Translate
Webs Amigas
Contacto
De todo pcs

- Ruben Perez
- Puerto Vallarta, Jalisco, Mexico
- Desde hace mas de 25 años, Tacos La Abuela a deleitado a innumerables clientes con su deliciosos tacos y gorditas, Iniciando en la Ciudad de Guadalajara, La Abuela a ido perfeccionando sus sabores, dando como resultado, los tacos y gorditas de canasta mas ricos de México. La Abuela te invita a visitarla y probar sus deliciosos tacos y gorditas.
Spam is the closest thing we’ll ever find to an Internet plague. No matter who you are, spam will one day find you and you’ll have no choice but to put up with its pestilence. It’s a pandemic that people have been trying to fight for decades, yet it’s still as strong as ever. But how do spammers find you in the first place?
The primary method of spamming is through email. So, logically, you might think that as long as spammers don’t grab a hold of your email address, you should be clear from its reach, right? But it’s not that simple. Spammers have had many years to innovate and perfect their techniques, and as it turns out, they have a whole bunch of ways in which they could lay hands on your email address.
As always, knowledge is power. If you know the techniques that spammers use, then you’ll be better equipped to at least hinder them. Instead of 500 spammers knowing your email address, maybe only 5 will know it. To me, that’s better than nothing.
Method #1: Mailing Lists
One of the oldest methods that spammers have used to harvest email addresses has been through mailing lists. It makes sense; mailing lists are basically compilations of valid email addresses already. But the specifics of it may be a surprise.
Mailing list services observe certain protocols to help prevent the leakage of their email addresses to outside sources. If a mailing list service was known for a lack of email address protection, their customer base would dwindle. Even still, spammers often make requests from mailing lists to obtain a list of all the people subscribed to that list. The services will frequently deny these requests–but sometimes it works.
Method #2: Unsubscribe Links
On the topic of mailing lists, here’s another method that spammers sometimes use–and it’s a tricky one. If you’ve ever been subscribed to a newsletter or mailing list, you should know that at the bottom of every email they usually have an unsubscribe link.
Now, for most legitimate businesses, this unsubscribe link will do exactly what it’s supposed to do. If you’re receiving a newsletter from somewhere and it’s a newsletter that you purposely signed up for, then there shouldn’t be any problem with unsubscribing later.
But sometimes you’ll get spam email that poses as a newsletter and presents you with an unsubscribe option. In this case, that link could very well be deceptive.
Spammers send out these kind of emails en masse to randomly generated email addresses. By clicking on the unsubscribe link, you could actually be confirming the validity of your email addresses. This tells the spammer that your email address should be targeted with spam later.
Method #3: Brute Force
And that brings me to the next method: brute force generation. In other words, the shotgun approach to finding email addresses.
Every email address is designed with a specific structure: [name]@[domain].[com/net/org/etc]. The domain part is easy to figure out since all you have to do is look for the most popular email services and use that as a basis.
So the only important part, really, is the [name] section. At this point, the spammer can just generate a bunch of random letter-and-number combinations and send out emails to [randomly-generated-name]@[popular-domain].com. For example:
- johnsmith1@gmail.com
- johnsmith2@gmail.com
- johnsmith3@gmail.com
Suppose your email address was johnsmith700@gmail.com. Eventually, the randomly generated email will hit your real email address and send out spam to you.
Over the course of one spam campaign, a spammer could generate millions and millions of random email addresses. If even 1% of those email addresses are legitimate, that’s still a ton of people who have to deal with spam.
Method #4: Web Crawler Bots
Another common tactic is to use bots (called crawlers) that crawl through webpages, searching for email addresses that are laid out in the open. This might sound scarier than it actually is, so let me explain.
Every time you access a certain web page, the contents of that web page are sent to you through the Internet and then your browser is responsible for displaying that data to your screen. However, spammers have coded programs that request web page data from web servers without having to use a browser.
Once the data comes in, the program can quickly read through all of its contents and determine if there are any email addresses on that web page. If there are, they’re stored away into a database. And because these programs are only requesting data (not displaying it), they can go through a ton of web pages quickly.
So what kind of web pages do they crawl? Forums are a popular target. User profiles on forums often have user email addresses out on plain display. These web bots can crawl through the entire members list of a forum and pull out tons of email addresses there.
Another popular target is social networking websites. Visit the profile of one of your friends on Facebook and chances are you’ll see their email address. If you can see it, it’s likely that a bot can see it, and if a bot can see it, that email address will be stored away for spam.
Method #5: Obtaining Email Databases
Lastly, sometimes all a spammer has to do is offer up some cash and they’ll land themselves a hefty list of valid email addresses. That’s right: some companies will sell their database of email addresses in exchange for a lot of money.
Any time you register on a website or sign up for a newsletter, your email address gets inputted into a server-side database. This could be for anything–online games, forum accounts, social networking services, news outlets, blogs, what have you. Whenever you enter your email address into an online form, the risk is there.
“But what about privacy policies?” you might ask. Well, not every company practices honesty and integrity. Sometimes a company will build up a large pile of email addresses then give their own privacy policy the middle finger. Most of the time, however, email address leaks are usually performed by a single rogue employee who has high-level access.
More rarely, spammers will hack into company databases and steal their email addresses without their knowledge.
Now that you know about the various ways in which spammers can obtain your email address, it’s your responsibility to be more protective over your information. Like with any piece of personal data–credit card numbers, social security numbers, home addresses and phone numbers–be diligent in keeping it off the Internet.
Image Credits: No Spam Via Shutterstock, Newsletter Via Shutterstock, Handshake Via Shutterstock

Secciones
- 10 aplicaciones de Windows 8 enfocadas a la productividad (1)
- 10 cosas basicas (3)
- 10 mejores sitios de torrents (1)
- 20 Must Have Android Apps (1)
- Abrir varias sesiones de Skype en Windows (1)
- Administradores de Sistemas (1)
- adobe suite cs4 (2)
- aim (1)
- Alternatives To Microsoft Office (1)
- Amazon (1)
- Amazon Glacier (1)
- Android (42)
- Android 5 (1)
- Android apps (44)
- Android en un control remoto (1)
- Android News (15)
- Android Radio (3)
- Android Store (27)
- Android Tips (27)
- Antivirus (9)
- Antivirus Gratis (2)
- Antivirus Mac (1)
- antivirus para Windows 8 (1)
- Aplicaciones meteorológicas (1)
- Apple (10)
- Apple News (6)
- Apple Sotre (5)
- Apple Store (8)
- Apple Tricks (1)
- apps (15)
- Apps Windows 8 (1)
- April Fool’s Day (1)
- archivos compartidos en tu red local desde Android (1)
- Archivos FLV (1)
- archivos MKV (1)
- Ares (1)
- atajos de teclado (1)
- Atajos de teclado para Firefox (1)
- Atajos de Teclado Windows 8 (1)
- aviso de privacidad en Facebook (1)
- Back up (1)
- Backup (1)
- Backups (1)
- Barras de progreso (1)
- Bateria Laptop (1)
- Best Android Devices (1)
- Blackberry (84)
- blackberry 9800 (3)
- Blackberry Apps (17)
- blackberry messenger (7)
- blackberry themes (9)
- blackberry trouch (4)
- Blogger (2)
- Bloquear Solicitudes de Aplicaciones en Facebook (1)
- Browsers (2)
- Burn Prorgams (1)
- busqueda de imagenes (1)
- c (1)
- camara apps (2)
- CamScanner (1)
- Card.io (1)
- CCleaner (2)
- CEO Mark Zuckerberg Shares A Personal Note (1)
- chat de facebook (1)
- Chrome (8)
- Chrome Extensiones (4)
- Chromebook (1)
- click derecho enviar a (1)
- Clientes de escritorio Instagram Pokki Windows (1)
- Cloud Backup Service (1)
- Cobian Backup (1)
- Codigos QR (1)
- commercial (1)
- Comparativa: Las mejores apps de mensajería móvil (1)
- configurar el correo web de Outlook (1)
- Consejos (15)
- Consejos Laptop (1)
- controlar el consumo de datos en Android (1)
- convinacion de teclas (1)
- Copa America 2011 (1)
- Copia de seguridad Navegador (1)
- Corrector Ortografico Navegador (1)
- Cosas Curiosas (2)
- Cosas Graciosas (3)
- Creación de tonos de llamada (1)
- Curriculum online (1)
- Curriculum Vitae (1)
- Customization Tools (1)
- CV online (1)
- Descargar Audio de Youtube (1)
- Descargar Videos (2)
- descargas automaticas (2)
- dia de los inocentes (1)
- DisckDigger (1)
- DNSchanger (1)
- Download Music (1)
- Dropbox (4)
- Dropbox Android (1)
- Dropbox Windows 8 (1)
- DropSpace (1)
- Edicion de Imagenes (1)
- Eliminar Virus Flashback Mac (1)
- Emule (1)
- errores de Windows (1)
- Escucha Pandora (1)
- Eurocopa (1)
- Evernote (1)
- Explorar (1)
- fa (1)
- face (3)
- facebook (39)
- Facebook Appstore (8)
- facebook chat (8)
- Facebook Gifts (1)
- Facebook Graph Search (1)
- FAcebook Messenger (5)
- Facebook Messenger para Firefox (1)
- Facebook News (13)
- Facebook Para Celulares (8)
- facebook Report (1)
- Facebook Rumores (1)
- Facebook Smartphones (9)
- Facebook Timeline (3)
- Facebook Tips (13)
- Facebook Tops 1 Billion Monthly Active Users (1)
- Facespool (1)
- Faebook Phone (1)
- Fake ID (1)
- Filtros (1)
- Filtros de Correo (1)
- firefox (18)
- Firefox 11 (2)
- Firefox 15 (2)
- Firefox 16 (1)
- Firefox Addons (1)
- firefox Extensiones (6)
- Firefox News (9)
- Firefox OS (3)
- Firefox Restaurar Pestañas (1)
- Firefox Tips (1)
- Firefox14 (1)
- fireworks cs4 (1)
- Flashback Virus (2)
- Flickr (2)
- Foto de la Semana (1)
- free apps android (1)
- Free Browser (1)
- Freerapid downloader (1)
- Futbol app (1)
- Futbol enlinea (2)
- Galaxy News (1)
- galaxy note (1)
- Galaxy S 4 (1)
- galaxy s iii (2)
- Galaxy S III mini (2)
- Galaxy s III vs Iphone (1)
- gestores de archivos para Android (1)
- Ghost Hunting Apps (1)
- Gmail (7)
- Gmail News (2)
- Google (40)
- Google Birthday (1)
- Google Chrome (10)
- Google Chromebook (1)
- Google cloud (10)
- Google Doodle (6)
- Google Dootle (1)
- Google Drive (8)
- Google Earth (1)
- Google Fiber (1)
- Google Free Wi-Fi hotspots (1)
- Google Glass (2)
- Google Laptop (2)
- google maps (8)
- Google News (20)
- Google OS (3)
- Google Play (11)
- Google Reader (1)
- Google Self-Driving Cars (1)
- Google Street View (2)
- Google Tablet (1)
- Google Tips (19)
- Google TV (1)
- Google World Wonders (3)
- Google+ (1)
- Grambacker (1)
- gtalk (4)
- Guía de Windows 8 (1)
- Guia Windows 8 (1)
- Guía: cómo hacer el cambio de MSN Messenger a Skype (1)
- Here Servicio de Mapas (1)
- Hide IP (1)
- hotmail (5)
- How secure is your network (1)
- How To Safely Clean Your Tablet Or Smartphone’s Touchscreen (1)
- How To Save A Wet Cell Phone (1)
- Icould (1)
- icq (2)
- iDisplay: (1)
- IFA (1)
- imagen a ico (1)
- Instagram (5)
- Instagram News (3)
- Instagram para Windows (3)
- Instagram PC (1)
- Instagrille (2)
- Internet Explorer Security holes (1)
- iOS 6 (2)
- Ipad (7)
- Iphone (7)
- iphone 2012 (1)
- Iphone 5 (5)
- Iphone Apps (4)
- Iphone vs Galaxy (1)
- Ipod (5)
- Itunes (1)
- Jdownloader (2)
- Jeff Healey (1)
- JetClean (1)
- juegos gratis (1)
- Kaspersky (2)
- Laptop (2)
- Laptop Tips (1)
- laptops (4)
- lightning (1)
- limewire (2)
- Mac (13)
- Mac VIrus (5)
- malware (1)
- Media Player (1)
- Mediafire (1)
- Megaupload (1)
- megavideo (1)
- mejorar el rendimiento de tu PC (1)
- Mercado Libre (1)
- Messenger (2)
- Microsoft Office (2)
- Missing Or Broken Mouse (1)
- Mobile Payments (1)
- Motorola (1)
- Mouse Tips (1)
- Mouse Tricks (1)
- Mozilla (1)
- Mozilla B2G (1)
- Mozilla OS (1)
- msn (2)
- musica en linea (1)
- música gratis (1)
- MyTracks 2.0 (1)
- Navegadores (3)
- Nero (1)
- Netbook (1)
- Netbook market to end at the end of 2012 (1)
- netbooks News (1)
- New iMac And Mac Mini (1)
- News (25)
- nexus (1)
- Nokia (1)
- Notebook (1)
- Noticias (50)
- office (4)
- Office 2013 (6)
- Office 365 (1)
- Office News (5)
- Ol (1)
- Olimpiadas (3)
- Olympics Apps (3)
- online movies and shows (1)
- Online TV (2)
- open source (1)
- Opera (2)
- Opera Tips (1)
- Out of Ram Android (1)
- Outlook (5)
- Outlook.com (4)
- Pandora (1)
- Pandora Radio (1)
- pantalla de inicio en Windows 8 (1)
- Paypal (1)
- PC Tips (1)
- Peliculas y show en linea (1)
- Permanently Delete Your Facebook Account (1)
- Photo Apps (1)
- Photoshop (1)
- Pinterest (1)
- Pinteresta (1)
- PlayBook (11)
- Pmodroido (1)
- Pomodoro (1)
- Portables (3)
- problema de seguridad de Internet Explorer (1)
- Programas (79)
- programas de edicion de imagenes en linea (1)
- programas en la nube (1)
- Programas en linea (44)
- Programas Gratuitos (47)
- Programs (1)
- Programs for USB (1)
- Project Glass Google (1)
- Proxy PAndora (1)
- psa (1)
- pulseras Jawbone (1)
- Radio online (1)
- rapidshare (1)
- Reason To Switch From iOS to Android (1)
- Recetas IFTTT para sacarle partido a Google Drive (1)
- Recording programs (1)
- Redes Sociales (13)
- rellenar formularios en PDF desde Android (1)
- Remote Access Tools (1)
- Remote Web Desktop (1)
- Removing the Useless Apps (1)
- Respaldos (1)
- safari (2)
- Samsung (5)
- Samsung Chromebook (1)
- Samsung Galaxy (1)
- Samsung Galaxy II (2)
- Samsung Galaxy III (1)
- Samsung Galaxy S4 (1)
- Samsung News (3)
- Samsung Slate PC (1)
- Share Files on the cloud (1)
- Sharepod (1)
- Shortened URL Bundles (1)
- sistemas operativos online (1)
- SkyDrive (1)
- Skype (8)
- Skype Emoutions (1)
- Skype Malware (2)
- Skype sustituirá definitivamente a Messenger el 15 de marzo (1)
- Skype Virus (1)
- Software to Sync With the Cloud (1)
- SOPA (1)
- spam telefónico en Android (1)
- Spammers (1)
- Swype Living (1)
- Sync Your Bookmarks (1)
- Synchronization (1)
- SyncToy (1)
- tablet “Surface (1)
- Tablet Nexus 7 (2)
- Tablets (1)
- Tecla FN (1)
- temas blackberry (7)
- Temas Windows 7 (1)
- Themes Windows 7 (1)
- Tips (64)
- Tips Facebook (1)
- Tips for USB (2)
- Tips For Using A Laptop In Comfort (1)
- transferir fotos entre iPhone y la PC (1)
- Triber (1)
- Tricks (45)
- Trucos (77)
- trucos para Skype (1)
- Trucos Word (1)
- Tv en linea (1)
- twitter (7)
- Ultrabook (1)
- USB 3.0 (1)
- USB Tips (1)
- usuarios problemáticos en redes sociales (1)
- Utorrent (2)
- vi (1)
- Videos a MP3 (1)
- virus Mac (2)
- virus más peligrosos (1)
- VLC (1)
- vulnerabilidad de Internet Explorer (2)
- Vuze (1)
- Wassapp (1)
- Weather Apps (1)
- WhatsApp (4)
- WhatsApp tips (3)
- Wifi Tips (1)
- windows (64)
- Windows 7 Login Screen As Like Windows 8 (1)
- windows 8 (34)
- Windows 8 Shortcuts (20)
- Windows 8 App (1)
- Windows 8 Guia (5)
- Windows 8 Trucos (24)
- windows live essentials (3)
- Windows Live Messenger (4)
- Windows Media Player (1)
- Windows News (21)
- Windows Registry (1)
- Windows Tips (24)
- Windwos 7 (11)
- Windwos 8 Programs Metro (19)
- Windwos Live essentials 2012 (2)
- windwos messenger (5)
- wolfram Facebook (1)
- Word Lens (1)
- WPOWA (1)
- Xbox News (1)
- XenoAmp (1)
- Yahoo (2)
- yahoo messenger (2)
- Youtube (4)
- YouTube 8 (1)
- Youtube News (1)
- youzee (1)
0 comentarios:
Publicar un comentario