Главная | Соглашение | Публикация статей

Spam and how to cope with it
Категория: English version

The term spam has its origins from the old (1972) English comic sketch group Monty Python Flying Circus, in which visitors Bistro, trying to make an order, forced to listen to the choir Vikings, praised canned meat (spam). Go to the restaurant, all meals consist of the contents of canned food.

Most spam today is sent from the territory of countries in Asia and in 2004 more than 50% of all spam in the world sent residents of North America

According to Kaspersky Labs, in March 2006, the proportion of spam e-mail traffic in general has fluctuated in the averages - 74-77%. This is slightly higher than in February. At the end of each week (Friday - Saturday) there were minor outbreaks of the number of spam in the mid-month, reaching 81-84%.

How to avoid spam mailings?

Try not to leave their email addresses for different kinds of servers questionable content.

Do not send to the spammer heap of garbage. You may have incorrectly identified where, in fact, came spam, and affected people without any relation to the spammer.

Never respond to messages spammers - thus you give them to know that your address actually exists and there delivered mail is read by the owner. If, in their letter states that you can exclude themselves from the list by sending to a specific address, click "remove" - in most cases it is a lie. Following this advice, you will only confirm the possibility of using your address for future mailings.

Spam and how to cope with it

Статьи по теме:

Linear Magnetic Recording Dlt (Dlt-V/Sdlt/Dlt-S4)
Increases user rights
With your husband talking about your computer?
On Legalization. Price Errors!
Potential voltage stabilizers for the protection of the personal computer
Your teenager safely use the Internet?
Introducing the expense of medical software - to allow for medical centers
Completed work on setting up a new product Alee Archive 3 for work with DBMS
Protection of information. Passwords At Rar archives
Determination of computers as an object of design
Playing audio and video files
Tracing processes in UNIX
The program 1S Salary and Personnel Management 8
Hold printing
What is the codec and where they can be downloaded
3Ds Max 2008 (Rip)
"Trojan horse"
NETGEAR Network
Make backup ropii professionally - Norton Ghost 14
Why work for a computer is harmful to human health
Loss of information - whether it can be avoided?
The possibility of CompactPCI have more than 8 slots
Routers NetGear
Erg-exercises to prevent PVPN
1C Program Office Trade 8
More WinRAR 3.70 RU Final
Terms of the need for backup devices
The process of software development, the Program for Business
The reverse side of the coin Spyware
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
Why is cleaning Windows registry needed
VARIETY COMPUTER VIRUSES
Active Desktop Windows XP
The program 1S Accounting Enterprise 8
Automation planning printing by Apple (Mac)
Network
The signals under UNIX
The program to automate Beauty Shop - Business tool or waste of money?
Fire systems company Satel now can be controlled by phone or Ethernet
Mobile Commerce, Mobile Commerce System
WAYS OF COMPUTER CRIMES
Corporate Information System (Crm, Erp, mobile commerce)
The attack at Infinity Gb V2 2
Robot Tartalo knocking at your door
Local bus
The processes in the operating system UNIX
Office automation
Loading the alternative mode
The advent of IBM PC
The story of software Escrow
ISA bus
COMPUTER CRIME PREVENTION
Development of Iron Industry Or Who Wanted Now Multi Processors
Team-quality design of computer
Computer data as an object of criminal assault