Фрилансеры предложат свои варианты уже через несколько минут!

Публикация заказа на фриланс бирже не займет много времени.

Статьи о спаме – №5

Information boom (spam), what is it like?

Network development have caused the information overload to become the main problem for users. That is why the network community has developed special rules aimed at user security from unnecessary/ not requested information (spam). Particularly, the following is not tolerated:

1. Messages mass delivery via e-mail and other means of information personal exchange (including instant messages delivery service, such as SMS, IRC etc), other than recipients initiative, expressed clearly and unambiguously.

The e-mail address or other system of information personal exchange open publication may not servive as the basis for e-mail address inclusion to any messages  mass  distribution list. The inclusion of address, received via any mean (through web -form, subscription robot etc), to the addresses list, through which any distribution is conducted, is allowed in case of appropriate subscription confirmation technical procedure presence, which guarantees that the address will be included to address list only on address owner confirmation, only. The subscription confirmation procedure should exclude the possibility of address inclusion to any mail distribution list (single or regular) on the third parties initiative (i.e. parties not being the owners of the aforementioned address).

Any subscriber should have the possibility to leave mailing list immediately without any difficulty if he (she) has such wish. Though, the presence of the possibility to leave the mailing list itself,  may not not serve as a discharge for address inclusion to the list without address owner will. 2. Electronic letters and other messages sending, containing large attachments and/or having a substantial volume, without e-mail owner previous approval.

3. Distribution (other than user direct initiative):
— e-mails and other messages (including but not limited to single ones),  having advertising, commercial and agitation character;
— letters and messages, containing rude and insulting expressions and offers.
— Delivery of messages asking to transfer the received message to other allowed users (chain letters).
— Usage of impersonal ("character") addressed other than on their direct destination, set by address owner and/ or in accordance with standards.

4. Placement of the messages not corresponding with the topic of conducted discussion at any electronic conference (off-topic). Teleconferences, Usenet  (news group) and other conferences, forums and mailing lists are hereinafter referred as conference.

5. Placement of the messages, having advertising, commercial or agitation character at any conference, except the cases when such messages are allowed by the rules of the aforementioned conference or its' placement has been agreed with such conference owners or administrators beforehand.

6. Placement of the articles containing attachments, except the cases when attachments are clearly allowed by such conference rules, or their placements has been agreed with conference owner or administrators beforehand.

7. Information deliver to the users who have expressed their reluctance to receive the aforementioned information, information of the said category or information from the aforementioned sender.

8. The usage of own or provided resources (mail boxes, e-mail addresses, web pages etc.) as contacts when doing one of the actions described above, not depending from which network point such actions have been conducted.

9. Conducting the following activities on spam support service (spam support service):
— task-oriented scanning of informational resources content in order to collect e-mail addresses and other message delivery services;
— software distribution for spam delivery support;
— creation, verification, support or distribution of e-mail addresses data bases and other messages delivery services (excluding the cases when the aforementioned addresses owners, included in such data base, have clearly expressed their agreement to include their address to some specific data base; the address open publication can not be treated as such agreement).

---

How to protect yourself from spam?
1. Do not make doubtful contacts at Internet. Some persons, having found out your address will subscribe it to various newstellers, and specify it during registration at various sites - being simply prank (or meanness).
2. Before pressing any button on some site (when making order at internet shop, or sending post card etc.) after entering your e-mail address, make sure, that by pressing the said button, you do not to express your agreement to receive information from that site. It is sometimes written  in very small font at the very middle of user agreement or made in form of very small tick on the page distant corner.
3. Do not leave your address at internet sites (job sites, guest books, forums, acquaintances etc. - where your message with address everyone can see).
4. If you really need to do it - make separate e-mail address for such purpose and be ready to receive the loads of spam together with required information.
5. If your address had been displayed somewhere in any way, or it had been calculated via selection, and it turned out to be at spammers lists, it is necessary to fight spam trying to break into your mail box. Practically each mail server or mail program have the option of letters, coming to your mail box, preliminary filtration, and refuse the acceptance of such letters. 
Such filter can be: 
—  refusal to receive letters, in case if  TO and COPY fields do not contain your e-mail address; 
— refusal to receive letters, with letter body, not containing the code word, you invented and informed all your correspondents about it; 
— acceptance to get letters from the addresses you put to the White list only etc.
6. Install special software - spam killer  to your PC.

---

Addresses... How spammers get them?

Spammers identify users e-mail addresses via various means. Here are some of them:
1. The user e-mail is published in open site - most often it goes about guest book, forum, personal card etc., where it can be detected by special software (harvester), which scans sites like search systems indexation robot.
2. In case if e-mail address is not a unique word, for example widespread name or title, it can be chosen with the help of dictionary. Spammers have special dictionaries, which include simple words, people names, geography units titles and some the most popular network slang combinations. By combining this dictionary and the list of domains names (published in open access), spammers get addresses list for mailing.
3. If the said e-mail address owner corresponded with the person the computer of whom had been infected with Trojan malware, all addresses from address book can be taken by spammer.
4. Some company clients data base, which can be stolen or sold to spammers by the said company employees.

---

Hide e-mail addresses from spam- robots

Little son came to his father and asked him: «Is spammer is good, or he is bad?». I think that even little kids from the most "proficient" families have heard about spam which is a result of invisible front employees hard work. Today I will tell you how you can hide e-mail addresses from spam - robots, constantly surfing over the web in the search of new e-mails, when you are on some site pages.

As you all know, for sure, that spam is a big headache of all global network. Spam - robots are scanning a network and tear e-mails from site pages. Spammers are happy with growing addresses base and make money. Users are afraid to  leave their addresses at forums, guest books etc... Admins are nervously configuring the spam- filters. Just simply saying, everyone is doing his work. Though, no one except spammer is not satisfied with such situation. What can we, the developers, first do in order to avoid such outrage? We can make e-mail addresses to be not understandable for spam - robots.

The spam - robot is the software that searches the symbols specific sequence (and this its' weakness), that looks like e-mail. Of course, spam robots are not too "stupid" and have some intelligence, which allows them to overpass some protection types. For example, the robot is sure to be able to detect in line:

my email

Mnemonic links for symbols and decode them into "myname@mysite.com".
Though the robots are far from being perfect, and in particular, they are not able to interpret JavaScript- code, and we will use this bug. We will type JavaScript- function, which will type e-mail address on the page As the robot is not able to perform the function, it will not be able to get its' performance result- the e-mail

String.prototype.printed =
function (_hamper,_prefix,_postfix,_face)
{
  _hamper=
  _prefix+
  "@"+
  this+
  (_postfix || '')
  document.write((_face||_hamper).link("mailto:"+_hamper));
}

It  will be better for you to save this function in a separate file, (e.g. hide_email.js) and activate it, when being at necessary pages in the following way:






You can contact me via the following address:
"mysite".printAddr('anything', 'myname', '.com');



The user will see the following as a result:

You can contact me via the following address: myname@mysite.com

The way described above is very efficient for today, though there is one nuance: user can deactivate Javascript, or broswer may not support it. What shall we do then? The ... will be very helpful, as it displays all contents in case if  javascript is not available. The only thing w...