Hi David: I keep getting my E-mail returned to your address so I'm just sending it to the list. I think it is because of your subject line including the exes and your filter is blocking it. <smile>
I hope the below helps somewhat. <smile> . Use Disposable Email Addresses (DEA's) While disposable email addresses don't block spam from being sent to you, they do provide a "shell" that protects your real email address and allows you to remain fairly anonymous online. DEAs simply redirect email to whatever address you tell them to. If you use a unique disposable address for each newsletter, discussion list or online form that you fill out, not only will you be able to pinpoint who compromised your address if you start to receive spam, but you'll also be able to kill that address instantly and stop the spam without having to change your permanent email address. Spamex offers a 30-day fully functional free trial (no credit card required), and for just $9.95 per year you can get a block of 500 disposable email addresses to use. Spamex Disposable Email Address Service http://www.spamex.com/ . Pay attention to privacy statements when filling out forms With so much information online, the last thing we want to do is be forced to read through six pages of a privacy statement. But that's exactly what you should be doing if you want to know how the site you are providing data to will be using it. Be careful of pre-checked boxes that say that it is okay for the company to share your information with third parties, as you're indicating that it's okay for them to sell your personal information. Many companies bundle that statement with things like "Agree to receive future useful notices about your software". Be wary. When in doubt, use a disposable email addr ess (see above) for each place you register online. If you're going to complain, complain to the right person and know what to say 98% of spam sent has forged headers or uses the open relay on an email server of an innocent party. Never automatically assume that the person or company listed in the From: or Reply-To: area was the originator of the spam you received. There is only ONE WAY to accurately determine who sent the message you received. Here it is: Open your email message up in an email program like Eudora or Outlook and from the toolbar menu choose View Source or View Headers to get a look at the full message with all headers (the information at the top of the message. Ignore everything in the header, except the following lines: Return-Path: < [EMAIL PROTECTED]> Received: from mail.somedomain.com (mail.somedomain.com [123.123.123.123]) The only line that cannot be forged (faked) by a spammer is the Received: IP address, in the example above indicated by [brackets]. Ignore everything else in the message and focus on the IP address in brackets in the topmost Received: header. Now go to SamSpade http://www.samspade.org/ Copy and paste that IP address (without the brackets) into the "Do stuff" form and click to find out whom that IP address belongs to. This is the true originator of the message that you received. Ignore the From: and Reply-To: headers as they are most likely bogus. Once you know the domain of the company associated with the IP address that sent you spam, visit http://www.abuse.net/ to find out the email addresses of the abuse department at that ISP. Just drop in the domain and it will provide you with the correct addresses to send your complaint to. Be warned! Not all ISP's are against spam. Some spammers use "spam- friendly" ISPs who don't listen to complaints and don't act on complaints. Other ISPs will drop a company's hosting account on the first properly documented complaint. If you don't get a satisfactory response to your complaint, it most likely fell upon deaf ears. Don't let it discourage you from complaining. If you want to check to see if the upstream is a spam-friendly ISP before you take the time to send your complaint, check out SpamHaus http://www.spamhaus.org/ Here is an example of a possible response that you might use to send to the upstream provider of the person or company that sent you spam: ------ Forwarded Message To: <upstream provider abuse address Subject: SPAM COMPLAINT> [Subject: subject of spam message] Sir or Madam: You provide connectivity to the originator of the spam message appended below. Please refer to traceroute following the message to understand how your company provides connectivity to the perpetrator. I have never had any business with the sender nor do I desire to do so. Incoming UCE is a burden on my firm and its employees, in terms of staff time wasted and the cost of bandwidth we pay for downloading mail we have no desire to receive. Please act promptly to block or terminate connectivity to the perpetrator and notify me that action is being taken to prevent future such mailings. PLEASE NOTE: My firm's SOP requires submission of your IP address for Realtime Blackhole Directory listing unless you shut down the offender. Kind regards, Your name 5 -----------begin forwarded spam-------- Include spam message with full headers here -----------end forwarded spam---------- TRACKING INFO ON SPAMMER: IP: WHOIS LISTING: ------------------------------------ HOSTING TRACEROUTE: IP INSERT TRACEROUTE HERE ------ End of Forwarded Message . NEVER reply to spam This may seem like a no-brainer, but people do it all the time. What happens when you reply to spam is one of two things, neither of which gets you off of the spammer's mailing list: 1. You reply to a faked/spoofed/forged Reply-To or From address that belongs to an innocent third party who had their domain hijacked and they have no idea what you are talking about. No self-respecting spammer uses their own email address. They hijack other peoples' or most of the time they just make one up. 2. The second thing that can happen if you reply to spam is that you tell the spammer that your email address is functional and "live". A live email address brings good money to spammers. It can then be added to a CD that they sell for profit to tens of hundreds of other spammers, and before you know it you're seeing a ten-fold increase in spam just because you followed the spammer's instructions and wrote to their Remove address or filled out the form they asked you to fill out for removal. Don't do it! Just delete it! . Never buy anything from a company that spams Do not, under any circumstances, buy any item or service that is promoted via a bulk, unsolicited emailing. If you do, you're only putting gas on the fire. Most businesses that use spam as a marketing method are getting ripped off by the companies that conduct these bulk, unsolicited emailings. However if even a few orders come in, they may see that as justification to continue using these tactics. . Protect your Web site from spam-bots One of the ways that spammers obtain your address is through the use of "bots" or spiders that go out to Web sites like yours and look for "mailto:" links with email addresses. There is a plethora of bulk email software available out there that allows spammers to enter a keyword like "accountants". The program then accesses the Internet and does searches on multiple search engines under that keyword, visits the top ten listings or so under that keyword and then jumps from page to page on those sites, sucking up email addresses and creating a mailing list for the spammer. You can protect yourself and your company by simply not including mailto: email address links on your site. Take an image-editing program like Photoshop or Macromedia Fireworks and create an image of your email address on a white background (or the same color as your site). Make it in the same font that you've used for your site. Then take the image and link that image to a contact form on your site. This way visitors to your site can see your company or individual email address and use it if they want to, either by clicking on it to a contact form or by typing it into a message, but spambots can't. . Learn how to use an email program with filters If you use Web-based email such as WebTV, Hotmail or Yahoomail for convenience and anonymity, that's great. At some point, however, you're going to want to take advantage of more powerful software programs like Outlook 2002, Eudora or Entourage X (for Mac users). These programs offer powerful filtering tools on the client-side that can help filter potential spam out of your Inbox. Armed with a handful of simple rules that are checked on each piece of incoming email and a good email program, you can considerably reduce the amount of spam you receive. If you're like most of us, you probably have never read the instructions that came with your email program or explored the many features it offers. I'm guilty of this myself, so don't feel bad. There's just too much information for me to be bothered with reading manuals! I want an instant solution! Well, in this case, I can tell you from experience that not only is it worthwhile to buy a commercial email program, but it is also worthwhile to invest in the manual . Find a list of email software books. books are just like projects. You can get through them faster if you break them up into chunks. In this case, go through the table of contents and Put A's next to all the chapters that are most important for you. Put B's next to the ones that are not as important. Number the order and start reading the book 10 pages a day. Put a paperclip at the beginning of where you are reading and another one ten pages ahead so you know when you've reached your goal for the day. Take your time. The more you know about the tools and filters that these programs offer, the better off you will be. . Filter spam at the server level Brightmail http://www.brightmail.com/ private labels its spam-blocking service to a variety of ISPs like Earthlink, AT&T Worldnet and others. This technology takes email as it comes in and compares it with an updated list of IP addresses, blocks and keywords that it scans in your email and if spam is suspected, then the message is not downloaded to your desktop but rather moved to a spam folder and purged every three weeks automatically. If you own your own domain, you can take advantage of this service by simply mapping your own email address to an Earthlink pop account. These services do not block 100% of spam, but they can be effective at reducing the number of messages that you receive. Most times these services are included with the cost of your account, but are not turned on unless you request it or initiate it. .Buy your own domain and set up a virgin email address. I hear people complaining all the time about spam, but when it comes time to pay money for a solution that works, everyone suddenly gets really quiet. Why should you have to pay for a solution to stop something that you never asked for in the first place? I agree completely. You shouldn't have to pay to solve these problems. You shouldn't even have these problems in the first place, but you do. That's reality. Many solutions to reducing spam are free and require only your time in learning techniques. Others are going to cost you money. If you're willing to pay a small fee for a solution, here's an effective one: Go to http://www.speedhost.com/ and buy a $5 per month mini-Web account. That's $60 per year. Go to http://www.enom.com/ and search for and buy your own domain name for $29/year. Set up your domain so that it points to your hosting account and set up a virgin email account that has never been used. 1: Set up a public and private email account Set up two POP accounts for yourself - a private one and a public one: [EMAIL PROTECTED] - Is a public address / account that you'll use for public communication. This may be the address that you decide to send DEA (disposable email address) mail to (see earlier tip). [EMAIL PROTECTED] - Is your new virgin email address that is private. Treat it as you would an unlisted phone number and only give it out to those who have a need to cut through the clutter to reach you. NEVER use it to register anything. NEVER use it to post to a public forum or discussion list and instruct others you give it to not to give it out. NEVER list it in any directory. Having a private email account that is separate from your public one will allow you to check only that account when traveling. You'll be pleasantly surprised to see "real" email and only real email when you check that account. . How to filter pornographic spam out of your Inbox It seems every week I get a handful of folks asking me how to keep pornographic spam out of their Inboxes. It can be embarrassing, especially in a work environment, when your boss looks over your shoulder and sees subject lines in your Inbox about adult Web sites. It can be devastating when a child is using your computer and they get an HTML-enabled email with explicit photos. The majority of pornographic spam is sent with HTML-enabled email, for two reasons: 1. It allows spammers to display explicit images to you in hopes that you will be enticed to visit their adult Web site 2. Because those images are remotely served, spammers are able to determine an "open rate", which tells them of X thousand or million mailed to, how many actually opened the message and had the images load on their computer and how many clicked through to the porn site. This information is critical to them in deciding how responsive a list is, which will determine whether they mail to it multiple times or not. Because images are used in most porn spam, one way of blocking these types of messages is to use your email client to set a filter to check the body of incoming email messages for the following string of text: <img src This is the first portion of HTML code used to serve an image on Web pages and in HTML-formatted email. If your email program finds this text string present in a message, you may want to create a folder or mailbox called "Possible Spam" and have messages that meet this criterion filtered to that folder to keep them out of your Inbox. Do not filter email directly to the trashcan or deleted items folder, as no filters are 100% foolproof. Some real email always gets filtered, so you'll want to just create a spam trap. Now, this brings up an interesting question: What about corporate users that send email using rich text? What about HTML email newsletters that you subscribe to? . Business email or corporate email sent in HTML format or rich text format should have no problem getting through to you, provided no images are included in it. 95% of business email that I receive is ASCII text. The other 5% is rich formatted text, but I can't ever remember a time when a legitimate business communication contained an image in the body of the message. As far as HTML newsletters go, you can easily set a filter to look for a subject line string or From: address specific to that newsletter and have it filtered to your Inbox as real email. Most email filter systems read and process a filter list from top to bottom, so if you put your newsletter filters above your spam trap filters, the newsletters should arrive in your Inbox just fine. As with anything related to email and technology, YMMV (Your Mileage May Vary) and this will take some experimentation on your part to find out what works best for you. This method won't stop text-based porn spam - that can be blocked using common-word filtering - but it will keep explicit HTML email porn out of your Inbox quite effectively. . Most ISP's have spam filtering which you may not know about that must be turned on. Go to your ISP's website and see if they offer this. Many are using the Gray Scale methed as well as free virus E-mail scanning. Best wishes, Terrill Reynolds ---------- Email: [EMAIL PROTECTED] Windows Messenger:[EMAIL PROTECTED] Yahoo:terrillreynolds AIM:terrill36 PH:(910)842-7701----- Original Message ----- From: David ingram To: Terrill Reynolds Sent: Friday, July 06, 2007 6:58 AM Subject: what about 'xxx'? Hi how are you? Thank you for this information but what about 'xxx'? I've noticed that when i block senders list i have a lot of mail with 'xxx'. How can i find out where that mail is coming from and how if possible can i stop this mail? I have a lot of mail like this or i receive mail where the subject line isn't clear. Could that be another way for spamers to get you address? Thank you for any information that you may have. I'd like to also be able to use this information in an anti spam program! Determining the Source of Spam How to find the right ISP to complain to? It takes a close look at the spam message's header lines. These headers contain information about the path an email took. follow the path until the point where the email was sent from. From this point, also know as an IP address, it can derive the spammer's ISP and send the report to this ISP's abuse department. Let's take a closer look at how this works. Email: Header and Body Every email message consists of two parts, the body and the header. The header can be thought of as the envelope of the message, containing the address of the sender, the recipient, the subject and other information. The body contains the actual text and the attachments. Some header information usually displayed by your email program includes: List of 4 items . From: - The sender's name and email address. . To: - The recipient's name and email address. . Date: - The date when the message was sent. . Subject: - The subject line. list end Header Forging The actual delivery of emails does not depend on any of these headers, they are just convenience. Usually, the From: line, for example, will be set to the sender's address. This makes sure you know who the message is from and can reply easily. Spammers want to make sure you cannot reply easily, and certainly don't want you to know who they are. That's why they insert fictitious email addresses in the From: lines of their junk messages. Received: Lines So the From: line is useless if we want to determine the real source of an email. Fortunately, we need not rely on it. The headers of every email message also contains Received: lines. These are not usually displayed by email programs, but they can be very helpful in tracing spam. Find out how helpful they are, and how the analysis works What Email Headers can Tell You About the Origin of Spam Parsing Received: Header Lines Just like a postal letter will go through a number of post offices on its way from sender to recipient, an email message is processed and forwarded by several mail servers. Imagine every post office putting a special stamp on each letter. The stamp would say exactly when the letter was received, where it came from and where it was forwarded to by the post office. If you got the letter, you could determine the exact path taken by the letter. This is exactly what happens with email. Received: Lines for Tracing As a mail server processes a message, it adds a special line, the Received: line to the message's header. The Received: line contains, most interestingly, List of 2 items . the server name and IP address of the machine the server received the message from and . the name of the mail server itself. list end The Received: line is always inserted at the top of the message headers. If we want to reconstruct an email's journey from sender to recipient we also start at the topmost Received: line (why we do this will become apparent in a moment) and walk our way down until we have arrived at the last one, which is where the email originated. Received: Line Forging Spammers know that we will apply exactly this procedure to uncover their whereabouts. To fool us, they may insert forged Received: lines that point to somebody else sending the message. Since every mail server will always put its Received: line at the top, the spammers' forged headers can only be at the bottom of the Received: line chain. This is why we start our analysis at the top and don't just derive the point where an email originated from the first Received: line (at the bottom). How to Tell a Forged Received: Header Line The forged Received: lines inserted by spammers to fool us will look like all the other Received: lines (unless they make an obvious mistake, of course). By itself, you can't tell a forged Received: line from a genuine one. This is where one distinct feature of Received: lines comes into play. As we've noted above, every server will not only note who it is but also where it got the message from (in IP address form). We simply compare who a server claims to be with what the server one notch up in the chain says it really is. If the two don't match, the earlier Received: line has been forged. In this case, the origin of the email is what the server immediately after the forged Received: line has to say about who it got the message from. Are you ready for an example? List of 5 items Example Spam Analyzed and Traced Now that we know the theoretical underpinning, let's see how analyzing an junk email to identify its origin works in real life. I've just received an exemplary piece of spam that we can use for exercise. Here are the header lines: Received: from unknown (HELO 38.118.132.100) (62.105.106.207) by mail1.infinology.com with SMTP; 16 Nov 2003 19:50:37 -0000 Received: from [235.16.47.37] by 38.118.132.100 id <5416176-86323>; Sun, 16 Nov 2003 13:38:22 -0600 Message-ID: <[EMAIL PROTECTED]> From: "Reinaldo Gilliam" <[EMAIL PROTECTED]> Reply-To: "Reinaldo Gilliam" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Category A Get the meds u need lgvkalfnqnh bbk Date: Sun, 16 Nov 2003 13:38:22 GMT X-Mailer: Internet Mail Service (5.5.2650.21) MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="9B_9.._C_2EA.0DD_23" X-Priority: 3 X-MSMail-Priority: Normal Can you tell the IP address where the email originated? Sender and Subject First, take a look at the - forged - From: line. The spammer wants to make it look as if the message was sent from a Yahoo! Mail account. Together with the Reply-To: line, this From: address is aimed at directing all bouncing messages and angry replies to a non-existing Yahoo! Mail account. Next, the Subject: is a curious agglomeration of random characters. It is barely legible and obviously designed to fool spam filters (every message gets a slightly different set of random characters), but it is also quite skillfully crafted to get the message across in spite of this. The Received: Lines Finally, the Received: lines. Let's begin with the oldest, Received: from [235.16.47.37] by 38.118.132.100 id <5416176-86323>; Sun, 16 Nov 2003 13:38:22 -0600. There are no host names in it, but two IP addresses: 38.118.132.100 claims to have received the message from 235.16.47.37. If this is correct, 235.16.47.37 is where the email originated, and we'd find out which ISP this IP address belongs to, then send an abuse report to them. Let's see if the next (and in this case last) server in the chain confirms the first Received: line's claims: Received: from unknown (HELO 38.118.142.100) (62.105.106.207) by mail1.infinology.com with SMTP; 16 Nov 2003 19:50:37 -0000. Since mail1.infinology.com is the last server in the chain and indeed "my" server I know that I can trust it. It has received the message from an "unknown" host that claimed to have the IP address 38.118.132.100 (using the SMTP HELO command). So far, this is in line with what the previous Received: line said. Now let's see where my mail server did get the message from. To find out, we take a look at the IP address in brackets immediately before by mail1.infinology.com. This is the IP address the connection was established from, and it is not 38.118.132.100. No, 62.105.106.207 is where this piece of junk mail was sent from. Best wishes, Terrill Reynolds ---------- Email: [EMAIL PROTECTED] Windows Messenger:[EMAIL PROTECTED] Yahoo:terrillreynolds AIM:terrill36 PH:(910)842-7701 Visit the JAWS Users List home page at: http://www.jaws-users.com Address for the list archives: http://www.mail-archive.com/[email protected] To post to this group, send email to [email protected] To unsubscribe from this group, send an email to [EMAIL PROTECTED] For help from Mailman with your account Put the word help in the subject or body of a blank message to: [EMAIL PROTECTED] Use the following form in order to contact the management team http://www.jaws-users.com/managers.php If you wish to join the Blind Computing list send a blank email to the following address: [EMAIL PROTECTED]
