Skip to main content

Mitigating Spamming

I've had yet another person get stuck with a spammer using their contact list and sending spam task though they were the person. It happens so much, and the Internet seems to have so many different answers, I figured I'd send this consolidated list over to him, and share here.

Short answer

A few big spam companies get your email list from finding the email addresses of your friends on Facebook that publicly list their email address. They also get it from forums you post to, your blog (emails are often listed there) and forwarded messages from someone else. Those spammers then sell the email lists to other people.
  1. Change your password often. It’s not foolproof, but is a good idea. Also make your email password different from all other passwords you use on the web.
  2. When registering for sites, use a throw-away email address and some password.
    1. Or make your current email a throw-away and make a new email account that you tell your friends to use (I made my Yahoo a throw-away that I check at most a few times a week and have friends email me at Hotmail).
  3. Encourage your friends to not make their email available publicly (ideally not even to friends) on Facebook.
  4. Where possible, send messages using the bcc field instead of the normal "To" field
  5. Additionally, set Facebook so that people who are not your friends can see your friends.
    1. In Facebook hit the Security icon
    2. Select See More Settings
    3. Select Followers
    4. Set Who Can Follow Me to Friends
    5. In Timeline and Tagging make sure everything is set for Friends
    6. In Privacy
    • Set Who Can Look Me Up to Friends of Friends  
    • Set Do you want other search engines to link your timeline to No 
    • This will make your profile harder to find. Since yours is really public, you may not want to make the changes I mentioned in privacy.

Detailed Answer

So, here’s some information that explains how the spamming works, both how they get emails, and how it looks like it came from you.
  1. The very easy way spammers get emails to send from (and send to)
    1. http://krebsonsecurity.com/2011/04/where-did-that-scammer-get-your-email-address/
  2. Possibly the worst formatted page, but explains how a spammer makes an email and puts in your “from” address.
    1. http://askbobrankin.com/spammer_using_my_email_address.html
  3. You’re emails already hacked, but here’s some advice on how to handle keeping your account safe in the future.
    1. https://askleo.com/how_do_i_protect_my_email_address_book/
    2. The best recommendation here is to change your password at least once a year
  4. This is how the scammer lists in item 1 get your email. We have tried to make your email more obscure on the website, but that doesn’t stop the other places you subscribe to.
    1. http://www.cnet.com/forums/discussions/how-do-spammers-get-another-person-s-email-address-and-172427/
Peace,
Tom

Comments

hotmail login said…
Thanks for sharing these useful information! This is really interesting information for me.

Popular posts from this blog

Using an Array of Objects in C++

 I've been programming for years (over 35 at this point, which is crazy  to think about). My career right now is much more Software Architecture, and much less Software Developer, but I still get some time to write out GraphQL APIs in TypeScript, Vue 3 UIs, GitLab pipelines, and just generally making "big" decisions and helping make them a reality. It's nice every now and then to come across different articles and ideas that get me to remember life in college when I was using C++. Who would have thought C++ was the "hot new thing" right now (though I suppose it's more like Rust and Go, both great languages as well). One of the things I find frustrating with most technical posts is where they focus on the "how do I build an app" and not so much on "how do I do this one slightly useful thing". I figured I'd throw one together what was front of mind, using user attributes for permissions (i.e., Attribute Based Access Control - ABAC) ...

Red-Gate SQL Compare

Every now and then I come across a program that becomes so ingrained in my daily work that I hardly know how I'd get by without it.  I'll probably break down a couple over the next few days, but for database work, I have never found anything as good as Red Gate's SQL Compare and SQL Data Compare .  Essentially these tools let you compare two SQL Server databases (all objects, users, permissions, functions, diagrams, anything) and update changes to whichever database you want.  This is amazingly useful for deploying database changes to a test or production environment (do it to production with ridiculous care, even though it will generate a SQL Script for you and run all updates in one transaction), and making sure everything is synchronized. For releases we can just generate the compare script, confirm that the changes match the updates we want to go out, and store it all in one place with the release details.  This is true for both the structure and the d...

Kids Activities

I find myself often in a situation where it's some morning, I have the kids for the afternoon, and I'm not sure what to do with them. We could go to a movie, or play Legos, but living near Washington, DC, I want the kids to love the museums as much as I do, or to see what else is going on. This Sunday, while my wife was travelling, I took the kids to the Chocolate Festival in Old Town Fairfax. I didn't even know there wad an Old Town Fairfax, much less a chocolate festival. It was okay overall, but the best was seeing any type of chocolate you could imagine, and letting the kids pick something for themselves and their teacher. For finding cheap or free stuff going on nearby with the kids, I have to say About.com has consistently been the best. I tried si.edu (the Smithsonian Website) which is also good, but a little hard to navigate, partly because they have so much going on. At About I did a search of what to do with my kids this weekend, and a bunch of items came ...