect the database of addresses, in fact, do not care who owns this or that address - they send letters to everyone in a row, because there will still be someone who will respond to them (as they say, they hit the squares).

But still, in order to optimize costs and increase the return on mailings, it is beneficial for them to clear the databases of non-existent addresses. How do they do it? Let's see.

  1. The simplest thing is to place a picture in the letter (maybe not even visible - one pixel in size), which will be loaded from the site owned by the spammer when the user opens the letter. If the picture is loaded, then the letter was opened and the email is valid.
  2. Many mail clients (programs for working with e-mail) automatically send a message about reading the letter, which again plays into the hands of spammers.
  3. The letter may contain a link calling to go somewhere, promising mountains of gold. Moved - consider that your Email will now be marked as valid. The most annoying thing is that such a link can be disguised as an unsubscribe button, which in fact will lead to the opposite effect.

How to reduce the likelihood of your email getting into the spam database?

In general, as soon as your mailbox is "confirmed", spammers will not just get off of you. It is important to understand that no one is immune from spam. But it is possible to significantly reduce the likelihood of getting into such a spam database if you take specific precautions:

  1. You can, of course, not publish your Email anywhere at all and not tell it to anyone. But in most cases it is difficult to do, so I advise except for the main box have one or two secondary ones that you will use to register on forums and the like. Often they can come in handy and, which can be obtained without registration at all.
  2. Do not click on links in spam emails (even if there is an "Unsubscribe" button - this is a trap) and, if possible, disable automatic download images in your email client program. There is a chance that your Email will be counted as inactive and mass mailings will not come to it at a hundred per day.
  3. If you have not yet registered a mailbox or are planning to start a new one (for example, due to the complete clogging of the old spam), then proceed not from the convenience and ease of remembering it, but on the contrary, make it more authentic and more complicated. Friends, you will still send it to in electronic format, but spammer programs are unlikely to guess it.

What to do if spam no longer lets you breathe?

These were all preventive measures to combat spam (or rather reduce its amount). But there is the possibility of an effective struggle even in an already completely neglected situation. In this case, it becomes extremely important, .

The fact is that in such large services as or, there are powerful anti-spam filters.

They put all suspicious emails in a separate Spam folder, thereby freeing the Inbox folder from garbage. Yes, there is no perfect spam cutter, and as far as possible, the contents of the "Spam" folder before cleaning it is better to look diagonally for legitimate correspondence. But it's still much easier than digging through all this garbage all the time.

If you have a mailbox on another service, where the spam cutter is useless (for example, as in), then you should not despair. Get yourself an Email on Gmail or Yandex, and then set up mail forwarding to it from your old mailbox. Moreover, these settings can be made as in the old box (i.e., set up forwarding - shown in the screenshot):

Also in the new mailbox, you can configure the collection of mail from the Emails you already have (the screenshot shows the settings for collecting mail in Gmail):

The same can be said about mail client software. Most of them also have a built-in spam cutter.

But in this case, do not forget that on the mail service will have its own spam folder, which will also need to be periodically viewed (or searched there for messages that should arrive, but did not reach - for example, confirmation of registration somewhere is often cut by a spam filter), because mail will not be sent from it to your computer by default (although this can be corrected in the settings of the service or client program).

Good luck to you! See you soon on the blog pages site

You may be interested

Account - what is it, how to create or delete it
How to create an email - what is it, how and where to register and which email to choose (mailbox)
What is Email (E-mail) and why is it called email
How to restore a page in VKontakte (in case of loss of access, deletion or blocking)
CAPTCHA (captcha) - what is it and what is it used for Moon Bitcoin (Litecoin, Dash, Dogecoin, Bitcoin Cash) - earn money on cryptocurrency faucets Should I buy image links?
Dog symbol - why is the @ dog icon so called, the history of the appearance of this sign in the email address and on the keyboard

Do you often receive unwanted advertising messages in your email, but you do not pay much attention to them? This article is dedicated to explaining what spam is and why it should be combated.

And so, first of all, let's answer the question, what is spam?- If in fact, then Spam is advertising messages received that you did not consent to.. Spam is a daily occurrence these days. Many do not even think about the fact that spam is not so harmless.

Spam emails can carry a certain virus, which can harm your computer, and spam creates a lot of traffic, which seriously loads the network. Most often sent to no one the right advertisement, for example, selling windows, training courses, diet pills, making money on the Internet, etc. Addresses for such mailings are collected automatically, without the consent of the mailbox owner, so when you leave your email in an open source, it is better to do it in encrypted form, for example, mymail(dog)mail.ru. True, this method also does not give a 100% guarantee that your address will not fall into the spam mailing lists. How to increase the deliverability of your emails? Read more.

IN Lately There is an active fight against spam. Why is this being done?

Firstly, no one wants to receive unnecessary letters in their mail and permanently delete them. Secondly, many of these mailings are carried out with the aim of infecting your computer with a virus or obtaining some of your confidential data for further action. Thirdly, spam takes a lot of valuable time, for example, in employees of large firms, and this only leads to a loss.

Can spam be avoided?

As mentioned above, you can encrypt your email addresses in open sources. If you are receiving unwanted emails in your inbox, you can use a spam filter. This program is included in email clients and recognizes spam emails by certain criteria. The program analyzes the content of the received email and compares it with the email containing outright spam. The second way is analysis of the IP address from which spam has already been received. True, this method is not particularly effective, since spammers are constantly changing servers to send such emails. In the case when the option of placing a mail domain on a hosting and using your own domain for mailboxes is considered, then you can consider another option with placing protection on the hosting server itself. Many hosters use so-called spam filters on their servers (for example, we use spam-assassin). When properly configured, they are generally quite effective. There are many more ways to detect spam automatically and manually (analysis of the header, rejection of letters from a non-existent domain, determination of mass mailings), but not one of them yet provides 100% protection against unwanted correspondence.

How to make a newsletter so that it does not fall into spam?

  1. The recipients of the emails must be your subscribers or give explicit consent to receive the correspondence. The fewer complaints you receive, the less likely you are to be put on the spam list.
  2. Your letter must have the function “describe from the mailing list” (automatically or manually).
  3. At the beginning of the letter, you need to indicate the name or nickname of the user you are addressing.
  4. Newsletter must be done from the same email addresses and IP addresses.
  5. Indicate the reason why the user received this email (…because you are subscribed to our news, etc.).
  6. Be sure to use the so-called or PTR record for the IP address of the server from which the mailing is done.
  7. Regularly check the presence of the IP address of the server from which you are sending out in spam databases (spamhouse, spamcop, etc.). If the address falls into such databases, it needs to be “extracted” from there and it is imperative to solve the problem due to which the IP was entered there.
  8. If you are using a regular virtual address for your account/website from which you send out mailings to subscribers, it is best to additionally purchase a dedicated IP address.

If your mail or IP is blacklisted by anti-spam, your emails will not be delivered to the recipient and this will negatively affect the reputation of your domain and IP address. Also, do not advertise your site with spam emails. Programs analyze the letter, see a link to your site and mark it as a resource that is advertised using spam. And in the future, all your letters will be defined as spam. Is your IP blacklisted? .

Where did the word "spam" come from?

But in the end, a few facts from history. There is a version that after the Second World War there were huge stocks of canned Hormel Foods, which was intended for soldiers. To sell not very fresh products, the company ran an advertising campaign. The word SPAM (SPiced hAM - spicy ham) was absolutely everywhere, it was in all the newspapers, it was broadcast on the radio. It was impossible to hide from this word. This promotion caused only discontent, since no one was in a hurry to buy canned food.

If you have any questions or additions to this article, please leave a comment. The company is open for communication!

3957 time(s) 5 times viewed today