What are web spams .

Posted on 2013-10-06
Medium Priority
Last Modified: 2013-10-24
I have following queries.
1. What are web spams.
2. How can they be detected.
3. What are there risks.
Question by:searchsanjaysharma
  • 2
LVL 101

Accepted Solution

John Hurst earned 1500 total points
ID: 39550585
1. When you say "web spam" do you mean email or web links?  

2a. If email, get good spam filtering. I do that and it works.
2b. If web links, use a good deal of common sense. Do not click on ANY link unless you know first what it is.

3. Risks: clicking on blind links, help me links, solve my problem links and so on can wreck your computer in seconds. The dangers are real and the risks are high.

Before you ask, ALL antivirus suites (I use Corporate SEP) are rear guard actions that catch the new viruses after they have caused the damage.

... Thinkpads_User
LVL 54

Expert Comment

by:Scott Fell, EE MVE
ID: 39550761
Based on your other question about how google works, I think you are referring to the google webspam team where you may have heard of Matt Cutts.

In that case, they are typically referring to sites/pages that may try and trick google into ranking the page high.  This could be too many "keywords" in the meta (which is why that meta tag is not used, to a page that is a directory of paid links to malicious code on a site.

Author Closing Comment

ID: 39596055
LVL 101

Expert Comment

by:John Hurst
ID: 39596693
@searchsanjaysharma - Thanks and I was happy to help.

... Thinkpads_User

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question