JustAnswer.com

Malaysia Clock Time

The Web Page is Copyrighted and Not Allow to Copy the Content!

Page Copy Protected

Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Do not copy content from the page because you are not allowed! Plagiarism will be detected by Copyscape.Page copy protected against web site content infringement by CopyscapeProtected by Copyscape Duplicate Content Finder
Web hosting Web hosting Web hosting Web hosting Web hosting
iNeedSell.com: Free online ads. Post your Ad here.
JustAnswer.com

Sunday, November 1, 2009

Let's Fight SPAM !

http://datacenter.cit.nih.gov/interface/images/illustration_230-cover.jpg http://thumbs.dreamstime.com/thumb_153/1181008850Mitfoc.jpg http://www.allspammedup.com/wp-content/uploads/2009/05/6a00d83451b09469e200e5527943058833-800wi-400x396.png
When the internet had been build, many people start use it to surf their data, chatting, mailing. But today, the internet had been wrong-use by some people who send some forbidden-email to peoples.

Today, Haczs Company Director -> Mr. Josh would like to launch ANTI-SPAM campaign 2009. The tittle for this year is "Let's Fight SPAM !" which is a fully registered programs, so can join up to unlimited peoples or friends.

Spam has some things in common with other human activities and transactions. There is a sender and a receiver, each with different preferences and priorities. The sender hopes to use the spam as an advertisement for goods and services, and as with all advertising projects, there is a cost and a return. If no recipients ever responded to spam, it would die out in a fortnight — but there is always someone, brain-damaged or pathological, who responds to spam advertising. And the unit cost for spam is very low, so low that one can send out 100,000 spam messages, get only a few responses, and still make a profit.

The summary of this issue from the recipient's perspective is that modern spam messages don't have to betray themselves by way of origin, return address, subject line, or message body. Put simply and directly, it is impossible to use filtering methods to stop spam. Any filtering methods, any established criteria, will be adapted to by the spammers.

There is a filtering scheme that relies on validation. It works like this: on receiving a message, an e-mail program automatically sends out a validation post to the message's return address. The idea is that the sender has to reply to the validating post in order for the original message to be delivered to its recipient. The flaws in this scheme are so numerous that it can only be adopted by one of two classes of Internet user — persons "of diminished intellectual capacity" and narcissists. The first group would not be able to think through what would happen if two validating-account people tried to contact each other:
  • Person A posts a message to person B.
  • Person B's e-mail program automatically sends a validating message to person A.
  • On receipt of B's validating message, A's program sends a validating message to validate B's validating message.
  • On receipt of B's message to validate A's validating message ... ad infinitum.

Figure 1: Original spam topology



Current spam topology

Today, SPAM are the activities of cybercriminals. It should make the reader aware that the Internet is entering a dangerous new phase in its evolution, one in which its vulnerabilities are being aggressively exploited by sophisticated, ruthless criminals. Because of the increasing importance of the Internet to business and government, I believe it will have to be completely restructured, made less vulnerable than it is now. This will require a complete overhaul from top to bottom, from the design of packet protocols to how we establish our identities online. The original Internet was designed to be as open an trusting as its original users. But those users are now in the minority, and a baser form of life has crawled out of the gutter and gotten hold of a computer. We all need to be on guard.

If you really want to fight SPAM with us, just follow the few steps:
1. Click on 'contact us' (top-right corner)
2. Choose 'others'
3. Type "I want to join fight SPAM team"
4. Click 'submit'

YOU ARE DONE!

Page copy protected against web site content infringement by Copyscape

No comments:

Post a Comment

Related Posts with Thumbnails Web hosting