Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

SPAM !!!!!!

Posted on 1998-11-05
6
Medium Priority
?
232 Views
Last Modified: 2010-04-27
I'm receiving unwanted e-mails. Can you tell me how can I block them?
0
Comment
Question by:demami
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 11

Expert Comment

by:RoadWarrior
ID: 1012142
The best idea is to mail postmaster@(domain where mails are from) and ask if s/he can look into it. if they were posted with a false return address, look in the mail header and send to the domain of the first mailserver that the message came from.
0
 
LVL 1

Accepted Solution

by:
esr0k earned 0 total points
ID: 1012143
Once your address is SPAMed it's pretty much impossible to undo the damage. If you get something that says "Send note to (address) to have your name removed from our mailing list" or something to that effect. Don't do it. You actually increase your chances of getting SPAMed.

The best you can really do is never fill-in the user description fields of your web browser (more specifically, do not fill the user-name field). Most sites you visit can get it from your browser without even asking permission. Possibily you can put postmaster@localhost in the description fields of your web browser (if it actually needs something).

If you want your readers to have your address, put it in your signature.Refrain from registering your actual mail address in servers you don't trust (most magazines, and many more are impossible to trust).

Refrain from providing your address in home pages. That is a BIG constraint, but it may help since some address seekers are using web robots to get them out of the published web-pages.

Beware of mailing lists. They seem to be pretty immune of spams up-to-now (even if there are some exceptions), but this could not be considered a permanent feature and people could easily pump addresses out of mailing lists.

You can read up more on Junk Mail @

http://query.lycos.com/wguide/wire/wire_582643_45351_3_1.html

Good Luck!

0
 
LVL 3

Expert Comment

by:vikiing
ID: 1012144
Some e-mail providers give you the option to filter out the undesired incoming messages, just only by specifying its address in a "don't allow messages from" list. Check if yours has that possibility.
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 
LVL 3

Expert Comment

by:vikiing
ID: 1012145
Some e-mail providers give you the option to filter out the undesired incoming messages, just only by specifying its address in a "don't allow messages from" list. Check if yours has that possibility.
0
 
LVL 1

Expert Comment

by:esr0k
ID: 1012146
ARGHH!! Ya got me. I completely forgot about that! (my provider just happens to neglect the little.... useful things.)


0
 
LVL 3

Expert Comment

by:vikiing
ID: 1012147
Unfortunately, my "answer" is only a "comment"... :(

Anyway, glad to have been useful.
0

Featured Post

Introducing the WatchGuard 420 Access Point

WatchGuard's newest access point includes an 802.11ac Wave 2 chipset, providing the fastest speeds for VoIP, video and music streaming, and large data file transfers. Additionally, enjoy the benefits of strong security as the 3rd radio delivers dedicated WIPS protection!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video, Percona Director of Solution Engineering Jon Tobin discusses the function and features of Percona Server for MongoDB. How Percona can help Percona can help you determine if Percona Server for MongoDB is the right solution for …
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question