Friday, May 23, 2008

Merry Christmas From The Ftc A Decline In Spam Up To 9

Writen by Lance Winslow Georgia Hospital

If you were waiting for your Christmas Present from your government for all the taxes you pay every year; for all the fees, harassment and fear purported on your Television Set, well you have finally received it. Merry Christmas from the FTC, a decline in SPAM up to 9%; now aren't you so proud to know that your government is helping to make SPAM decline by up to but not including the nine percentile? What bunch of crap? Nine percent after how many millions of dollars; after over 60 lawsuits and how much government worker's time that we, the American Tax Payer paid for? Only nine percent; I want my money back that is a dismal and pathetic showing indeed. Only nine percent; are you people high? What on Earth are you smoking over there?

You cannot be serious at the FTC, which stand for; "Failed the Consumer" again! The Department of Justice needs a full investigation on all the people that work at the Federal Trade Commission's Consumer Protection Division's Anti-SPAM; CAN SPAM Act group as they have once again failed the American People? Nine percent? Please, that is not good enough, what piss poor performance indeed. What we need to "CAN" is the Federal Trade Commission and their incompetent staff in the Consumer Protection Division. In their recent report to Congress who were they really protecting? Their own butts with a report filled with excuses. Bunch of BS in my opinion, can the FTC. Think on this.

Lance Winslow

Thursday, May 22, 2008

Email Spam Whats The Big Deal

Writen by Dean Phillips Georgia Hospital

It absolutely amazes me how many people over-react to receiving e-mail SPAM.

What is this obsession...this preoccupation with SPAM?

Where are our priorities?

When it comes to SPAM, many of us are ready to support the severest anti-SPAM legislation. Yes, we want to lock up all the spammers and throw away the key! Haven't we learned by now that inviting the government to get involved with anything is a recipe for disaster?

I personally receive a couple hundred e-mails every single day. Approximately half of that is SPAM. Want to know how I deal with the problem? I hit the "delete" button and just like that, no more SPAM!

And since I have high-speed cable access, it literally only takes me a few minutes to make a hundred uninvited SPAM guests disappear. No problem!

I don't let SPAM annoy me or upset me. And I certainly don't let it ruin my day.

When you let SPAM annoy or upset you, all you're doing is letting the spammers win. However, when you use the delete button, you win! You've got the power to delete. Why not use it?

What's so hard about doing that? It's certainly a lot easier on your emotional well-being than getting upset over the situation.

Simply view SPAM as one of those minor annoyances of every day life--like reality television shows, and learn to treat it as such!

About The Author

Dean Phillips is an Internet marketing expert, writer, publisher and entrepreneur. Questions? Comments? Dean can be reached at mailto: dean@lets-make-money.net

Visit his website at: http://www.lets-make-money.net

Wednesday, May 21, 2008

Beware Of The Newest Activity Online Phishing

Writen by Tamara Baruhovich Georgia Hospital

No. I'm not talking here about the outdoor activity enjoyed by many. And no again; I did not misspell it. Phishing is the name given to the latest online scam where millions of unwary Americans are getting their identities stolen.

This fraudulent activity is considered the fastest growing crime of modern times. The favorite target groups of phishers seem to be very young children and senior citizens, as they do not often ask for credit reports, fill out credit card applications or solicit loans. This allows the thieves to go undetected for longer periods of time; but still, be careful. We all are potential targets.

Remember when throwing away unshredded documents with personal information in the trash bin was considered a big risk for identity theft? While this still happens, identity thieves have become more sophisticated in recent times, and this is how they do it…

Phishers create bogus e-mails that look as if they came from large, well-known institutions and banks, such as eBay, Paypal, Citibank, EarthLink, and Wells Fargo among others. These e-mails claim that you are due for an account update, or that the account number, password, social security number or other confidential information needs to be verified. Then they warn you, stating that if you do not do it within a certain period of time, that your account will be closed, terminated, the service discontinued, or something to that effect.

They even provide you with links to websites that look legitimate, because they hijack the real logos of these well known banks, and trusted institutions and companies. And that is the scary part… these e-mails look 100% legitimate, but they are not.

In some cases it goes even further… some of these phishers are installing spyware on your computer to monitor your online activities. So… should you leave the online world for good? Not necessarily.

These are a few things you can do to protect yourself from these scammers:

1. Do not respond to any e-mail that asks for personal information from you, such as account number, credit card number, user names, passwords, etc. If you suspect that the e-mail, indeed, be legitimate, contact your bank or institution to verify this.

2. When in doubt, visit the Anti-Phishing Working Group for an update of the latest scams, and tips to avoid becoming a victim. The website's URL is www.antiphishing.org

3. Websites like www.Paypal.com, www.citibank.com, and www.ebay.com, offer security tips and tell you what information they'd never ask for in an e-mail.

4. Get anti-virus software and keep it up-to-date.

5. If you suspect you have received a fraudulent e-mail, do not click on any links within it, and forward it to the FTC at uce@FTC.gov

Finally, if you suspect you've been a victim of this fraud, get a copy of your credit report immediately to check for unusual activity. If you discover that you've been a victim of identity theft, close your account at once and…

- Call the Credit Bureau.

- File a police report.

- Call the FTC ID theft hotline at (877)IDTHEFT.

- Alert other financial institutions where you have accounts.

According to the Anti-Phishing Working Group, phishers send millions of e-mails a day, getting about 5% response. Even with this low response, it is estimated that about 150,000 Americans have fallen prey to these scams since May of 2004. Get informed. Do not become a victim yourself.

==============================================

You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included. A courtesy copy of your publication would be appreciated.

E-mail: marketingplanet1@aol.com
November, 2004.

==============================================

Tamara Baruhovich is the author of "Straight Talk about Network Marketing" A no hype, no B.S. e-course that shouldn't be missed if you are serious about starting a successful career in Network Marketing! Get your complimentary copy here… e-course04@aweber.com

Tuesday, May 20, 2008

Block Ads Defeat Popups And Stop Quotpage Hijackingquot

Writen by Jim Edwards Georgia Hospital

You're not alone!

Who hasn't surfed the web looking for information only to have their session interrupted by those annoying pop-up windows displaying everything from banner ads to newsletter sign-up's?

Though pop-up windows and other methods of influencing a user's online experiences originally had positive intentions, they now seem only to annoy and manipulate users at every turn.

For anyone who ever felt extremely irritated by online advertising, the following advice should help.

** Pop-Up Ads **

Pop-up windows open new pages in your browser without your permission and, sometimes, without your knowledge.

They slow down your surfing and cause confusion, even for the most experienced surfer.

If you don't want to see pop-up windows in your browser, you should get a free pop-up blocker like the ones that come with the Google tool bar (http://toolbar.google.com) or the Alexa tool bar (http://download.alexa.com).

Either of these free tools "plug in" to your web browser and will stop the majority of pop-ups, including the situations where 5 or 10 pop-up windows fly up on your screen and "attack" you all at once!

** Page Hijacking **

Have you ever surfed along peacefully when all of a sudden you hit your back button and nothing happened?

Click-click-click - no matter how many times you hit the button, it seemed your web browser had been "wheel locked" to a certain site and no amount of effort allowed you to back track.

This nasty little trick, otherwise know as "page hijacking" involves inserting a small bit of code into a web page that disables your browser's "back" button.

To defeat this little nasty just click and hold the down arrow next to your browser's "back" button (on both Internet Explorer and Netscape) to see a list of the last few pages you've browsed.

Click on a link in the history list to free yourself and resume surfing.

Careful though, you may not have been hijacked, you may have been the victim of the next dirty trick.

** Fast Meta Refresh **

A predecessor of the pop-up window, the fast meta refresh trick involves opening one page and almost instantly having your browser redirected to another page.

This tactic, often used by search engine promoters, often leads to wasted time on pages that have little relevance to your search.

It may also entail opening five to ten additional windows, frequently displaying offensive material such as pornography.

Closing all your browser windows and starting over seems the only sure-fire way to defeat this tactic. Hitting your back button to retreat from the problem will usually just cause more windows to appear.

Quick Tip: If you find yourself attacked by multiple pop-up ads, hold down the key and hit the key repeatedly, all the web browser windows on your screen will disappear faster than new ones can pop open.

If you feel a website operator appears to openly abuse visitors with annoying or unscrupulous tactics, feel free to complain to their hosting company or the search engines.

By doing so you might save the next person a whole lot of inconvenience.

(c) Jim Edwards - All Rights reserved - http://www.thenetreporter.com

About The Author:

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr-e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"

Monday, May 19, 2008

Are Aol And Yahoo Rabid Extortionists Or Just Plain Stupid

Writen by John Sylvester Georgia Hospital

Today I met a client for lunch. He runs a ticketing agency in Vienna and complained about confirmation emails not getting through to customers with an AOL or Yahoo email account.

In an article he recently stumbled upon, it referes to: "AOL and Yahoo are planning to begin charging what amounts to postage for those sending multiple email messages to their subscribers." Although they're positioning it as an anti-spam measure, it will have the effect of hampering the distribution of free information by small and non-profit publishers.

It goes on to say: "It's not only mass emailings that would be affected by the system. Order confirmations...that send large amounts of email would be treated as trash under the new system unless the fee was paid."

They use the future tense, whereas my client says that customers are now either complaining about not getting confirmation messages or turning up in Vienna without knowing where to collect them from, thus making his business look inefficient.

Another client recently complained that emails to partners in his weekly lottery are never received now if the email is sent from his commercial account to AOL.

It would be polite, if nothing else, if these two corporations would at least inform businesses about their dodgy business tactics which are already in operation.

What this means is that the quasi-rich guy can send a free email to another quasi-rich guy, but if he wants to communicate with a quasi-poor guy, he has to pay for it. Logical!

My client said that if he posted a letter he would have to pay the post office for its services and hence he didn't mind paying a fraction of that online. But snail mail doesn't have corporate advertising on it for one thing and at least he is asked to pay for the stamp, rather than the mail not being sent, which is what is happening with AOL in particluar.

Many publishers and organisations that send large amounts of legitimate email might now urge their readers to switch to Google or Microsoft email or other services that don't levy a fee on senders. Or we can all set up AOL and Yahoo accounts and send commercial mail from those accounts.

This is possibly one of the most stupid online business plans that has ever been ill-thought-out. Does this means that, for example, a ticketing agency will have to scan their database and inform AOL and Yahoo that they plan to send a confirmation letter to a customer, micro-pay a quarter of a cent to both, before they do the mail-out?

Media Director of V9 Design & Build (http://www.v9designbuild.com), providing both local and outsourcing web and SEO services: we provide both brochureware and custom-designed websites, with tasteful design and branding, professional design and build, proven and successful SEO and e-marketing, e-commerce-driven database integration and content management systems.

Sunday, May 18, 2008

What Exactly Is Spam

Writen by Matt Bacak

Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. It is most commonly used in advertising, but it is also used to perpetrate religious, political or other types of messages. Spam is, often times, considered the electronic equivalent of junk postal mail, telemarketing or broadcast faxing. Spam got its bad name and reputation from the advertisement of ill reputable and questionable products, such as pornography, pyramid schemes, fad products, pump-and-dump stocks, etc.

Spam is delivered via several mediums, to include:

· E-mail messages

· Search engines

· Instant messaging

· Web blogs

· Usenet newsgroups

· Text messaging mobile phones

· Internet telephony

The growth of spam is a result of the cost benefit to initiators, who need only devise and develop distribution lists. The other associated costs of spam, such as bandwidth, message management and loss of productivity, become the responsibility of recipients of the messages, ISPs or other public and private entities.

In 2003, the US passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003, which establishes standards for sending commercial e-mail. More specifically, the act is intended "to regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited, commercial electronic mail via the Internet". The act establishes the Federal Trade Commission (FTC) as the overseer of its provisions.

The act establishes electronic mail as extremely important in communication since it "provides an opportunity for the development and growth of frictionless commerce", which is being threatened by unsolicited commercial email. The act establishes the following as criminal behaviors when used in connection with foreign or interstate electronic mail:

· Knowingly accessing a protected computer without authorization

· Intentionally deceiving or misleading the origin of messages

· Falsifying header information

· Falsifying registration information for 5 or more e-mail accounts or 2 or more domain names

· Falsely representing one's self as the registrant of 5 or more IP addresses

· Obtaining e-mail addresses through improper means

· Perpetrating fraud, identity theft, child pornography, obscenity and the sexual exploitation of children.

Criminal penalties include a fine and/or imprisonment for up to 5 years dependent upon:

· The volume of electronic transmissions

· The amount of falsified information

· Losses incurred by others

· Monetary gains from the act

· Whether the act was committed in furtherance of an felony

· Prior offenses.

Civil penalties are dependent upon the jurisdiction placing the charges and may range from hundreds of dollars to millions of dollars, dependent upon the severity of the crimes and losses involved. Also, property traceable to proceeds from monetary gains and equipment used to commit an offense may be forfeited to the US government.

As critics of the law argue, the legislation fails to dictate to marketers and advertisers, not to spam. In fact, the act does not make reference to the term, "spam", except as used in the name, CAN-SPAM. The act makes reference to the phrase, commercial electronic mail message, and defines it to be "any electronic mail message, the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose)".

Legislation is intended to curb practices inherent in spamming, such as e-mail harvesting, dictionary attacks and using viruses and Trojans to perpetrate messages. The act establishes the following with respect to commercial electronic mail messages:

· A message must contain a legitimate return address.

· A message must include and specify a method to opt-out of receiving further messages. The ability to opt-out must be available for 30 days.

· The sender may not initiate messages after 10 days of receipt of an opt-out.

· The sender may not sell, lease, exchange or transfer the opt-out e-mail address to an affiliate.

· The sender may offer a menu of options that allow the recipient to either opt-out or opt-in to future messages*.

· A message must include an identifier that specifies the message as an advertisement or solicitation.

· Messages containing sexually oriented material must contain clearly identifiable markings or notices

· A message must include a valid, physical, postal address by which the sender may be contacted.

· The sender may not send messages to addresses that were knowingly acquired from proprietary websites and ISPs, through automated methods. Particularly, when the site or ISP provides notice of their refusal to give, sell or transfer addresses for the purpose of initiating electronic mail messages.

· The sender may not create automated scripting and other means to gain multiple email addresses for the purpose of transmitting illegal messages.

· The sender may not transmit messages from a computer or email address obtained without authorization.

*Unlike opt-out advertising, which allows the recipients of advertisement to discontinue any unwanted advertisements from the sender, opt-in advertising allows the advertiser to request to have specific advertisement sent. The recipient may allow or deny permission to have further advertisement sent. If allowed, the advertiser immediately includes that e-mail address to its distribution list. Another option is, double opt-in advertising, which is similar to opt-in advertising except that once the recipient grants permission to send advertisements, a confirmation request is sent to the recipient to verify that they did, indeed, allow the permission. The e-mail address is added to the distribution list only after the recipient has positively responded to the confirmation request.

CAN-SPAM is not intended to provide cause for the general public to sue spammers, individually or in class action suits. It is designed to allow enforcement by the FTC and other federal agencies for the benefit of the general public. Individuals remain privy to the state laws and regulations of their particular jurisdictions.

Matt Bacak became "#1 Best Selling Author" in just a few short hours. Recent Entrepreneur Magazine's e-Biz radio show host is turning Authors, Speakers, and Experts into Overnight Success Stories. Discover The Secrets To Unleash The Powerful Promoter In You! Sign up for Matt Bacak's Promoting Tips Ezine ($100 value) just visit his website at http://www.powerfulpromoter.com or http://promotingtips.com

Georgia Hospital

Saturday, May 17, 2008

No More Spam In Your Email Inbox

Writen by Rodger Cresswell

Spam was once simply just a nuisance but now has become a serious problem for individuals and businesses alike. It is estimated that as much as 80% of e-mails circulating on the internet are spam. Besides clogging networks and facilitating the spread of viruses or fraudulent schemes, spam is a major factor in undermining trust in the Internet, thus slowing the growth of the digital economy.

There was a time when we received so much junk through the land mail that it made you wonder how long we would have trees left on the planet. Something had to be done about it and thankfully the preference services came to the rescue. Not only can we reduce the amount of junk through the letter box but we can now stop most of those annoying telephone sales calls.

In business especially, email began to take over from land based mail. Remember how good it felt to receive that first email when you first set up your email account? Then the second arrived and as your friends and work contacts got to find you, you had to allocate time to respond. But wait, why is it taking so long for my emails to come over from my server? Have I become so popular that I have to go over to Broadband to cope with the volume of my mail? Eventually the server stops the mail drop and I get chance to look. Eighty percent junk! Trouble is the junk kept increasing in volume. Not only companies and individuals from your own country sending the stuff, but now it is from all parts of the world. Adding to the problem is that many could be carrying a virus, could be threatening, pornographic or trying to solicit bank account details. Time is money and it takes time to check through and delete the rubbish before you can start work on the genuine emails.

Once more something had to be done. Spam filtering software came onto the market but the mail had to be downloaded to our e-mail inbox before this filtering. Then thankfully the larger ISP (Internet Service Providers) took on the task of filtering the mails before we downloaded. This had a dramatic effect on the number of mails left to download.

Like virus protection, it is a continuing battle with the junk mailers changing their mails to get through the filters. The junk emailers do all they can with titles and content to fool the filters with the inevitable result that some spam still gets through.

Now there is a simple and inexpensive solution that enables you to receive just valid email. Services such as Spam Arrest make this possible. It does not require that you install any software on your own computer. The first time that you are sent a mail from a new address, the sender receives a one time request to visit a web site that addresses them by name. They are asked to confirm they sent the mail and type a word that is displayed in an animated image that automated spam programs cannot decipher from this image. You then have the chance to vet the rest and block further mails from undesirable sources. Eventually, the vast majority of mails you receive will be the genuine and useful emails that you want to see.

Rodger is Managing Director of Avondale Consultancy Limited (http://www.acltd.demon.co.uk/get-a-spam-email-filter.htm), author of Stress Relief (http://stress-relief-methods.blogspot.com/) and Consultant to JC Regali (http://www.jcregali.com/), on-line retailer selling a variety of quality products. Magnetic Jewellery, Self-Help Health Solutions, Hair Care Product and Equipment for the professional salon and home user, Beauty and Home Products, Small Kitchen Appliances and Candles

Georgia Hospital

Friday, May 16, 2008

Stop Spam

Writen by Peter Emerson

Spam has become a major nuisance to e-mail users and computer technology experts. Sending irrelevant and inappropriate messages, basically for advertising purposes is a bane on the Internet. But yet, people feel they are part of Internet and that it is something you just have to accept as one of the negative aspects of electronic mail.

But you need not think spam is unavoidable. There are many different ways of avoiding and fighting spam. And it is also very necessary that you fight it and eliminate it from your system. One way of doing it is by having dummy email addresses using Spam Gourmet or Yahoo's disposable addresses. This will effectively help you to fight spam as you will be providing this address to little known websites instead of your primary email address. If you get spam in your dummy address, you can just stop using it and not worry about it anymore. And you have to click the 'This is Spam' link if you have one in your email inbox. This will help in developing newer anti-spam filters to combat even the latest spam.

Another very simple way of avoiding spam in your inbox is by having a secondary email just for your web transactions. Use your primary email id only for very personal and professional purposes and share it with people you know. You can even choose not to put it on your personal website as spam users may pick it up and use it to their advantage. And once you receive spam mail, clicking the 'Remove your email address' is extremely ineffective as it only confirms that your email is active.

It is very important not to open emails from people unknown to you. Even if you do open an email from an unknown person, and discover the content to be useless, please do not reply to the message.

If after all these precautions, you are still getting spam mail, let your ISP know immediately and register a complaint at the spammer's ISP. And install anti-spam software in your system without further ado. The combined efforts of your software and the ISP tracings of the spammer will stop the spam flow into your inbox.

Stop Spam provides detailed information on Stop Spam, Spam Filters, Spam Blockers, Anti Spam Software and more. Stop Spam is affiliated with Free Spam Filters.

Georgia Hospital

Thursday, May 15, 2008

How To Avoid Spam Complaints In Your Emails

Writen by John Lynch

Spam filters are responsible for deleting a high percentage of legitimate business emails from people who have no wish to spam. Here are some tips to avoid spam complaints in your emails or ezine.

Avoid the following triggers in your emails.

1. Excessive use of ALL CAPITALS in the subject line and body of your email.

2. The use of words like "free"(used alone or in combination with words like "trial","money", "quote", "sample", "membership", "access" etc.) Other more obvious word to avoid include "sex", "XXX","spam", "$$$", "checks", "money", "extra income", "as seen on TV". Even seemingly harmless word such as "search engine listings", "cable converter", and "reverses aging" will get you in trouble.

3. Excessive use of exclamation marks "!!!"

Tips for Staying on the Right Side of Spam Filters

1. Use words like "news", "newsletter", "list" in your subject line.

2. Say how often your ezine is published in the subject line - weekly, monthly.

3. Put date of newsletter in subject line.

4. Put issue number in the subject line.

5. Ensure your newsletter is a proper ezine with some substance in the text.

To help identify spam in your emails/ezines use the following spam checker always before you send anything out.

http://www.merchant-account-service.com/stop_spam_mail.html

Above all, use your common sense. We know what spam looks like, so avoid anything that resembles it in your ezine.

(C) John Lynch

For a free spam test on your emails or ezines go to: http://www.merchant-account-service.com/stop_spam_mail.html

Georgia Hospital

Wednesday, May 14, 2008

Do You Know Whats In Your Trash

Writen by Judith Kallos

A hearty welcome to all the spam fighting filters and programs created to rescue us from the deluge of unwanted e-mail! There is practically a "solution" for everything. But as with most online "solutions" filters and programs are only tools that users need to make some effort to use properly to reap the benefits.

You have to learn how to use these programs to your advantage or you can experience the unexpected downside. How can there be a downside when we're talking less spam you say? Unfortunately, all too often legitimate and expected e-mails are being eaten by filters and are ending up in the trash!

Twice this week I received terse e-mails from new clients awaiting my response on certain issues. Because they were new to working with me, they didn't know that I usually respond within an hour to most e-mail. My responses were not returned as "undeliverable" so what happened? Where are they? In both instances I called my clients only to find my messages had inadvertently landed in their junk or trash folder because of their ISP's filtering systems.

When communicating with clients and in my day-to-day communications, I do not go to extremes to alter certain words that may trip filters in my day to day communications. With folks I know, that shouldn't be an issue because they are supposedly expecting my e-mail. In addition, I always instruct new clients and subscribers to add me to their address book, approved or white list.

Plus as I am sure you'll agree, you've seen all those funky ways of spelling certain words with characters or spaces that are unnatural. I believe they ruin the flow of your message because the reader can't help but take pause to notice.

Before you send off a terse e-mail complaining or assuming no response, be sure you have covered the following:

1) When you know you will be communicating with a specific person on a regular basis, make sure you add them to your approved list or address book as soon as possible. Many onliners now use Web based e-mail such as Yahoo! and MSN that allow them to control who they receive e-mail from. Just as the majority of ISPs now give you the ability to filter e-mail based on level of spamminess or by adding e-mail addresses to your list so they can get through. Be sure to use these tools to avoid trashing wanted e-mail.

2) Same goes for Web sites or eZines you sign up for. Add their dot com to your list as soon as you sign up. Most legitimate eZines use a double-opt in subscription process that requires you respond or click on a link within an e-mail from them before you get formally added to their list. If you don't get that e-mail to respond to it—you will not be added.

3) Before you empty your trash or junk folder—go through the trash! Take a quick peak and look at the Sender: and Subject: fields to see if names are familiar or for a topic that is expected. Otherwise you risk wanted e-mail going out with the trash!

Three simple little steps can help ensure the e-mail you do want lands in your inbox. The e-mail you are waiting for may have already arrived!

About the Author:
Judith Kallos is an authoritative and good-humored Technology Muse who has played @ http://www.TheIStudio.com for over a decade. Check out her popular Software, Programming and Web Design Cheat Sheets @ http://www.LearnAndThrive.com

Georgia Hospital

Tuesday, May 13, 2008

Adware Filters

Writen by Josh Riverside

Many people wonder what adware is, how it gets into their computer systems, and what its effects are. If you are an Internet user, your computer is most likely to have been infected by an adware program. Furthermore, if you have downloaded freeware or shareware from the Internet, it is almost certain that you already have adware installed on your computer.

These forms of adware are generally harmless and are sometimes required for certain programs to run. However, adware can also include spyware components, which make it a dangerous presence on your computer.

Without help, there is no way for you to prevent the installation of adware n your computer. Some older antivirus programs do not detect the presence of adware simply because they do not consider them a virus or worm. You will need newer antivirus programs to specifically target adware and spyware. Today, there are also adware filters available for sale or download.

Adware filters are essential to computer security. They automatically remove programs that attempt to install adware into your computer. They also block the download of programs that contain adware.

Some Internet service providers offer adware protection to their customers by providing them with a built-in adware filter, which is activated when the user is browsing the Internet. However, to take advantage of these filters, customers will need to upgrade their anti-adware programs and keep their anti-adware signatures updated.

Most adware cannot be installed without your permission. However, certain software may trick you into clicking a link that will download adware to your computer. Links that install these adware and spyware programs can be very misleading, so you have to be extra attentive around them. The only way to prevent infecting your computer with adware is to install software from trusted sources or those you know to be adware-free.

Adware provides detailed information on Adware, Adware Alerts, Adware And Spyware, Adware Filters and more. Adware is affiliated with Best Pop Up Blockers.

Georgia Hospital

Monday, May 12, 2008

Avoiding The Impact Of Spam

Writen by Jonathan Coupal

Executive Summary

Unsolicited commercial email, also commonly known as spam, has developed a negative reputation because it is at best a waste of valuable time and at worst an offensive intrusion into one's desktop. It is estimated that 56% of all mail that passes through the Internet is spam which is an increase of 40% from one year ago today. In addition, it is estimated that spam costs an average of $874 per employee per year, with a loss of approximately 1.4% of productivity due to managing spam on the desktop.

Introduction

Internet email is an electronic system through which messages are transferred between systems on behalf of their users. It is a trusting system in that the mail server will deliver a message to the receipt that it is addressed to. This level of trust becomes a problem when anyone in the world can send an email to anyone. Individuals and organizations that send unsolicited email (spammers) are taking advantage of this trusting system.

Currently, there is very little that can be done to prevent spammers from creating and sending emails. At this time, the only effective remedy to this nuisance is implementing a filtering system to aid in the management of spam.

Determining the Nature of Spam

It is fairly obvious to a person who is reading an advertisement for Viagra that the message is spam. However, to a computer the email is just strings of numbers, letters, and symbols. This is the first challenge in the process of managing spam: how to get a computer to analyze these strings to recognize and differentiate the welcome from the unwelcome emails.

The simplest method for avoiding spam is to only accept mail from authenticated senders. This is easy to implement but would result in the receipt of almost no email from outside organizations. This is due to the trusting nature of the email system which treats every incoming connection as a valid connection. Building a "white list" of known peer servers from trusted organizations (i.e., business partners and clients) is, unfortunately, impossible to maintain for a large organization.

One method for determining whether or not an incoming message is spam is by testing the sending server for full compliance with RFC 2821 and correct DNS setups. RFC 2821 is the specification used to describe how messages are to be sent between SMTP mail servers, and the correct DNS setups have to occur with the cooperation of the ISP who owns the IP address assigned to the mail server. This method of testing for compliance with the RFC's and collaboration with the sender's ISP allows the receiving server to block the incoming connection once it has determined that the sending server is probably not a mainstream server. This system works because, traditionally, many spammers have built very basic bulk emailing engines, and many of these engines are so poorly constructed that they are barely capable of sending mail at all. The downside to this method is that there is a high likelihood of a false positive when interacting with some open source or low-cost email servers.

Freeware code or low cost systems are commonly used by small organizations for budgetary reasons. Another issue with this method is that many spammers send their mail through valid mail servers that have been inadvertently left available to act as relays (mail forwarders), and the relay servers will pass all of these initial configuration tests.

Another common manner of avoiding mail classified as spam is to identify the sending server as it attempts to send mail by using a third party mechanism called a Blacklist server. These servers, such as the Open Relay DataBase or SpamCop, offer a free service by holding databases of identified addresses of numerous spammers and open relays. When a mail server attempts to send mail, a simple query of one or more of these services is typically sufficient to reduce the volume of spam by 25%. However, these services are not perfect and can result in false positives or negatives due to either overly aggressive databases or latency in reporting. For instance, one of the most reliable databases of server addresses, ORDB.org, only tests to see if the server is misconfigured as an open relay. If a spammer sends mail from a properly configured server or from one that has not yet been reported, then the mail will pass this test. In addition, many companies have had difficulty getting their valid servers out of these databases, which causes an issue with irresolvable false positives.

A third way for determining spam is through the use of content filtering. This method involves the filtering of mail by matching it against a list of words or phrases. This list of words and phrases is maintained on the server either by the local system administrator or through a subscription service. Although this method was popular several years ago, spammers have become adept in avoiding these filtering engines by masking their content with misspellings. In order to keep the list accurate and up to date, the system administrator or keyword service must continually increase the size of the list. This particular method tends to be fraught with false positives and false negatives. For example, one mail user might actually be using Viagra that would result in a false positive, and V1agr@ is still Viagra that would result in a false negative. This filtering method is considered by most as ineffective at filtering out anything but the most offensive email.

A final method of filtering spam is Bayesian filtering which is a very successful variation of keyword filtering. This method differs from traditional filters as it utilizes a statistical method for filtering messages based on the content of the message and the end user trains the system by providing feedback on what is and is not spam. Based on this feedback the filter builds an index of all of the words and phrases, including misspellings, which tend to occur in messages indicated as spam. The main reason this system operates better than conventional keyword filtering is that it is able to filter a message that misspells the primary keyword phrases or words. Essentially, if the spammer misspells everything in the message, then it cannot get through. The only significant drawback to this system is that there is a delay in implementation due to the need of training the system, and there is an ongoing need for the end users to inform the system of false positives and false negatives. The advantage of this system is the frequency of the required feedback declines over time. Also, the system reacts quickly to spammers new techniques because it is constantly learning based on feedback from the users.

Handling Spam

Once a message has been identified as spam, the recipient must determine how the message will be handled. One approach is to refuse to accept the message once it has been identified, or to delete the message before it is delivered to the end user. This method, although a common method for implementing controls on a mail server, carries the risk of deleting a valid message that has been improperly identified as spam.

An alternative way of managing spam is to clearly identify the message as such. This involves inserting an identifier of some sort into the header or subject line of the message that identifies it as spam. For instance, a spam filter can be configured to insert the word [SPAM] into the subject line so that the recipient can see the message and manage it appropriately. Once the message is identified, it is simple enough to set up a rule or filter on the mail client that will automatically sort the message into a folder marked "spam". The end user can periodically review the messages in this folder to identify any false positives.

Implementing a Filtering System

Building a method for determining whether or not a message is spam is not sufficient, and until there is a major revision to SMTP, one that is less trusting, a mechanism needs to be built to somehow filter the spam out of incoming mail.

The simplest manner to accomplish this is by purchasing a spam-filtering appliance. This mechanism would be installed in front of the organization's current mail server and would serve as a relay that would filter out spam as it passes through the server. Although this "black box" system is easy to implement, there are a few issues that might prompt a system administrator to look elsewhere for an alternative solution. The first notable issue is that these systems typically require some sort of subscription service to maintain functionality. Second, the level of control or optimization available is minimal and limited to the features or options planned and implemented in the appliance's system. Aside from its ease of installation, this approach allows for very little change or adjustment to the systems that are already in place.

Another approach similar to the appliance method would be to implement filtering software in front of the mail server. Once the software is selected it can be installed on a mail server or on the same system as the organization's existing server. The software acts as a relay server, forwarding and filtering messages into the existing mail server. Since this is a software-only solution, there are a few advantages over the appliance solution. One significant benefit is that there are a wide variety of software solutions offered. Another advantage is that this mechanism can often be installed directly on the mail server itself, avoiding the cost of maintaining another system. This system has the same disadvantage as the mail filtering appliance in that it is another system for the administrator to maintain.

Many of the more robust mail server systems implement some sort of spam control mechanism directly, as part of their receipt and delivery function. This is very easy to use and implement, but is dependent on how well the filtering mechanism was implemented in the mail server's system and which method might be available. The advantage to this is tight integration with the mail server. For instance, if a mail server receives a message that is deemed spam, it may automatically reply with a message stating that the "user does not exist". This may help to decrease the likelihood of the spammer sending additional messages to the address, but other systems that relay messages might not be able to provide this level of filtering.

Another approach for implanting a filtering system is spam control software being installed as a component of the mail client itself. Using this mechanism is simple and inexpensive to implement, but works differently than some of the server-based controls. For instance, some of these software controls simply key in on the sender's email address and mark anything from an unknown sender as spam. In addition, many of these systems require a subscription to maintain keyword lists, as Bayesian statistical techniques are not effective for a single user's small volume of mail messages.

An alternative option would be to outsource the entire filtering mechanism to an outside organization that specializes in mail hosting and filtering. This is a cost-effective approach, because it is often much less expensive compared to the purchase and implementation of a software filtering system on-site. In addition, outsourcing the function makes change very easy; if a third party provider does not provide sufficient or accurate filtering, then the provider can quickly be changed. This level of freedom is not available when a solution is purchased for local installation.

End User Training

It is important to train end users on how to handle spam when it comes into their mailbox. A few simple rules can be sufficient to help to reduce the ongoing impact of spam:

1. Regardless of the circumstances, a user should never respond to spam. Responding to the message tells the spammer that the email address is valid and makes the address worth more than it did before. In fact, one is more likely receive more spam after responding to try to get off the spammer's list.

2. Avoid viewing or previewing spam. There are telltale markers embedded in HTML-based spam that helps to identify that the message was actually read.

3. Don't forward spam to a colleague, especially if utilizing a Bayesian filtering system, as this will lend validity to the content of the message.

4. Be judicious in how an email address is handed. Filling out every form on the Internet with a personal or business email address is bound to result in the receipt of more spam messages.

5. Take email addresses off from a personal or business website and replace them with forms that send email in the background from the web server via cgi. There are automated programs that simply scour the web for email addresses that might be embedded in web pages.

About ITX Spam Filtering

ITX offers a hosted anti-spam solution that provides a blended method of identifying and handling spam. Acting as an SMTP relay for incoming mail, ITX's mail server starts with an identification of the sender by IP address and submitting for reference to a blacklist database from ORDB.org. Next, the content is checked for relevancy in a fully trained Bayesian database. These factors are combined to determine, with 99% accuracy, whether or not the message is truly spam. Messages identified as spam will be marked as such in the subject line, checked for virus signatures, and forwarded on to its final destination. Unlike most providers, ITX has a strict policy of never deleting or refusing mail that is earmarked to a client.

This conservative, blended approach has proved to be a stable and reliable solution that has been extensively tested in a production environment. Anti-spam filtering is available to both ITX mail hosting clients, along with POP3/SMTP services, and to Spam filtering clients as a relay mechanism.

About ITX

ITX is a business consulting and technology solutions firm committed to consistently providing superior products and services in nine practice areas including Business Performance, IT Solution Strategies and Implementation, Internet Marketing, Technical Services, IT Staffing, Internet Services, and Technology Research.

It is through the total commitment to process and quality that ITX combines the highest level of resources and expertise to ensure our clients operate effectively and efficiently. ITX's ability to leverage the proper mix of skills results in providing high quality technology services and solutions both quickly and at a competitive cost. ITX clients return again and again for scalable products and services that perform reliably and assure a significant return on investment.

About Jonathan Coupal

Jonathan Coupal is the Vice President and Chief Technology Officer of ITX Corp, a business consulting and technology solutions firm based in Rochester, New York. Mr. Coupal manages both the day-to-day and strategic operations of the Technology Integration Practice Group. Among Mr. Coupal's greatest strengths are evaluating customers' unique problems, developing innovative, cost effective solutions and providing a "best practice" implementation methodology. Mr. Coupal's extensive knowledge and experience enables him to fully analyze client systems to recommend the most effective technologies and solutions that will both optimize their business processes and fulfill immediate and future goals. Mr. Coupal and his team build a high level of trust with clients, establishing ITX as their IT partner of choice. Mr. Coupal holds certifications with Microsoft and CompTia, including MCSE, MCSA, Security+, Linux+ and i-Net+, and served as a Subject Matter Expert (SME) for the development of the CompTia Linux+.

Georgia Hospital

Sunday, May 11, 2008

Stop Intrusive Popup Ads And Regain Control Of Your Online Experience

Writen by Jason Frovich

Stop intrusive pop-up ads and regain control of your online world! Intrusive and distracting pop-up windows are not an unavoidable part of being online. You don't have to put up with offensive, time consuming and bandwidth stealing pop up ads. Visit Supportcave.com today to try out some of the most sophisticated pop-up blockers on the market - for free! Make screen cluttering pop-ups a thing of the past by installing a pop-up blocker right away.

- You enter a webpage, and suddenly your window is filled with a myriad of annoying new little windows, multiplying like amoebas and cluttering your entire screen. Every time you click on a window to shut it down five more windows are opened, ultimately making your computer freeze or even crash.

- You try to read a friends' webpage located at a free web hotel, but every time you click on a new link the screen is smothered with commercials about mortgages, miraculous diet pills and MLM-marketing.

- You use a search engine to find information, but when you click on the top link you are suddenly faced with x-rated pictures and very graphical commercials for generic Viagra.

Do any of the above scenarios sound familiar? Unfortunately most of us can answer YES! to that question. While using the web we are constantly targeted by commercials, and a lot of them come in the form of intrusive and distracting pop-up windows. They are however not only annoying, they are also stealing valuable bandwidth and slowing down our browsing; thus making our time online less effective. In the long run, these pop-up ads are making the whole Internet much slower than necessary, costing the users time as well as money.

Fortunately pop-up ads are not at all an unavoidable part of the Internet. There are several programs available online that once installed will block all forms of pop-up ads. These programs are known by many names, including pop-up blockers, pop-up stoppers, ad window blockers and pop-up removers. They all work in a similar way, but are not identical.

Most of them offer you the ability to start of by using the general settings, and then later customize the program to flawlessly match you specific needs and preferences. Stopzilla, for example, is a very user friendly program constructed with the novice user in mind. Still, it offers you the ability to tailor the program for your self later when you have become more accustomed to it. Maybe you would like to have a visual or audible warning every time a pop-up is detected and blocked? Maybe there are some web pages where you wish to allow pop-ups? Other programs, like the Pop-Up Stopper Professional, have even more settings to choose from for the more advanced user.

The good thing about most pop-up blockers is that you can usually set the program on "auto enable", which means that the pop-up blocker will start whenever the computer is started. You don't have to worry about remembering to turn it on; it will always work in the background, protecting you while you're online.

Before choosing a pop-up blocker make sure that it is of high quality in order to get the most out of you time online. A good pop-up blocker should be able to stop any undesired window that tries to open automatically, regardless to whether it is a pop-up or pop-under ad. It should also be able to block the kind of ads that open up after a page is loaded, or when you leave a site or close your browser.

In addition to this, a good pop-up blocker should have a user friendly interface that is easy to manage, and give you the opportunity to customize the settings. Based on you individual settings, a good pop-up blocker should be able to decide whether a launching window is good or bad. A good pop-up blocker can block ads and other undesired windows without interfering with your normal browsing.

Stop wasting your time on intrusive and offensive pop-ups and install a pop-up blocker today!

Supportcave.com offers new and enhanced popup blocker software. Not only will these programs effectively prevent popups, once installed they will also shield your computer from future popup intrusions.

Georgia Hospital

Saturday, May 10, 2008

Stop Spam New Spam Blockers

Writen by Mary Beim

News last week that Internet service provider Verizon settled its lawsuit against Detroit-based spam king Al Ralsky was of little comfort. Ralsky agreed to pay a fine and stop spamming Verizon customers, but he still has plenty of other targets. And there are still hundreds of other spammers who have never visited a courtroom and are all too eager to fill our inboxes with business propositions from deposed Nigerian dictators. Fortunately, the rise of junk e-mail has fueled a vast anti-spam industry, with ISPs and software makers all competing to solve the Net's most intractable problem.

The ISPs are beating the anti-spam drum the loudest right now, because spam drives away new customers and clogs up their servers. Most providers combine several approaches. They subscribe to "RBLs," or real-time blacklists, administered by anti-spam groups like the London-based Spamhaus.org, which maintains constantly updated databases of the worst transgressors and instructs subscribers to block their mail.

Six of the largest 10 ISPs, including MSN and Earthlink, also subscribe to the service of Brightmail. The San Francisco-based company has a team of researchers who constantly monitor dummy e-mail accounts and send out profiles of the latest Net scams, so that ISPs can filter them out before they reach your in-box. (Microsoft's Hotmail, one of the worst spam magnets on the Net, just signed up.) The problem is that companies like Brightmail, fearing the possibility that their dragnet will block an authentic e-mail, are forced to be conservative. And spammers can easily configure their custom-designed software to respond with "spoilers," spaces or bits of code placed within messages that fool the filters. Though Brightmail estimates it catches more than 90 percent of spam, spam watchdog groups think the number is closer to half.

That leaves ISPs trying to add anti-spam tools directly to their e-mail programs. Recently released AOL 8 can color-code your messages into three categories: known and unknown senders, and known bulk e-mailers. There's also a button that lets you report spam directly to AOL. MSN 8 does all this a little better, using machine intelligence designed in Microsoft's research lab to spot spam and send it to a junk folder.

Users looking for another level of protection can try software solutions, which attempt to block spam on your desktop. Software site Download.com lists more than 200 such programs, many free of charge. Most are "rules-based," meaning they filter e-mail looking for certain words ("herbal Viagra") or programming patterns (excessive HTML graphics in the body of the message).

Anti spam software reviews

Among the best programs we've tested or heard about: IhateSpam ($29.95) works directly with Outlook or Outlook Express. Exploiting the power of peer-to-peer networks, it reports spam that the software missed to other users of the program. Mailwasher (free, but donation requested), another clever program, bounces back spam to the sender as "undeliverable," trying to fool spammers into thinking they have a bum address. In our tests, it caught 90 percent of unwanted e-mail. Spam Assassin (also free) takes the same tack, and has a great name, but it can be a tad overaggressive, blacklisting the occasional authentic e-mail.

McAfee's Spamkiller ($40) gets a thumbs down because it overcharges and generates complaints to the spammer's e-mail account and ISP. Since spammers often hijack other people's accounts, this has the ironic effect of sending the complaint to an innocent user. Anti-spam spam?

Mary works in US for a media company, occasionally writing for the biggest Anti spam news portal, and drinking too much coffee.

Georgia Hospital

Friday, May 9, 2008

How To Reduce Spam In Your Inbox And Enhance Your Email Security

Writen by Richard Rogers

Spam is the internet's equivalent of junk mail. Spam is defined as an e-mail message sent to people without their consent or permission. Addresses of recipients are often harvested from Usenet postings or web pages, obtained from databases, or simply guessed by using common names and domains.

Spam is sent to promote practically any product or service ranging from "Adult" products to logo design for websites. It is also used by hackers to spread viruses or links to dangerous websites used to gather your personal information like credit card details or passwords for sites like Ebay or PayPal. To the average user these messages appear genuine. Even the link has a genuine looking domain name. This technique is known as "Phishing."

Here are some smart strategies and tips you can employ now to start reducing Spam and boost your email security.

- Configure your anti virus software to automatically scan your incoming email for viruses. Email is still widely used to distribute malicious software. Make sure you keep your anti virus software definitions up to date.

- If you are someone that frequently signs up for "freebies" or other stuff on the internet start using a separate e-mail account just for this purpose. Accounts from providers like Yahoo!, Hotmail, and Google's Gmail all come with generous storage as standard.

- If sites don't accept free e-mail address from the services listed above then use a free disposable email service like "Sneakemail."

- If you are posting your email to a blog or your website then submit it in a way that is only recognizable to a human. For example if your email is johndoe@hotmail.com then post it as "johndoe at hotmail.com".

- Never open a message from an address you do not recognize – always delete it straight away. This is especially so if there is an attachment. Never reply to a message as this only confirms the email address is "live" to the spammers.

- If you get an official looking message from your bank or Ebay or another site you are not sure is genuine here is what you do. Instead of clicking on the link embedded in the mail log on to the site normally via your browser. If there are any genuine serious problems you should get a message when you log on. Alternatively contact the site's customer service via the phone if possible.

- Consider using standalone spam filtering software. This software analyses your email for common characteristics of spam email including words like "click" or "teens." It also compares senders' emails against a "Friends List."

Richard Rogers runs a number of computer-related sites offering Spyware Remover and Anti Virus Software help.

Georgia Hospital

Thursday, May 8, 2008

Private Sector Needed To Win The War

Writen by Lance Winslow

The war in Spam is over seas and the insurgents are coming from outside our borders. The Federal Trade Commission says it is impotent in reducing Viagra Ads in your inbox and in the War in Spam, because it has no jurisdiction there. The information highway is littered with roadside bombs and the weapons of anti-SPAM technology are evolving as fast as the Spammers.

Commercial software, SPAM Filters, and ISP tools are helping but businesses especially small ones are severely hurt. The Department of Justices Federal Trade Commissions Consumer Protection Division is a complete disaster on the war in SPAM having (in three years since the induction of the CAN SPAM Act in 2003) only defined it and further defined the problems it is causing.

The FTC instead points to new sources and methods of SPAMMERS and a new trend where SPAMMERS are hackers who hijack systems to use for spamming and sending malicious code. Indeed these are issues, but may I ask in three years what on God's Earth has the FTC done for the American People in the War in SPAM? Not a darn thing is what we are told in their recent report to Congress.

So may I ask why we are wasting taxpayer's monies in this mirage, facade, and fantasy in the first place? Think on it.

Lance Winslow

Wednesday, May 7, 2008

A War On Spam Attacking The Evil

Writen by Lance Winslow

As most small, medium and large businesses in this country have seen the SPAM Emails have hurt our productivity and caused excessive costs.

Here are a few very interesting web links on this issue and the FTC report on SPAM to Congress.

http://www.ftc.gov/reports/dneregistry/report.pdf

http://www.technewsworld.com/story/32739.html

http://www.out-law.com/php/page.php?page_i...64552&area=news

It is true that a DO NOT SPAM list is not going to fly, it would simply be used by the SPAMMERS. So then we need a plan of attack. Literally. It was recently estimated that SPAM is costing American Businesses over 54 Billion a year in lost productivity. We need to take out SPAM.

Remember in the movie "Rambo" where Sly went into the Communications tent with a 50 Caliber Machine Gun in his arms and destroyed the communication systems? Well, then how about Navy Seals, Green Barets, Special Forces, SWAT Teams, in black helicopters lower down the ropes and take out the evil do'ers, which are causing this distrust in our systems of communications. A limited war on SPAM taken to those who wish to disrupt all we are and all we have built, we have come to far and sacrificed too much to allow a melt down of our society due to SPAM.

Any civilization to succeed needs proper systems of commmunication, transportation, distribution, education, common currency-unit of trade and that which is needed to sustain life. When any of these are disrupted the whole of that civilization is at risk. We cannot allow this to continue, we need a war on SPAM, similar to the war on drugs. Attack the VR world by attacking those systems used by Spammers in the real world. By attacking these things early on, we send out a message to the Spammers that we mean business. There will be cheering in the streets every time the number of SPAM mail goes down.

It is an act of terrorism to send out SPAM, and SPAM which is coming from outside the country on servers in China, Nigeria, Caribean, or anywhere in the world is a form of International Terrorism and it is no worse than the attacks on our other infrastructures in the US or abroad. No worse than an attack on a pipeline, refinery, water supply, rail tracks, bridges, etc. We need to protect the system. Since no one has a solution that will get rid of SPAM now and immediately, I here by throw out the idea of military special forces in a call to action.

We must defend the system from attack. We must prevent the further melt down and growing distrust in the Virtual World of the Internet, which has and can potentially allow for the the forward progress of mankind into the future period and the next step in our evolutionary process towards a one world peace and unity of the entire species Planet Wide. The Internet is truly one of the greatest gifts of our modern era, we must protect this evolving technology as we would any other infrastructure under attack. This is not funny anymore, this is not a game, the SPAMMERS have raised the stakes and increased SPAM against the will of the people for thier own personal gain, no matter who it hurts. This is unacceptable and they have been alerted, instead of them carefully monitoring themselves and carefully screening email recipients for proper targeting, they blast SPAM the World into an Internet Hell. They have failed to monitor and respect the wishes of all those who have found value in this new communication process which has done so much to unite the World. By Spammers continuing this attack on our country and societies of the World they are bringing the best communication system in the history of mankind to it's knees. This must be taken care of.

Of course this is my personal opinion as it is the many Americans who are frustrated, running readline against the clock, wallowing in consumer debt, scared about the future and now this complication of SPAM must be stopped. We need to pull out all the stops and stop tip-toe-ing and looking for the laws to help us, it is time for action. We passed the CAN-SPAM act, and the Spammers have instead stuck their middle fingers up and raised the stakes in this bluff game of hide and seek and catch me if you can. Well, we can CAN-SPAM. If we dare to take action. Are we so decadent that we believe that we cannot enforce a law because of another law, even though the whole of our society wants to rid us of this pest we call SPAM, which is actually a federal protected trademark of a food product.

If the FTC admits along with Industry that there is nothing they can do. And the FTC's conclusion is to let the free market figure it out, which is noble indeed and the rightful conclusion in my opinion, then let's fix the problem. free enterprise can fix it, but how long? At 54 Billion per year in lost productivity estimated and climbing, we cannot afford to wait any longer, we are at a crisis point. We need this additional bandwidth for miliatry, video cell phones, VoIP and the entertainment industry, for better flash presentation, for better wireless broadband-no digital divide efforts. We need action, no more talk, no more studies, no more games, no more BS.

We now have a 60 page report done by the FTC with references which are all verified, the problem is growing and it is known, it has been found to be an evil attack against the whole of humanity and it must be stopped before it grows worse. If not we will see video ads pop-onto the next generation of cell phones, PDA wireless devices, more disruptins of our daily lives with computer viruses, privacy invasions and identity theft. Folks in my personal opinion, it is time for a literal war on SPAM.

Declare war on SPAM and the American people will reward itself with added productivity, prosperity, renewed sense of purpose.

Declare a war on SPAM and small businesses will reward the free market with more jobs, purchases and efficiencies.

Declare a war on SPAM and the strength and vision of the future of America will be revived by it's citizens and stakeholders.

Declare a war on SPAM to alert the world that our communication systems are off limits to International Terrorist Attcks.

If we fail to make a stand here and now, the Internet is doomed in the future and we will see more attacks, viruses, abuses until one day it becomes the main target used to exploit us and serve the will of the enemy. Let's get smart and get busy, action is needed, no more reports-the FTC report says it all. No more committees, no more talk, action, a call to action. It is time to act, we have observed, oriented, decided and now it is time to act. Action is what we need.

We welcome ideas on this subject, we welcome ideas and solutions to end the unecessary SPAM without limiting our right to communicate amongst our selves or lessen our right to Freedom of the Press or Freedom of Speech. Any ideas suggestions or debates are of interest to us. Although a War on SPAM seems harsh, if we fail to act all the studies, meetings, committees of the last 2 years have been wasted and all we see is a 34% increase in that same period for some much higher.

Lance Winslow

Tuesday, May 6, 2008

Your Dolphin Email Caught In Spam Tuna Net

Writen by Erwin Steneker

Let me ask a couple of questions:

  • If (potential) customers sends an e-mail to your company, do they want to receive an answer?

  • If you, in return, e-mail your customer, do you expect that your e-mail is delivered to the customer?

Well, in my case, I answered "YES" on both questions. After all, the customer asks for an answer, so it's normal to expect that when you send an e-mail in return, that the customer receives it.

Unfortunately, this is no longer the case.

It is highly important that you get this point, so let me rephrase that:

If you send an e-mail to a customer that the customer wants and expects, it may be that (s)he never receives it!

I've investigated this issue, and the cause of this is the filtering of e-mail by the ISP of the customer, to prevent unwanted SPAM (unsollicited e-mail) to make its way into their mailbox. But not only genuine SPAM is filtered out. Even e-mail that the customer wants (and often expects) to receive, may be caught up in this filter. It's happening so often, there's even a term for it: "false positives".

Sometimes this stays unnoticed, because the customer doesn't get a mail telling her that it was filtered out. Or you don't get a reply from the ISP/filter that your mail didn't pass.

Your "dolphin" e-mail can essentially be caught in SPAM filter "tuna nets".

This can impact businesses on many levels:

  • Potential customers do not convert into real customers, because they never "heard from you".

  • Unhappy customers as they "never get an answer on their support requests".

  • Unhappy Customers that don't get the info / product they paid for (download instructions for digital products are often delivered by e-mail)

When this happens, the customer usually points the finger to the business...

...YOUR business was not responsive;


...YOUR business didn't resolve the customer's issues;


...YOUR business did not deliver!

But, of course, you are not to blame. You responded! You resolved! you delivered! It's the customer's ISP that didn't deliver. An e-mail your customer wanted, and expected.

Mistakes do happen. But sometimes, ISP's and mail service businesses have no interest in righting what went wrong. And since they are not blamed, they get away with doing nothing. But in the mean time, your and my business is hurt by this.

So, it is time to point customers in the right direction. If more and more customers know where to complain if they do not get the e-mail they wanted, chances are that the ISP and/or mail service are forced into action.

There's a lot an ISP or mail service can do. Customers should have the possibility to "whitelist" you. A "whitelist" is a list of e-mail addresses or domains from which the customer allows mail to continue, even when the filter thinks it's "junk". One option that's not an option is to ask customers to switch off the filter. SPAM is just too big a problem for this.

Another company that have taken the heat for filtered mail is SiteSell. They're blamed for not delivering as promissed, because their e-mail was filtered out. And they hit a wall of unresponsiveness when they tried to right this. Or was it that their requests were filtered out? ;-)

As they understood how this is hurting their business, and many other businesses around the globe, they decided to take action, and point customers in the right direction when wanted e-mail doesn't make it into their mailboxes. So they created the "Deliver my mail!" initiative, which I fully support.

I invite you to join them and me. Read more about "Deliver my Mail!" on: http://deliver-my-mail.sitesell.com/sls.html

Let's take a stand, and educate customers on what to do if they do not receive e-mail they really wanted to get. Let customers demand:

"DELIVER MY MAIL!"

About The Author

Erwin Steneker is a senior support consultant with over 13 years of experience in both sales and IT support. Check out his website at http://www.customerservicepoint.com/

Monday, May 5, 2008

Email Chain Letters Harmless Fun Or Not

Writen by Lisa Campbell

I'm sure I'm not the only person on the planet that remembers getting the occasional chain letter in school.. you know, the kind that was actually written with a pen or pencil on paper that told you either something wonderful would happen or something terrible would happen or both if you did or didn't send out 20 copies within 7 days. Ugh. I still remember my fingers cramping as I tediously re-wrote the letter 20 times and the looks on my friends faces when they realized the note i just passed them was leading them to the same path of wasted paper.

Things have changed a lot since then;

Not just the venue has changed though, now we not only get poems with promises of good luck or threats of doom for not following instructions, we get petitions, promises of rewards from big companies, plea's to call your local government person because of some pending law that will be devastating to someone or something, and suggestions to boycott popular companies because of some alleged injustice they have performed. (Just imagine the phone calls these companies get!)

I get amusing chain letters in my email box occasionally mixed in with some urban legends and Christian Internet hoaxes for variety and before I knew better I'd give a little laugh, a roll of the eyes and pass it on to the 10 required friends with the promise that something good would happen in 10 days (or that I would escape a horrific tragedy)

Oh but then I learned. I learned about SPAM and about how to finally change my email address when it got overwhelming!

Perpetuating email chain letters is not a good idea. I read recently that most Internet service providers prohibit it in their terms of service... hmm... I will have to read those terms to see what else I'm not allowed to do! But it is with good reason that they have these rules.

You know the old 'phrase' I tell 2 friends and they tell 2 friends and they tell 2 friends... yada yada yada... well imagine what happens when you forward that silly email to your 20 friends and they each send it to their 20 friends... well already you've got 420 copies going out to cyberspace and taking up bandwidth and bogging down servers all over the place - especially if your 20 people are co-workers on the same email system!

What else is wrong with it? Well you've just added your name, or at least email address to a long and growing list of which you have no control over. This is like sending out an engraved invitation to spammers and scammers all over the world and suddenly the note from Aunt Joan is burried among 50 emails trying to sell you everything from viagra to stocks and bonds.

So what can you do? Well, the first and most obvious is delete it. But sometimes it's a cute story or a joke or some other reason to smile or chuckle and we all need some of that now and again so you want to forward it? Take these steps to do it safely.

After you've clicked forward go through the email, delete all the email addresses that are hanging on to the mail of all the people that have recieved it with you.

Leave only the portion of the email that you think is funny or cute and take out all the instructions to forward to 10 - 20 - or 50 people and what will happen if you don't

Use the bcc: field for the emails of the people you're going to send it to to keep their emails from being passed on if one of them chooses to forward it.

Finally, while I definately recommend against it, some people are just too superstisious to let a chain letter break. If you MUST continue a chain letter, still follow steps 1 and 3 above and get yourself a disposable email address for this purpose. Belive me, if you've never had to change your email address to get rid of the junk, you don't want to find out how fun it is! Remember, it's not just advising your friends and family and co-workers of the new email, but many of your online accounts use your email address if not for signing in, for getting lost passwords etc. How frustrating to go to get the status of some account and when you realize you can't remember the password the only option is to have it emailed to you and you didn't update the account!

So, get a disposable email address and use it for forwarding chain letters (if you have to) but also for signing up for things on the Internet! Then when the spam hits the fan, you can just delete the account and get a new one.

Lisa Campbell
Newbie Guide to CyberJunk

Other Web Sites:
Parenting an Intense Child
Web and Logo Design at Affordable Prices

Sunday, May 4, 2008

Internet Basics Spam Is Like A Mosquito In Your Bedroom At Night

Writen by Grant Pasay

Ever have a mosquito in your bedroom at night? Oh, man. There you are, nice and happy, about to fall asleep when, zzzzzzz, there's this irritating buzzing in your ear. You whack at the source. The zzzzzzz stops. You got it. Good.

But wait a few minutes and, zzzzzzz, there it is again. You take another swipe, then another. Maybe you even jump out of bed and flick on the lights. But you can't find that crazy mosquito. Or maybe you do find it, and gladly squish it.

Then you go back to bed and are almost asleep when, zzzzzzz. Yes, another mosquito. Who invited these things to the party? Didn't you put screens on the windows to stop this very thing? Can't the mayor do something about it?

That's what SPAM is like.

SPAM is when someone sends one email to a whole bunch of people who were minding their own business and didn't ask to receive the email. Suddenly it appears in your Inbox, uninvited and rather annoying.

So how do you stop it? Simple, delete the email. But then you get another one from the same spammer. You might try to tell them to take you off their list. And they might actually take you off their list (or not). You might try to block their emails so you just don't get them in your Inbox. But even if that works, another spammer will find your email address somehow and start sending you other SPAM emails.

Tired of all the unsolicited emails, you might get serious and get anti-spam software (it might even come with your anti-virus software). And that might stop most of the SPAM. But why can't SPAM be stopped all together?

Well, the mayor might not be able to do anything about stopping SPAM, but the US Government is taking it seriously. In 2004, their CAN-SPAM Act became law, dealing with email "whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site." --quoted from http://www.ftc.gov/bcp/conline/pubs/buspubs/canspam.htm

And that's why SPAM is like a mosquito in your bedroom at night.

Copyright (c) Grant Pasay 2005. All rights reserved. You may forward this article in its entirety (including author bio/links) to anyone you wish.

Grant Pasay is a professional website copywriter, advertising copywriter, and SEO copywriter serving clients in Vancouver, BC and everywhere. Grant is also the author of the FREE e-book, "The Internet Is Like A Refrigerator."

For copy that captures your business message without any of the hassle, go to http://grantpasay.com/

Check out Grant's FREE e-book at http://grantpasay.com/refrigerator/

Saturday, May 3, 2008

Take Control Of Your Inbox Eliminate Annoying And Potentially Harmful Emails

Writen by Jason Frovich

The time you devote each day to sort and delete spam from your inbox could be put to much better use. In the European Union alone, the working hours employees are spending on sorting and deleting spam is costing the companies and estimated 10 billion euros every year! By manually sorting out spam after it has reached your inbox you are loosing time and money, as well as bandwidth and space. You are also putting your computer at risk by allowing possibly hazardous content to enter your server. Supportcave.com offers free intelligent Spam Blockers, helping computer users to protect their computers as well as reclaiming their time, money, bandwidth and space from the spammers.

Every day - 365 days a year - more than 10 billion spam e-mails are sent out to e-mail users all over the world. Despite new laws and verdicts trying to strike down on the spammers, the number of spam e-mails are expected to rise to 30 billion a day by the end of 2005. Today spam constitutes 37% of all e-mail traffic in the U.S.

Spam is not only annoying, it's dangerous and it is causing financial losses for companies as well as individuals. For example, an estimated 10 billion euros are spent every year by companies in the European Union to deal with spam. Spam is sent out by fraudulent companies and individuals and can often be infected with viruses, spy programs or other undesired software. Studies show that 95% of all computer viruses are sent through e-mail.

Even virus free spam causes problems since it consumes the users' time as well as hard disc space. Spam is however not only shunned by the users, the Internet Service Providers abhor it as well since it chews up a lot of bandwidth and disc space, and the non-stop sending of e-mails uses a lot of system resources and stresses the e-mail servers. This leads to a less effective Internet and increased costs for everyone.

The best way to protect your self from spam and battle the spammers is to use a Spam Blocker. The most basic forms of Spam Blockers are software programs periodically checking your e-mail for the best known types of spam and remove them, or filter them into a special folder for you to remove. There are however much more sophisticated Anti Spam programs on the market. Spam blockers are Spam Filtering Software that lets you to remove spam e-mails from the mail server without ever pulling them down into your inbox. This means heavily increased security for your computer and your network and is the most efficient and effortless way of controlling your incoming e-mails. You will be given the opportunity to accept or delete suspected e-mails while they are still on the server. You can also choose to quarantine them for later review.

Spam blockers are equipped with a smart learning engine, which studies your decisions to keep or delete spam. The longer you use spam blocker software, the more effectively the program will sort your incoming e-mail.

Are you tired of spam stealing your time, bandwidth and hard disc space? Applying spam blockers software will allow you to determine up to 99.9% of the spam e-mails. Install spam blocker software today and start safeguarding your time as well as your money from the fraudulent spam senders!

Supportcave.com offers new and enhanced Spam Blocker Software. Not only will these programs effectively check and clean your email from spam, once installed it identifies and diverts spam before it reaches your inbox, - freeing up your time and your system's resources.

Friday, May 2, 2008

I Love Spam

Writen by Elvis King

What's the big deal? All you read on the internet is spam, spam, spam. Spam protection this, spam protection that. Oh my God! Be careful don't let any one see your SACRED email address! I read they even put a spammer in jail. What kind of a barbaric country would do that? Now I am not a spammer. I don't know how to send spam. If I did I would!

I am not afraid of placing my email address to the ends of the earth. I look forward to my spam everyday! If spam comes that I have no interest in. You know what…I HAVE GOT a DELETE button all free provided by Yahoo! And it works perfect!!!

However, I am getting very annoyed with Yahoo.

Why?

Because I hold the World's Record of the most girlfriends of any man on the planet. Needless to say I can't see every girl every day. So I email them my Casanova love letters! When I try to send my love letters to my darlings. I usually send 50 at a time. That's all my old computer can stand. Yahoo puts characters in my face before I can send letters to my girlfriends. Add insult to injury now Yahoo says I can only send 50 emails per hour. Put your calculator to work and see how many hours it will take me to send my dolls a love letter, after all, I have over 1000 active 18 to 22 year old dream girlfriends and I am 55 years old man! And believe me my girls are waiting by their computers for my romantic love letters!

I am looking for a sidekick who loves girls. Preferably a rich buddy who loves girls. As I am running low on cash. Who would'nt with over 1000 girls!!! Any great spammers out there who know how to spam. Maybe you can help me find my rich sidekick who loves girls! Let's spam him!

Thank you very much…

Please feel free to publish this article and resource box in your ezine, newsletter, offline publication or website. I also ask that you activate any html links found in the article and in the byline. You may make minor editorial corrections only. A copy would be appreciated at seniorplayboy1@yahoo.co

Elvis Preston King was born in Mississippi and grew up in Memphis. Not to be confused with the other great King, Elvis Presley. Elvis has always had an eye for girls since he first saw one as a baby. Elvis is a 55 year old senior who doesn't want to let go of being 18. He has over 1000 sexy girlfriends 18 to 22 years old. He is now looking for just ONE gentleman sidekick to share in his good fortune. His office is based out of Los Angeles, Ca.

You can email him at loverboybachelor@yahoo.com or visit http://bachelortours.blogspot.com/ and http:http://www.msnusers.com/BachelorDreamTours

Thursday, May 1, 2008

Dont Lose Email Leads In Your Spam Filter

Writen by Margaret Grisdela

Chances are you could be missing important business opportunities if your email Inbox utilizes a spam filter. Take a few minutes now to investigate your email screening procedures for messages received from unknown senders. You might even discover a new client hiding among the spam!

Email inquiries from new business prospects, which by definition are unknown and unexpected when they arrive in your Inbox, can take a detour to your spam box without your knowledge.

When was the last time you did not receive an email sent by a client or friend? Failed email delivery can be quite common. Usually the sender just emails you again until you receive the message.

Now imagine a situation where somebody (like a prospective legal client) sends you an email that you don't receive, but they don't tell you about it. Attorneys or paralegals frequently contact a number of experts via email and engage the most qualified candidate who responds first. You miss out on a potential engagement if the email inquiry does not show up in your inbox.

Here are five easy steps to protect your email, receive incoming leads and avoid technical nightmares:

1. Check your spam box often if you use automated email filtering. Microsoft Outlook 2003 and AOL give you the ability to control the settings and security levels for your incoming email.

2. Add a response form to your Website. Your Webmaster can set this up so that you are automatically alerted with an email recognized by your server.

3. Update your "safe" and "blocked" sender lists often, especially if delivery is controlled at the ISP level. Add a law firm's email domain to your approved email list when you get a new client from the firm.

4. Separate business from personal correspondence by using two different email accounts.

5. Avoid downloading free software or clicking on unsolicited ads. If you do, you may find yourself subject to a virus or malicious Adware attack.

ABOUT THE AUTHOR: Margaret Grisdela is President of Expert Law Marketing and Legal Expert Connections, specializing in business development in the legal market and expert witness recruitment.

The firm's "10 Point Marketing Excellence Program" delivers results by arranging speaking engagements, publishing opportunities, PR, online ad campaigns, website development and more for leading experts.

Ms. Grisdela is a board member of the Florida Direct Marketing Association and served as the group's President in 2005. She is also a Founder and six-year board member of the South Florida Technology Alliance.

Ms. Grisdela writes for HGExperts.com, a directory of expert witnesses, forensic consultants, medical experts, litigation support services and legal speakers.

Spam Blocker Guard

Spam Blocker Guard