Don't worry about it! Some people don't have enough to do! One message. How many have there been over the past two days on what is the latest version of Jaws 8?
Dale Leavens, Cochrane Ontario Canada [EMAIL PROTECTED] Skype DaleLeavens Come and meet Aurora, Nakita and Nanook at our polar bear habitat. ----- Original Message ----- From: "Terrill Reynolds" <[EMAIL PROTECTED]> To: <[email protected]> Sent: Friday, July 06, 2007 1:53 PM Subject: Re: [JAWS-Users] refrain from includeing list member names in thesubject field > No problem, sorry. I'll not send any more tips like this to the list. > Best wishes, > Terrill Reynolds > ---------- > Email: > [EMAIL PROTECTED] > Windows Messenger:[EMAIL PROTECTED] > Yahoo:terrillreynolds > AIM:terrill36 > PH:(910)842-7701 > ----- Original Message ----- > From: "Moderator" <[EMAIL PROTECTED]> > To: <[email protected]> > Sent: Friday, July 06, 2007 12:38 PM > Subject: Re: [JAWS-Users] anti spam tips to david ingrram > > > All, > Let's refrain from includeing list member names in the subject field. > Thank you, > Richard Justice list-mmoderator > www.jaws-users.com > www.blind-computing.com > ----- Original Message ----- > From: "Terrill Reynolds" <[EMAIL PROTECTED]> > To: <[email protected]> > Sent: Friday, July 06, 2007 12:33 PM > Subject: [JAWS-Users] anti spam tips to david ingrram > > > Hi David: > I keep getting my E-mail returned to your address so I'm just sending it > to > the list. > I think it is because of your subject line including the exes and your > filter is blocking it. <smile> > > I hope the below helps somewhat. <smile> > > . Use Disposable Email Addresses (DEA's) > > While disposable email addresses don't block spam from being sent to you, > they > do provide a "shell" that protects your real email address and allows you > to > remain fairly anonymous online. DEAs simply redirect email to whatever > address > you tell them to. If you use a unique disposable address for each > newsletter, > discussion list or online form that you fill out, not only will you be > able > to pinpoint > who compromised your address if you start to receive spam, but you'll also > be > able to kill that address instantly and stop the spam without having to > change > your permanent email address. > > Spamex offers a 30-day fully functional free trial (no credit card > required), and for > just $9.95 per year you can get a block of 500 disposable email addresses > to > use. > > Spamex Disposable Email Address Service > http://www.spamex.com/ > . Pay attention to privacy statements when filling out forms > > With so much information online, the last thing we want to do is be forced > to read > through six pages of a privacy statement. But that's exactly what you > should be > doing if you want to know how the site you are providing data to will be > using it. > Be careful of pre-checked boxes that say that it is okay for the company > to > share > your information with third parties, as you're indicating that it's okay > for > them to > sell your personal information. Many companies bundle that statement with > things like "Agree to receive future useful notices about your software". > Be wary. > When in doubt, use a disposable email addr ess (see above) for each place > you > register online. > > > > > > > > If you're going to complain, complain to the right person and know > what to say > > 98% of spam sent has forged headers or uses the open relay on an email > server > of an innocent party. Never automatically assume that the person or > company > listed in the From: or Reply-To: area was the originator of the spam you > received. > There is only ONE WAY to accurately determine who sent the message you > received. Here it is: > > Open your email message up in an email program like Eudora or Outlook and > from the toolbar menu choose View Source or View Headers to get a look at > the > full message with all headers (the information at the top of the message. > Ignore everything in the header, except the following lines: > > Return-Path: < > [EMAIL PROTECTED]> > Received: from mail.somedomain.com (mail.somedomain.com [123.123.123.123]) > > The only line that cannot be forged (faked) by a spammer is the Received: > IP > address, in the example above indicated by [brackets]. Ignore everything > else in > the message and focus on the IP address in brackets in the topmost > Received: > header. > Now go to SamSpade > http://www.samspade.org/ > > Copy and paste that IP address (without the brackets) into the "Do stuff" > form > and click to find out whom that IP address belongs to. This is the true > originator > of the message that you received. Ignore the From: and Reply-To: headers > as > they are most likely bogus. > > Once you know the domain of the company associated with the IP address > that > sent you spam, visit > http://www.abuse.net/ > to find out the email addresses of the > abuse department at that ISP. Just drop in the domain and it will provide > you > with the correct addresses to send your complaint to. > > Be warned! Not all ISP's are against spam. Some spammers use "spam- > friendly" ISPs who don't listen to complaints and don't act on complaints. > Other > ISPs will drop a company's hosting account on the first properly > documented > complaint. If you don't get a satisfactory response to your complaint, it > most > likely fell upon deaf ears. Don't let it discourage you from complaining. > > If you want to check to see if the upstream is a spam-friendly ISP before > you take > the time to send your complaint, check out SpamHaus > http://www.spamhaus.org/ > > Here is an example of a possible response that you might use to send to > the > upstream provider of the person or company that sent you spam: > > ------ Forwarded Message > > To: <upstream provider abuse address > Subject: SPAM COMPLAINT> [Subject: subject of spam message] > > > Sir or Madam: > > You provide connectivity to the originator of the spam message appended > below. > Please refer to traceroute following the message to understand how your > company provides connectivity to the perpetrator. > > I have never had any business with the sender nor do I desire to do so. > Incoming > UCE is a burden on my firm and its employees, in terms of staff time > wasted > and > the cost of bandwidth we pay for downloading mail we have no desire to > receive. > > Please act promptly to block or terminate connectivity to the perpetrator > and > notify me that action is being taken to prevent future such mailings. > > PLEASE NOTE: > My firm's SOP requires submission of your IP address for Realtime > Blackhole > Directory listing unless you shut down the offender. > > Kind regards, > > Your name > > 5 > > > > > > > -----------begin forwarded spam-------- > > Include spam message with full headers here > > -----------end forwarded spam---------- > > TRACKING INFO ON SPAMMER: > > IP: > > WHOIS LISTING: > > > ------------------------------------ > > HOSTING TRACEROUTE: IP > > INSERT TRACEROUTE HERE > > > ------ End of Forwarded Message > > . NEVER reply to spam > > This may seem like a no-brainer, but people do it all the time. What > happens > when you reply to spam is one of two things, neither of which gets you off > of the > spammer's mailing list: > > 1. You reply to a faked/spoofed/forged Reply-To or From address that > belongs to an innocent third party who had their domain hijacked and they > have no idea what you are talking about. No self-respecting spammer > uses their own email address. They hijack other peoples' or most of the > time they just make one up. > > 2. The second thing that can happen if you reply to spam is that you tell > the > spammer that your email address is functional and "live". A live email > address brings good money to spammers. It can then be added to a CD > that they sell for profit to tens of hundreds of other spammers, and > before > you know it you're seeing a ten-fold increase in spam just because you > followed the spammer's instructions and wrote to their Remove address or > filled out the form they asked you to fill out for removal. > > Don't do it! Just delete it! > > > > . Never buy anything from a company that spams > Do not, under any circumstances, buy any item or service that is promoted > via a > bulk, unsolicited emailing. If you do, you're only putting gas on the > fire. > Most > businesses that use spam as a marketing method are getting ripped off by > the > companies that conduct these bulk, unsolicited emailings. However if even > a > few > orders come in, they may see that as justification to continue using these > tactics. > > . Protect your Web site from spam-bots > > One of the ways that spammers obtain your address is through the use of > "bots" > or spiders that go out to Web sites like yours and look for "mailto:" > links > with > email addresses. There is a plethora of bulk email software available out > there > that allows spammers to enter a keyword like "accountants". The program > then > accesses the Internet and does searches on multiple search engines under > that > keyword, visits the top ten listings or so under that keyword and then > jumps > from > page to page on those sites, sucking up email addresses and creating a > mailing > list for the spammer. > > You can protect yourself and your company by simply not including mailto: > email > address links on your site. Take an image-editing program like Photoshop > or > Macromedia Fireworks and create an image of your email address on a white > background (or the same color as your site). Make it in the same font > that > you've > used for your site. Then take the image and link that image to a contact > form on > your site. This way visitors to your site can see your company or > individual email > address and use it if they want to, either by clicking on it to a contact > form or by > typing it into a message, but spambots can't. > > > > . Learn how to use an email program with filters > > If you use Web-based email such as WebTV, Hotmail or Yahoomail for > convenience and anonymity, that's great. At some point, however, you're > going > to want to take advantage of more powerful software programs like Outlook > 2002, Eudora or Entourage X (for Mac users). These programs offer > powerful > filtering tools on the client-side that can help filter potential spam out > of your > Inbox. Armed with a handful of simple rules that are checked on each > piece > of > incoming email and a good email program, you can considerably reduce the > amount of spam you receive. > > If you're like most of us, you probably have never read the instructions > that came > with your email program or explored the many features it offers. I'm > guilty > of this > myself, so don't feel bad. There's just too much information for me to > be > bothered with reading manuals! I want an instant solution! > > Well, in this case, I can tell you from experience that not only is it > worthwhile to buy a commercial email program, but it is also worthwhile to > invest > in the manual . Find a list of email software books. books are just like > projects. You can get through them faster if you break them up into > chunks. > In this case, go through the table of contents and Put A's > next to all the chapters that are most important for you. Put B's next to > the ones > that are not as important. Number the order and start reading the book 10 > pages > a day. Put a paperclip at the beginning of where you are reading and > another > one ten pages ahead so you know when you've reached your goal for the day. > > Take your time. The more you know about the tools and filters that these > programs offer, the better off you will be. > > . Filter spam at the server level > > Brightmail > http://www.brightmail.com/ > private labels its spam-blocking service to > a variety of ISPs like Earthlink, AT&T Worldnet and others. This > technology > takes email as it comes in and compares it with an updated list of IP > addresses, > blocks and keywords that it scans in your email and if spam is suspected, > then > the message is not downloaded to your desktop but rather moved to a spam > folder and purged every three weeks automatically. > > If you own your own domain, you can take advantage of this service by > simply > mapping your own email address to an Earthlink pop account. These > services > do not block 100% of spam, but they can be effective at reducing the > number > of > messages that you receive. Most times these services are included with > the > cost > of your account, but are not turned on unless you request it or initiate > it. > .Buy your own domain and set up a virgin email address. > I hear people complaining all the time about spam, but when it comes time > to pay > money for a solution that works, everyone suddenly gets really quiet. Why > should you have to pay for a solution to stop something that you never > asked > for > in the first place? > > I agree completely. You shouldn't have to pay to solve these problems. > You > shouldn't even have these problems in the first place, but you do. That's > reality. > Many solutions to reducing spam are free and require only your time in > learning > techniques. Others are going to cost you money. > > If you're willing to pay a small fee for a solution, here's an effective > one: > > Go to > http://www.speedhost.com/ > and buy a $5 per month mini-Web account. > That's $60 per year. > > Go to > http://www.enom.com/ > and search for and buy your own domain name for > $29/year. Set up your domain so that it points to your hosting account > and > set up > a virgin email account that has never been used. > > > > 1: Set up a public and private email account > > Set up two POP accounts for yourself - a private one and a public one: > > [EMAIL PROTECTED] > - Is a public address / account that you'll use for > public communication. This may be the address that you decide to send DEA > (disposable email address) mail to (see earlier tip). > > [EMAIL PROTECTED] > - Is your new virgin email address that is private. Treat it as > you would an unlisted phone number and only give it out to those who have > a > need to cut through the clutter to reach you. NEVER use it to register > anything. > NEVER use it to post to a public forum or discussion list and instruct > others you > give it to not to give it out. NEVER list it in any directory. > > Having a private email account that is separate from your public one will > allow > you to check only that account when traveling. You'll be pleasantly > surprised to > see "real" email and only real email when you check that account. > > > > > . How to filter pornographic spam out of your Inbox > > It seems every week I get a handful of folks asking me how to keep > pornographic > spam out of their Inboxes. It can be embarrassing, especially in a work > environment, when your boss looks over your shoulder and sees subject > lines > in > your Inbox about adult Web sites. It can be devastating when a child is > using > your computer and they get an HTML-enabled email with explicit photos. > > The majority of pornographic spam is sent with HTML-enabled email, for two > reasons: > > 1. It allows spammers to display explicit images to you in hopes that you > will > be enticed to visit their adult Web site > > 2. Because those images are remotely served, spammers are able to > determine an "open rate", which tells them of X thousand or million mailed > to, how many actually opened the message and had the images load on > their computer and how many clicked through to the porn site. This > information is critical to them in deciding how responsive a list is, > which > will determine whether they mail to it multiple times or not. > > Because images are used in most porn spam, one way of blocking these types > of > messages is to use your email client to set a filter to check the body of > incoming > email messages for the following string of text: > > <img src > > This is the first portion of HTML code used to serve an image on Web pages > and > in HTML-formatted email. If your email program finds this text string > present in a > message, you may want to create a folder or mailbox called "Possible Spam" > and > have messages that meet this criterion filtered to that folder to keep > them > out of > your Inbox. Do not filter email directly to the trashcan or deleted items > folder, as > no filters are 100% foolproof. Some real email always gets filtered, so > you'll want > to just create a spam trap. > > Now, this brings up an interesting question: What about corporate users > that > send email using rich text? What about HTML email newsletters that you > subscribe to? > > . Business email or corporate email sent in HTML format or rich text > format > should > have no problem getting through to you, provided no images are included in > it. > 95% of business email that I receive is ASCII text. The other 5% is rich > formatted text, but I can't ever remember a time when a legitimate > business > communication contained an image in the body of the message. > > As far as HTML newsletters go, you can easily set a filter to look for a > subject line > string or From: address specific to that newsletter and have it filtered > to > your > Inbox as real email. Most email filter systems read and process a filter > list from > top to bottom, so if you put your newsletter filters above your spam trap > filters, > the newsletters should arrive in your Inbox just fine. > > As with anything related to email and technology, YMMV (Your Mileage May > Vary) and this will take some experimentation on your part to find out > what > works > best for you. This method won't stop text-based porn spam - that can be > blocked > using common-word filtering - but it will keep explicit HTML email porn > out > of your > Inbox quite effectively. > . Most ISP's have spam filtering which you may not know about that must be > turned on. Go to your ISP's website and see if they offer this. Many are > using > the Gray Scale methed as well as free virus E-mail scanning. > Best wishes, > Terrill Reynolds > ---------- > Email: > [EMAIL PROTECTED] > Windows Messenger:[EMAIL PROTECTED] > Yahoo:terrillreynolds > AIM:terrill36 > PH:(910)842-7701----- Original Message ----- > > From: > David ingram > > To: > Terrill Reynolds > > Sent: Friday, July 06, 2007 6:58 AM > > Subject: what about 'xxx'? > > Hi how are you? Thank you for this information but what about 'xxx'? > > I've noticed that when i block senders list i have a lot of mail with > 'xxx'. > How can i find out where that mail is coming from and how if possible can > i stop this mail? I have a lot of mail like this or i receive mail where > the subject line isn't clear. Could that be another way for spamers to > get > you > address? Thank you for any information that you may have. I'd like to > also > be able to use this information in an anti spam program! > > Determining the Source of Spam > > > > How to find the right ISP to complain to? It takes a close look at the > spam > message's header lines. These headers contain information about the > > path an email took. > > > > follow the path until the point where the email was sent from. From this > point, also know as an > > IP address, > > it can derive the spammer's ISP and send the report to this ISP's abuse > department. > > > > Let's take a closer look at how this works. > > > > Email: Header and Body > > > > Every email message consists of two parts, the body and the header. The > header can be thought of as the envelope of the message, containing the > address > > of the sender, the recipient, the subject and other information. The body > contains the actual text and the attachments. > > > > Some header information usually displayed by your email program includes: > > List of 4 items > > . From: - The sender's name and email address. > > . To: - The recipient's name and email address. > > . Date: - The date when the message was sent. > > . Subject: - The subject line. > > list end > > > > Header Forging > > > > The > > actual delivery of emails > > does not depend on any of these headers, they are just convenience. > > > > Usually, the From: line, for example, will be set to the sender's address. > This makes sure you know who the message is from and can reply easily. > > > > Spammers want to make sure you cannot reply easily, and certainly don't > want > you to know who they are. That's why they insert fictitious email > addresses > > in the From: lines of their junk messages. > > > > Received: Lines > > > > So the From: line is useless if we want to determine the real source of an > email. Fortunately, we need not rely on it. The headers of every email > message > > also contains Received: lines. > > > > These are not usually displayed by email programs, but they can be very > helpful in tracing spam. Find out how helpful they are, and how the > analysis > works > > > > What Email Headers can Tell You About the Origin of Spam > > Parsing Received: Header Lines > > Just like a postal letter will go through a number of post offices on its > way from sender to recipient, an email message is processed and forwarded > by > several > > mail servers. > > > > Imagine every post office putting a special stamp on each letter. The > stamp > would say exactly when the letter was received, where it came from and > where > > it was forwarded to by the post office. If you got the letter, you could > determine the exact path taken by the letter. > > > > This is exactly what happens with email. > > > > Received: Lines for Tracing > > > > As a mail server processes a message, it adds a special line, the > Received: > line to the message's header. The Received: line contains, most > interestingly, > > List of 2 items > > . the server name and IP address of the machine the server received the > message from and > > . the name of the mail server itself. > > list end > > > > The Received: line is always inserted at the top of the message headers. > > If we want to reconstruct an email's journey from sender to recipient we > also start at the topmost Received: line (why we do this will become > apparent in > > a moment) and walk our way down until we have arrived at the last one, > which > is where the email originated. > > > > Received: Line Forging > > > > Spammers know that we will apply exactly this procedure to uncover their > whereabouts. To fool us, they may insert forged Received: lines that point > to somebody > > else sending the message. > > > > Since every mail server will always put its Received: line at the top, the > spammers' forged headers can only be at the bottom of the Received: line > chain. > > This is why we start our analysis at the top and don't just derive the > point > where an email originated from the first Received: line (at the bottom). > > > > How to Tell a Forged Received: Header Line > > > > The forged Received: lines inserted by spammers to fool us will look like > all the other Received: lines (unless they make an obvious mistake, of > course). > > By itself, you can't tell a forged Received: line from a genuine one. > > > > This is where one distinct feature of Received: lines comes into play. As > we've noted above, every server will not only note who it is but also > where > it > > got the message from (in IP address form). > > > > We simply compare who a server claims to be with what the server one notch > up in the chain says it really is. If the two don't match, the earlier > Received: > > line has been forged. > > > > In this case, the origin of the email is what the server immediately after > the forged Received: line has to say about who it got the message from. > > > > Are you ready for > > an example? > > List of 5 items > > > > > > Example Spam Analyzed and Traced > > Now that we know > > the theoretical underpinning, > > let's see how analyzing an junk email to identify its origin works in real > life. > > > > I've just received an exemplary piece of spam that we can use for > exercise. > Here are the header lines: > > > > Received: from unknown (HELO 38.118.132.100) (62.105.106.207) > > by mail1.infinology.com with SMTP; 16 Nov 2003 19:50:37 -0000 > > Received: from [235.16.47.37] by 38.118.132.100 id <5416176-86323>; Sun, > 16 > Nov 2003 13:38:22 -0600 > > Message-ID: <[EMAIL PROTECTED]> > > From: "Reinaldo Gilliam" <[EMAIL PROTECTED]> > > Reply-To: "Reinaldo Gilliam" <[EMAIL PROTECTED]> > > To: [EMAIL PROTECTED] > > Subject: Category A Get the meds u need lgvkalfnqnh bbk > > Date: Sun, 16 Nov 2003 13:38:22 GMT > > X-Mailer: Internet Mail Service (5.5.2650.21) > > MIME-Version: 1.0 > > Content-Type: multipart/alternative; > > boundary="9B_9.._C_2EA.0DD_23" > > X-Priority: 3 > > X-MSMail-Priority: Normal > > > > Can you tell the IP address where the email originated? > > > > Sender and Subject > > > > First, take a look at the - forged - From: line. > > The spammer wants to make it look as if the message was sent from a > > Yahoo! Mail > > account. Together with the Reply-To: line, this From: address is aimed at > directing all bouncing messages and angry replies to a non-existing Yahoo! > Mail > > account. > > > > Next, the Subject: is a curious agglomeration of random characters. It is > barely legible and obviously designed to fool > > spam filters > > (every message gets a slightly different set of random characters), but it > is also quite skillfully crafted to get the message across in spite of > this. > > > > The Received: Lines > > > > Finally, the Received: lines. Let's begin with the oldest, Received: from > [235.16.47.37] by 38.118.132.100 id <5416176-86323>; Sun, 16 Nov 2003 > 13:38:22 > > -0600. There are no host names in it, but two IP addresses: 38.118.132.100 > claims to have received the message from 235.16.47.37. If this is correct, > 235.16.47.37 > > is where the email originated, and we'd find out which ISP this IP address > belongs to, then > > send an abuse report > > to them. > > > > Let's see if the next (and in this case last) server in the chain confirms > the first Received: line's claims: Received: from unknown (HELO > 38.118.142.100) > > (62.105.106.207) by mail1.infinology.com with SMTP; 16 Nov 2003 > 19:50:37 -0000. > > > > Since mail1.infinology.com is the last server in the chain and indeed "my" > server I know that I can trust it. It has received the message from an > "unknown" > > host that claimed to have the IP address 38.118.132.100 (using the > > SMTP HELO command). > > So far, this is in line with what the previous Received: line said. > > > > Now let's see where my mail server did get the message from. To find out, > we > take a look at the IP address in brackets immediately before by > mail1.infinology.com. > > This is the IP address the connection was established from, and it is not > 38.118.132.100. No, 62.105.106.207 is where this piece of junk mail was > sent > > from. > > Best wishes, > Terrill Reynolds > ---------- > Email: > [EMAIL PROTECTED] > Windows Messenger:[EMAIL PROTECTED] > Yahoo:terrillreynolds > AIM:terrill36 > PH:(910)842-7701 > > > Visit the JAWS Users List home page at: > http://www.jaws-users.com > Address for the list archives: > http://www.mail-archive.com/[email protected] > To post to this group, send email to > [email protected] > To unsubscribe from this group, send an email to > [EMAIL PROTECTED] > For help from Mailman with your account Put the word help in the subject > or > body of a blank message to: > [EMAIL PROTECTED] > Use the following form in order to contact the management team > http://www.jaws-users.com/managers.php > If you wish to join the Blind Computing list send a blank email to the > following address: > [EMAIL PROTECTED] > > > Visit the JAWS Users List home page at: > http://www.jaws-users.com > Address for the list archives: > http://www.mail-archive.com/[email protected] > To post to this group, send email to > [email protected] > To unsubscribe from this group, send an email to > [EMAIL PROTECTED] > For help from Mailman with your account Put the word help in the subject > or body of a blank message to: > [EMAIL PROTECTED] > Use the following form in order to contact the management team > http://www.jaws-users.com/managers.php > If you wish to join the Blind Computing list send a blank email to the > following address: > [EMAIL PROTECTED] > > Visit the JAWS Users List home page at: > http://www.jaws-users.com > Address for the list archives: > http://www.mail-archive.com/[email protected] > To post to this group, send email to > [email protected] > To unsubscribe from this group, send an email to > [EMAIL PROTECTED] > For help from Mailman with your account Put the word help in the subject > or body of a blank message to: > [EMAIL PROTECTED] > Use the following form in order to contact the management team > http://www.jaws-users.com/managers.php > If you wish to join the Blind Computing list send a blank email to the > following address: > [EMAIL PROTECTED] > Visit the JAWS Users List home page at: http://www.jaws-users.com Address for the list archives: http://www.mail-archive.com/[email protected] To post to this group, send email to [email protected] To unsubscribe from this group, send an email to [EMAIL PROTECTED] For help from Mailman with your account Put the word help in the subject or body of a blank message to: [EMAIL PROTECTED] Use the following form in order to contact the management team http://www.jaws-users.com/managers.php If you wish to join the Blind Computing list send a blank email to the following address: [EMAIL PROTECTED]
