![]() |
![]() |
||
Coping With Email Spam
|
|||
OverviewEmail spam is unsolicited, unwanted, "junk" mail sent to multiple recipients. The people who send out such mailings often create their spam lists by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. Some direct their spam attacks to existing email lists. The University, through ITR, is constantly working to do what it can to reduce spam email; however, like the mail you receive at your home, virtual junk mail is hard to get rid of. It is also difficult to identify. Email that one person classifies as unwanted may be email that another is happy to receive. Over time, ITR has taken steps to incorporate several anti-spam filtering and tagging procedures designed to reduce the amount of junk E-mail we all receive and to make it easier for us to identify spam E-mail. These procedures include:
For your traditional mail, your can eliminate some mail that comes to your home by notifying the Post Office that you do not wish to receive mail of a certain nature. However, there always seems to be other junk mail to replace it. Most unwanted email is merely a nuisance, and the best way to get rid of it is to delete it. It is generally not a good idea to respond to messages from unknown sources — not even to unsubscribe from a mailing list — as it will just let the person who sent the message know that your email address is active. If you recognize a legitimate source, however, by all means unsubscribe if you do not wish to receive any more messages. "Screening" Mail Sent Using an Email Link on a Web PageMany spammers use automatic "spambot" (spam robot) programs to gather email addresses. The spambot follows links and saves any email addresses it finds as it goes along and then sends automatically generated messages to those addresses. You can identify legitimate mail from your site by adding a subject attribute to the "mailto:" tag as follows:
When someone clicks on the email link to send a message, the subject line will automatically be filled in. Unless the sender goes to the trouble to change it, you'll see the subject line you specified whenever you receive mail from that site. Spam will typically not contain the specified subject line; thus, you'll be able to recognize legitimate mail from visitors to your site. You might also filter messages based on the subject line to separate legitimate messages from spam (see below). Filtering Messages to Isolate or Delete Unwanted MailIf you continue to get unwanted email from identifiable sources, you can use your email client's filtering capability to delete all mail from those sources. Unfortunately, as with traditional mail, there always seems to be other junk mail to replace it. Another method of filtering enables you to organize messages in folders and to isolate potential junk mail in its own folder. The filtering may be as simple as sending all non-CSUN mail to a separate folder or as intricate as setting up folders for various categories of mail and directing incoming mail to the appropriate folders. Using this method, you can easily see those messages you know you want to look at. Then, at your leisure, you can peruse the folder containing what may be junk mail and you can delete all unwanted messages. If you find legitimate messages in the folder, you may want to refine your filters, so that subsequent messages from the same source won't be filed in the "potentially-junk folder". Filtering instructions for Webmail Direct, Netscape Mail, Outlook, and Macintosh OS X Mail are available as follows:
Reporting AbuseSpamming is not an authorized use of campus resources. Therefore, if email spam appears to be coming from another CSUN user — and you're not comfortable discussing the problem with that user, it is appropriate to report it to ITR via email to abuse@csun.edu. Some spam may be malicious or even illegal. In such instances, there are a number of options to choose from, including the following.
How to Learn MoreSeveral excellent sources of information about email spamming are linked below. |
|||
December 8, 2006 |
Page maintained by User Support Services |
||
ITR's technology training guides are the property of California State University, Northridge. They are intended for non-profit educational use only. Please do not use this material without citing the source. |
|||