Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2873
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2865
Total: 2866









Author Topic: Spam Methods  (Read 4845 times)

0 Members and 1 Guest are viewing this topic.

Amker

  • SCF Global Moderator
  • *****
  • Posts: 1076
  • KARMA: 22
  • Gender: Male
    • SCforum.info
Spam Methods
« on: 02. June 2007., 19:57:13 »
Spam Methods

Almost everyone is aware of the nuisance caused by spam email. When we get to work in the morning we have to delete a bunch of useless messages from our Inbox before we can start the day. When we get home we have to do the same thing before getting around to reading messages from friends and family. Do you ever wonder how these spammers came by our email addresses in the first place?

There are several ways for spammers to gather email addresses to send their messages to. One of the oldest techniques involves sending a “bot” to crawl around on different Web sites, Usenet groups, and other similar Internet resources searching for email addresses. While this method works, it is time-consuming and prone to gathering addresses that are outdated and no longer in use. Another popular method involves generating email addresses using a technique called brute forcing. This method tries sending spam to addresses composed of every possible combination of letters and numbers (for example, a@victim.com, b@victim.com, c@victim.com, etc.). Again, this method produces many invalid addresses and wastes the poor spammer’s time and resources.

So, what’s a spammer to do? Earlier this week a worm called JS.Yamanner@m propagated through the Yahoo! Mail Web mail service. Details of JS.Yamanner@m have already been discussed at length, but one significant action of the worm has been overlooked somewhat. When the worm runs it uploads the list of email addresses in the affected user’s address book to a Web site. The most likely reason for this upload is so that the addresses can be added to databases used by spammers and phishers. Since the addresses are contained in an active user account it is more likely that the majority of addresses are valid and current, therefore increasing their value.

While this is not the first piece of malicious code to gather email addresses, it does demonstrate that this is an ongoing concern. As spam becomes more profitable the spammers are, in turn, becoming more sophisticated because after all, time is money.
# Online Anti-Malware Scanners: http://scforum.info/index.php/topic,734.0.html

Samker's Computer Forum - SCforum.info

Spam Methods
« on: 02. June 2007., 19:57:13 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023