SPAM !!!!!!

Posted on 1998-11-05
Last Modified: 2010-04-27
I'm receiving unwanted e-mails. Can you tell me how can I block them?
Question by:demami
  • 3
  • 2
LVL 11

Expert Comment

ID: 1012142
The best idea is to mail postmaster@(domain where mails are from) and ask if s/he can look into it. if they were posted with a false return address, look in the mail header and send to the domain of the first mailserver that the message came from.

Accepted Solution

esr0k earned 0 total points
ID: 1012143
Once your address is SPAMed it's pretty much impossible to undo the damage. If you get something that says "Send note to (address) to have your name removed from our mailing list" or something to that effect. Don't do it. You actually increase your chances of getting SPAMed.

The best you can really do is never fill-in the user description fields of your web browser (more specifically, do not fill the user-name field). Most sites you visit can get it from your browser without even asking permission. Possibily you can put postmaster@localhost in the description fields of your web browser (if it actually needs something).

If you want your readers to have your address, put it in your signature.Refrain from registering your actual mail address in servers you don't trust (most magazines, and many more are impossible to trust).

Refrain from providing your address in home pages. That is a BIG constraint, but it may help since some address seekers are using web robots to get them out of the published web-pages.

Beware of mailing lists. They seem to be pretty immune of spams up-to-now (even if there are some exceptions), but this could not be considered a permanent feature and people could easily pump addresses out of mailing lists.

You can read up more on Junk Mail @

Good Luck!


Expert Comment

ID: 1012144
Some e-mail providers give you the option to filter out the undesired incoming messages, just only by specifying its address in a "don't allow messages from" list. Check if yours has that possibility.
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.


Expert Comment

ID: 1012145
Some e-mail providers give you the option to filter out the undesired incoming messages, just only by specifying its address in a "don't allow messages from" list. Check if yours has that possibility.

Expert Comment

ID: 1012146
ARGHH!! Ya got me. I completely forgot about that! (my provider just happens to neglect the little.... useful things.)


Expert Comment

ID: 1012147
Unfortunately, my "answer" is only a "comment"... :(

Anyway, glad to have been useful.

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now