Spam | Part 2

Spam | Part 2

Index, Link, Blog, Social Bookmark And Wikispam

(Continued from part 1): Then there are the so-called search engine spamming or index in which the polluter pays the results, which prints an Internet search engine for a keyword entry point, with special tricks such manipulated to appear on the front seats websites that are not for the Surfer relevant information. Even web server log are not immune to spam, they are often lined with fake referrer data. Web forums, including guest books, blogs and Wikis are also affected by spam.

Link or blog spam is taking advantage of the editing, commenting and trackback feature of blogs and guest books by spammers. The fact that blogs from search engines or web crawlers will visit often, it can create the optimizer rather quickly that they are the linked pages in the rankings very far forward.

Social Bookmark spam has nothing to do with social spam. Social bookmark services are platforms that allow individual users to save their own favorite online and wish to share with other users. Known platforms are Social Bookmark Mister Wong and del.icio.us. Spammers try by adding links (favorites) more backlinks for their own projects to receive. For some time, the exchange of social bookmark links can be observed. With the increase of abuse, most Social Bookmark platforms, the outgoing links are provided with the link attribute rel=”nofollow”.

Under Wikispam refers to a specific method of link spamming, want to increase the user by adding hyperlinks to Wiki pages to the rank of their own, often commercial site in search engine results lists. These spammers also make the advantage that search engines typically involve the evaluation of the link popularity, which is increased by the additional links. Through the link attribute rel=”nofollow”, which prevents them from search engines to use such links for the assessment, try the German Wikipedia, for example, setting to make such links useless.

Spam over Mobile Phone (SPOM)

The communication in mobile devices is affected by spam. Unwanted text messages or calls as a (mobile) phone spam, in part as spam over Mobile Phone (SPOM) refers. The increased use of mobile marketing achieved through market research and unwanted SMS Mobile phone spam in Japan is already up to 90% of electronic messaging volumes. A variant is a so-called spam or ping-calls that should last only fractions of seconds and lead to the called party to the expensive recall of a value-added service.

Other Types Of Spam

Meanwhile, there are specialized programs for nearly every publicly available via the Internet communication channel: spam over instant messaging, short SPIM, using protocols such as IRC, ICQ or Windows Messenger. Spam over Internet Telephony, SPIT are briefly described unwanted calls via VoIP.

Technical Requirements For E-Mail Spam

To send unsolicited e-mail advertising is just an e-mail program needs, provides the spam mails with the recipient addresses as well as an SMTP relay server, which then sends these e-mails to the recipients. Since each e-mail can contain a lot of address data, is used for transmission to the relay server requires only a relatively small bandwidth, a simple Internet connection and an average range of computers.

In the past, often open mail relays were used as a relay server, so badly configured mail servers abused. This approach has obscured the spammers are two main advantages: the sender and the own resources are preserved. Thanks to Realtime Blackhole Lists the number of open mail relays has since fallen sharply. Some spammers are so soft on bot nets to send their spam.

Spam Countermeasures

General Measures: Authorization

Thus, the user is not bothered by unwanted persons providing the majority of Instant Messenger can deliver, only messages from authorized persons. Also chat rooms can be set so that only members can talk to.

Traceability

Since the sending of unsolicited advertisements in most countries is illegal, then the shipper will be sued if it is traceable. This allows the IP address of the sender to find out the identity of the sender, if the Internet service provider stores the assigned IP address assigned by the customer.

Measures Against E-Mail Spam

Generally, at every instance that generated the spam or transported, measures are taken to reduce the volume of spam. Currently, spam is mainly controlled by spam filters. More recent methods propose to combat spam through corrections in the Simple Mail Transfer Protocol (SMTP) or the Domain Name System (DNS). Occasionally there are also proposals for spammers to collect addresses of beneficiaries more difficult, but that due to the existing address trade only prevents the collection of addresses on the Internet, but not the use of other sources (such as sweepstakes or online ordering) originating addresses.

Prevention is to get email address in the address list of spammers, which are very often detectable even by newcomers to emails and internet.

Continued.

Sharing

Leave your comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.