Saturday, April 25, 2009

The Quick And Easy Way To A Spam Free Inbox

Would you like to take back control of your inbox from the spammers? To receive only the emails you actually want! I am a living, breathing example that it is possible to make this fantasy a reality. While building my very first Website, I naively put my email address on every single page of my site. I wanted to give my visitors a chance to ask me questions, make comments on my site, etc. As my Website grew more and more popular, I started to receive 200 spam emails a day. Then 1000, 2000, 3000...until it became truly unbearable. I needed an escape from this nightmare and quickly began to draw up my battle plan against the spammers. The first thing I had to accept was that my old email address had to be put to rest. So I had to give it a proper burial and let it go. Then I created a new email address and applied spam prevention techniques I had diligently researched. The result? A spam free email account. Let me tell you, it was total bliss! You are in a war. You vs. the enemy (Spammers). The war has swung to the other side, but by using my detailed battleplan, you can turn the tide in your favor. To win the ever growing battle against spammers, you have to study your enemy, then take action. This may be the most important sentence you ever read about spam prevention, so pay attention - Spammers cannot fill your inbox with their garbage if they can’t find your email. It really is that simple. With that in mind, below you will find your battle plan:

Step 1: Say good-bye to your old email account If your inbox is filled with spam, dump it. I know using a new email address can be painful, but in the end you will be happy you took this advice. Once the spammers find your email, you will never be able to regain full control o
f your inbox.

Step 2: Create a ’dummy’ account at Hotmail or Yahoo! Whenever you post on a message board, sign-up for an offer, or are asked to give out your email, use this dummy account. Never use your main email address in such a manner, especially on a message board. Many people try to "disguise" their emails while posting on a message board, under the false assumption a spam bot won’t grab this email. As an example: john @ myemailaccount.com johnATmyemailaccountDotcom The enemy has now programmed their spamming software to recognize these disguised emails.

Step 3: Use a contact form on your Website This is a critical step. So listen closely. Many savvy Webmasters use contact forms to prevent spam. However, it has to be done correctly to be effective. If you have your email address ANYWHERE within your HTML, the new spamming software will find it. You can’t use HTML encryption to hide your address, like you could in the past. The enemy has created new software that breaks down this code and grabs your email. Many contact forms require you to use your email address to send the form information. BIG MISTAKE. The spam bots will grab any email address in your HTML, even if it is in your contact form. Your CGI script should contain the response email address - it should not be in the HTML.

Step 4: Make a graphic of your email address If you must have your actual email on your site, create a small image of your email address. Then link this graphic to your contact form. Now your customers can write down your actual email address and contact you at a later date. The war rages on against spam, but by using these guerilla warfare tactics against spammers, you will soon achieve your FREEDOM!

Article Source: http://www.BestToRead.com/

How To Avoid Spam Robots

Despite the fact that Federal legislation (the CANSPAM act) made it illegal, harvesting email addresses from the web using automated robots remains alive and well.

Spammers who need fresh email addresses release software spider programs that comb the Internet and suck email addresses off Web pages, guest books, and anywhere else you might post your email address.

Once they get your email address, spammers will trade it around like 5th graders with a new pack of Pokemon cards at recess and you can expect the avalanche of email to begin flooding your inbox.

In order to combat this still rampant practice of stealing email addresses from websites and sending people email they don't want, the following tips should help protect you.

** Break It Up **

Obviously the best way to avoid getting picked up by an email harvester is not to post your email anywhere on anyone's website (including your own).

If the only way someone can get your email is if you give it to them, that creates a similar situation to operating with an unlisted phone number.

If telemarketers can't get your phone number, they can't call.

If you must post your email address, post it in a way that a robot won't recognize it as an email address. Instead of posting YOURNAME@YOURDOMAIN.COM, you can put YOURNAME (AT) YOURDOMAIN.COM and then, in parenthesis, put (replace AT with @ to email me).

Though it seems like an extra step for legitimate email, you'll find it a very effective technique.

** Use An Image **

Currently, online spiders (ANY spider, including search engines) cannot read text that appears in a graphic or picture. If you must display an email address on a page, then do it by typing your email address into your favorite graphics program and saving the image as a .gif or .jpg. Then post the image onto your web page so people can see the email, bu
t spiders cannot. This too creates an extra step for people because they must type in your email address, but it's an effective solution if you must display an email address on your own website.

** Use An Email Form **

Another way to cut down on spam originating from your own website is simply not to display an email at all.

Instead, allow customers and prospects to contact you through a form where they fill in fields, click a button, and your website emails you their message.

A note of caution: make sure the form script you use does not keep your email address visible in the form code.

If the form code contains the email address, spam robots can find it even though you don't see it on the page.

** Make It Hard To Guess **

Sometimes you'll get unsolicited email because a spammer guessed your email address.

It's not a far stretch to imagine that someone probably has the email Jim@yourdomain.com, so spammers will do a "dictionary" attack on common usernames.

One way to defeat this is to place a "dot" (.) in your email address, such as Jim.Edwards@yourdomain.com. The dot makes it virtually impossible for spammers to guess your email address.

ฉ Jim Edwards - All Rights reserved

http://www.thenetreporter.com

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.turnwordsintotraffic.com

Four Ways To Eliminate Spam

The CAN-SPAM Act of 2003 was supposed to eliminate spam email. This federal spam law that became effective January 1, 2004, was passed by Congress to get rid of junk email.

So why didn't the law eliminate spam and why is it so difficult to stop it? Still today, more than 40% of all e-mail is still unsolicited sent to you by spammers even though that law passed.

The truth is email spammers make so much money they can afford to outsmart The Federal Trade Commission with sophisticated technology.

It is almost impossible to enforce this law although a few do get caught and pay the huge price.

Spam is not likely to go away anytime soon, and it's difficult to eliminate spam email altogether. But there are some simple ways to significantly reduce spam from getting into your inbox.

Here are Four Fighting Spam Tips:

Protect Your Email Address

Don't display your email address in newsgroup postings, chat rooms or in an online service's membership directory. Sometimes email spammers use these sources to harvest email addresses.

Create Two Email Addresses

Another good tip is create two email addresses. Create one for personal messages and the other for public use, such as in newsgroups or chat rooms.

You can create an account with a disposable email address service. Have those emails forwarded to your permanent email address. If the disposable address begins to get spam, just shut if off and get another one.

Create A Unique Email Address

Create
a unique email address because email spammers often use dictionary attacks to sort through possible name combinations at some Internet Service Providers. A common name, like johnsmith or thewilliams may get more spam than a unique name like 37xi6OWt8.

Use Email Tools

Most email accounts provide tools to filter out potential spam or ways to channel spam into a bulk email folder. When you're choosing which Internet Service Provider to use consider their email options.

Although these simple methods might seem obvious, most people do not utilize them. You may be surprised how much junk email you can get rid of just by using these simple tips.

If you decide to eliminate spam altogether all it takes is installing an anti spam filter. Most are reasonably priced between $25 and $40 depending on where you get it. A good anti spam filter will block 100% of unwanted spam and will eliminate spam forever.

Copyright ฉ 2005 Spyware Information.com All Rights Reserved.

This article is provided by http://www.spyware-information.com where you will find free spyware cleaners, downloads, removal software, computer firewalls and valuable tips. For regularly updated articles about adware, spyware and protection from identity theft go to http://spyware-information.com/articles_1.html

Monday, April 13, 2009

Wireless at the Workplace

Wi-Fi, or wireless fidelity, is a term promulgated by the non-profit Wireless Fidelity Alliance organization to designate products adhering to the IEEE 802.11 standard for wireless LANs. A Wi-Fi network broadcasts a radio signal, operating in the unlicensed 2.4 and 5 GHz radio bands, with a data rate of between 11 (IEEE 802.11b) and 54 Mbps (IEEE 802.11a).

“A new generation of ‘Wi-Fi certified’ wireless products have emerged which not only incorporate state-of-the-art security measures, but also ensure interoperability across Wi-Fi certified products from different manufacturers. ”

Benefits of Wi-Fi:

With Wi-Fi networks, an entirely new set of benefits and services can be offered:

· Access to the wired corporate network and the Internet for laptop users and guests, anywhere within corporate offices

· Freedom from wire connections, making it easy to move office locations without incurring network wiring costs

· True modular phone access within corporate buildings, where service is frequently spotty, by using Wi-Fi gateways to route phone calls and signals from other hand-held devices

· "Last mile" installations in which calling might be inconvenient or expensive

Planning the Installation:

The first step in any wireless installation is planning. That is, you must first determine who needs wireless access, where the users will be, and how they will access the network. It is recommended that you perform a walkabout of the area and obtain a blueprint of the building.

A Wi-Fi radio signal has a range of about 100 to 300 feet indoors, and up to 2,000 feet outdoors. And an access point can handle from 10 to 30 users, depending upon use patterns. For highly-populated cubicle areas, for example, multiple access points may be needed. Possible obstructions must be identified, as signals will pass through most walls but will stop at metal obstructions, such as elevator shafts. Also, overlaps in coverage should be built in to avoid blind spots.

Second, obtain the necessary equipment. Unless you have only a few users and will be using a peer-to-peer network, you will need base stations as determined by your plan. For the office, companies such as Cisco, Symbol, and 3Com offer enterprise-grade office equipment with the latest security features. To avoid conflicts, buy all equipment from the same company, and make sure that adjacent access points use the same frequency but different channels.

Securing the Network:

Securing the network is particularly important given the significant vulnerability of wireless networks. However, there are a number of technologies available today that can make your wireless network as secure as your wired network.

· WPA. Wi-Fi Protected Access (WPA) is a standards-based security technology which secures Wi-Fi networks. WPA comes in two versions, a personal edition and an enterprise edition. The enterprise edition provides 128-bit data encryption, including dynamic session keys, as well as strong access controls. WPA2 provides government-grade security with FIPS 140-2 compliant AES encryption. It is important to note, however, that WPA and other wireless encryption methods protect only activity between Wi-Fi enabled computers and Wi-Fi certified access points. Once the data is on public networks or on the Internet, your data will again be vulnerable unless other measures are taken, such as SSL.

· Media Access Control (MAC) Filtering. Every Wi-Fi radio has a unique MAC number. Access points can be programmed to only accept specified MAC addresses, thereby ensuring that only authorized users have access to the wireless network.

· Closing Your Network. To counter scanning tools which can find and tap into wireless networks, you should disable network name or SSID broadcasting at all access points. This will ensure that your network is not shown on a list of networks available to outside users.

· Virtual Private Networks. A VPN creates a "virtual tunnel" from the user's computer to the corporate system, encrypting data transferred to computers outside the corporate offices. VPN technology also works for wireless networks and can protect transmissions from Wi-Fi equipped computers to corporate servers.

· Remote Access Dial-Up User Service (RADIUS). RADIUS is standard authentication technology used by many corporations to protect access to their wireless networks. It uses a user name and password scheme to verify the user's access rights to the network, and various levels of access can be enabled.

· Other Security Measures. Some sort of firewall is essential to securing a wireless network. Some Wi-Fi gateways and access points provide a built-in firewall. But if yours does not, you must protect your network with a firewall just as you would with your Ethernet or other wired network. For those with a preference for Kerberos-based security, Kerberos can be implemented for wireless networks as well. And the Wi-Fi Alliance has developed security standards such as 802.11i and 802.1x which use advanced encryption technologies such as AES and TKIP, as well as secure key-distribution methods.

Conclusion:

With the host of wireless security technologies now available, there is a security solution available for nearly every wireless network. No longer is there any reason for corporate IT departments to balk at offering wireless services to their users.

About Jonathan Coupal:

Jonathan Coupal is the Vice President and Chief Technology Officer of ITX Corp. Mr. Coupal manages both the day-to-day and strategic operations of the Technology Integration Practice Group. Among Mr. Coupal’s greatest strengths are evaluating customers’ unique problems, developing innovative, cost effective solutions and providing a “best practice” implementation methodology. Mr. Coupal’s extensive knowledge and experience enables him to fully analyze client systems to recommend the most effective technologies and solutions that will both optimize their business processes and fulfill immediate and future goals. Mr. Coupal and his team build a high level of trust with clients, establishing ITX as their IT partner of choice.
Mr. Coupal holds certifications with Microsoft and CompTia, including MCSE, MCSA, Security+, Linux+ and i-Net+, and served as a Subject Matter Expert (SME) for the development of the CompTia Linux+.

About the author:
About ITX Corp:

ITX Corp is a business consulting and technology solutions firm focused in nine practice areas including Business Performance, Internet Marketing, IT Staffing, IT Solution Strategies and Implementation, Technical Services, Internet Services, and Technology Research. To learn more about what ITX can do for you visit our website at www.itx.net or contact us at (800) 600-7785.