Skip to main content

Mitigating Spamming

I've had yet another person get stuck with a spammer using their contact list and sending spam task though they were the person. It happens so much, and the Internet seems to have so many different answers, I figured I'd send this consolidated list over to him, and share here.

Short answer

A few big spam companies get your email list from finding the email addresses of your friends on Facebook that publicly list their email address. They also get it from forums you post to, your blog (emails are often listed there) and forwarded messages from someone else. Those spammers then sell the email lists to other people.
  1. Change your password often. It’s not foolproof, but is a good idea. Also make your email password different from all other passwords you use on the web.
  2. When registering for sites, use a throw-away email address and some password.
    1. Or make your current email a throw-away and make a new email account that you tell your friends to use (I made my Yahoo a throw-away that I check at most a few times a week and have friends email me at Hotmail).
  3. Encourage your friends to not make their email available publicly (ideally not even to friends) on Facebook.
  4. Where possible, send messages using the bcc field instead of the normal "To" field
  5. Additionally, set Facebook so that people who are not your friends can see your friends.
    1. In Facebook hit the Security icon
    2. Select See More Settings
    3. Select Followers
    4. Set Who Can Follow Me to Friends
    5. In Timeline and Tagging make sure everything is set for Friends
    6. In Privacy
    • Set Who Can Look Me Up to Friends of Friends  
    • Set Do you want other search engines to link your timeline to No 
    • This will make your profile harder to find. Since yours is really public, you may not want to make the changes I mentioned in privacy.

Detailed Answer

So, here’s some information that explains how the spamming works, both how they get emails, and how it looks like it came from you.
  1. The very easy way spammers get emails to send from (and send to)
  2. Possibly the worst formatted page, but explains how a spammer makes an email and puts in your “from” address.
  3. You’re emails already hacked, but here’s some advice on how to handle keeping your account safe in the future.
    2. The best recommendation here is to change your password at least once a year
  4. This is how the scammer lists in item 1 get your email. We have tried to make your email more obscure on the website, but that doesn’t stop the other places you subscribe to.


hotmail login said…
Thanks for sharing these useful information! This is really interesting information for me.

Popular posts from this blog

Advantages and Disadvantages of Using Microsoft Access

I've answered this question in some form or another far more times than I care to count.  Most often it's a question of "why do I need a fancy Web application when I can just build this myself in two days in Access.  I mean, the data's already in Excel."  So I figured I'd post out what I threw together, I know I've missed some points. Overview Microsoft Access is an ideal solution for relatively small datasets and a limited number of users. From the Microsoft Web site: “As a desktop database, Access is well suited for small, departmental applications. These applications may start as one user’s project. For example, an employee realizes that productivity can be increased if a paper-based process is automated with an Access application. Other users in the department recognize that they can take advantage of the application if additional features are added. As more features are added, more employees run the application. As time goes by, more and more Access

Beryllium Spheres

I'm sitting here at home watching The Shadow , easily one of the best movies made based on one of the best old time radio shows.  I hadn't picked up on this earlier, but the weapon used to destroy the city is none other than the same power source used to power the NSEA Protector in Galaxy Quest . I never knew Beryllium was so cool.  Now I want a sphere of my own. Anyone know of other places Beryllium Spheres are mentioned? Peace, +Tom

Red-Gate SQL Compare

Every now and then I come across a program that becomes so ingrained in my daily work that I hardly know how I'd get by without it.  I'll probably break down a couple over the next few days, but for database work, I have never found anything as good as Red Gate's SQL Compare and SQL Data Compare .  Essentially these tools let you compare two SQL Server databases (all objects, users, permissions, functions, diagrams, anything) and update changes to whichever database you want.  This is amazingly useful for deploying database changes to a test or production environment (do it to production with ridiculous care, even though it will generate a SQL Script for you and run all updates in one transaction), and making sure everything is synchronized. For releases we can just generate the compare script, confirm that the changes match the updates we want to go out, and store it all in one place with the release details.  This is true for both the structure and the data, to