How to avoid being spammed by email

It’s difficult to completely avoid spam mails that may be sent to your e-mail account in hundreds or even thousands a day. Sooner or later “spam” senders will find out your email address and then you will be getting more and more total garbage that would take time to sort and delete from your mailbox.

One thing is sure – the things that work here are usually the most simple, like prevention of spam. Try to keep your e-mail address confidential – do not post it online, be careful when signing up at various sites. One thing that I have noticed not while ago is company websites – these often have “contact” or “about us” web pages with all their employees’ email addresses written down (what a desert for spamming services). Such obvious mistakes end up in being spammed with hundreds of total garbage messages per day.

Another quite effective thing is changing your email address once in a while, though it works only in corporate and business environments. It’s a tougher task to accomplish when your personal emails accounts are at stake, because not all your friends will notice the changes in your email address and make necessary changes in their address book.

If you are asked to register in any kind of website, make sure you read the terms and conditions, and the need for this information. If you are writing a comment on a particular publicly accessible web site, use your other (alternative) email address.

You can still leave your email address in your website, just write “ETA” (letters) instead of the @ symbol. This way you will be decreasing the chance that your address will be “stolen” by means of automated e-mail spam robots.

Mail spammers can also get your address from your friends or colleagues, if their computer is infected with the virus and it has a valid email address book kept in Outlook Express, Microsoft Outlook or whatever mail program you have. Do not be surprised, if diligently keeping to all the anti spam, you will still get nasty messages about your p… enlargment. 

Finally, spam messages can be sent to random addresses in an attempt to guess the possible e-mail  address. Therefore, never reply to spam. Any response to such type of mail, even your answer does specify that you no longer wish to receive spam, click on links only proves spam distributor, that his letter was received, opened and read through, which means that he will most probably continue sending spam messages to your address.

To fight spam use spam blocking (anti-spam) measures that are installed and configured in mail servers like Google or Yahoo according to your needs (contact, message and content blocking, filtering, links, IP filtering and etc.)

How can a virus attack a computer

Viruses are programs designed to infect and take over our computer files. The purposes of a virus creators are always more or less the same: stealing sensitive data (credit card data, personal email, passwords and user names), corrupting (changing system data for further malicious purposes), deleting (deleting system and other important files) or just for fun – especially when the computer is located in Pentagon or other military facility behind a dozen of firewalls. How does a virus penetrate our system? What are the most popular ways to infect our system? Let’s look at the two most common.
Fraudulent emails.
Many people have e-mail addresses and e-mails and will be happy to communicate online. But e-mails can hide some sort of danger. Sometimes users get messages about recently modified online banking login. They are asked to go to the page and enter their log in password or other personal information. Often these letters have the same look and feel like they really sent by the companies or banks. All this is a part of a hacker’s attempt to extract personal information, often for the purpose of subsequent financial crime, like stolen identity usage when requesting a loan. No company, involved in online business will ever ask you re-enter personal data in this way. Often, such messages can be identified looking at the page address. At best, the URL address will be similar to reliable companies’ and yet will have one or two additional or lacking symbols, at worst – a jumble of numbers and letters. One will be able to identify a fake address examining closer the URL. The simplest method of prevention is not opening pages in which e – criminals try to make the user to enter their personal data. Most recent web browsers have additional measures to verify that the opened page is secure against phishing attacks. This is another reason to use the new versions of browsers.

Software errors
Modern program consists of thousands of lines of programming code, and for one reason or another that code can be accessory error (called bug), which allows third parties to compromise a user’s data or the entire system. Programs that use the internet connection are more or less vulnerable. A popular Internet chat program Skype is a frequent target for different pests and it is necessary to use the latest version of the program for the security sake. This rule also applies to other programs, such as Web browsers (Firefox or Internet Explorer). The program checks whether a newer version is released, and requests to download updates. Newer versions of software not only provide new features and capabilities, but also correct errors and bugs in the same software.

Many modern operating systems have built-in firewall.

Firewalls are programs protecting internet users from intruders and malicious programs. They perform accurate online traffic filtering, checking all the information between the user’s computer and the Internet. The firewall may be configured to remember the programs that can connect without limitations to the Internet, as well as block the programs that can retrieve information from the Internet and which should be forbidden any contact with the network. If some kind of program is trying to connect to the Internet, and the firewall cannot identify it, the user is given the question of whether to allow this program to make the connection. Free software enthusiasts and home users often prefer ZoneAlarm. The free version is available in the internet, just Google “zone alarm” and you will be given a lot of options to download the application from. This firewall, just like antivirus and antispyware software, operates in the background and checks all data transfers of programs between a computer and Internet.
Cyber-world opportunities are expanding, and the number of hijacking computers is increasing as well. It is therefore necessary to use the latest tools to combat intrusions and information theft. Computer operational systems should be regularly updated, not even mentioning antivirus, antispyware and firewall programs. Follow these simple rules and you will have a more secure PC system that will retain its identity.