
Spam has become a threat to the user's e-mail. Therefore, how to recognize the tricks done by spam so you can prevent entry into your computer.
E -mail that you use day-to-day applications that can be shut off. This can be caused by spam and viruses. Unlike the virus, the problem of spam has become a threat to all of the OS (operating system), whether windows, linux or macintosh. During receive e-mail, you will receive spam.
Spam or junk mail is abuse in the delivery of electronic news to display news and advertising purposes other causing inconvenience for the users web. The form of the spam that commonly known include: e-mail spam, instant messaging spam, Usenet newsgroup spam, spam a search engine web information (web search engine spam), spam blog, spam news on the mobile phone, Internet forum spam, and others.
Spam usually comes without insistently requested and is often not desired by beneficiaries. Some examples of this can be a spam e-mail ads, sms on mobile phone, the news that fit in a newsgroup forum promotion of goods that are not associated with these activities, newsgroups, spamdexing the domination a search engine (search engine) to search for popularity a particular URL, or can be news that is not useful and in a blog, web site guest book, and others.
Spam sent by the ad with the operating cost is very low, because the spam this mailing list does not need to reach customers-the customers want. As a result, many side the injured. In addition to Internet users, the ISP (Internet service providers or Internet service provider), and the general public also does not feel comfortable. Because very often disrupt and sometimes queer, news spam is included in the unlawful activity and is a criminal act that can sting through the Internet law.
Spam does not actually make the threat directly, such as damage to computer systems or the withdrawal of virus data. However, spam can cause a tremendous waste of bandwidth and resources. In addition, spam can also cause financial losses associated with phishing. In doing action it, spam using a variety of ways to go to the computer of the victim. Here is dodgy tricks used in the spam action it.
Catch all account: if you activate cathch all-time men Mailserver settings, all incoming e-mail domain to be in receipt, in which both go to a valid address and that does not. This is, to give way for the spam to meet the mail server.
Open Relay: This facility is also a mail server should not diaktifkan.dengan Open Relay, anyone who can access the Mailserver send e-mail without the need to use the Mailserver have an account on the domain. Of course this opportunity will be used by spammers to send spam so the mail server will be banned (black list) by anti-spam servers.
Spam and virus Collaboration: progress in the infected computer virus can be mastered by the spammers and the remote computer will be used as a mail server to distribute spam. If the IP address of a computer infected with the virus and the spread of spam in this blok by blacklists, spammers will move on to the victim computer IP address or the IP address of another computer in the amount reaches hundreds of thousands
Spoofing mail address: spam often use the e-mail address deliberately false to trick the victim. Blacklist and whitelist protection-even became less effective spoofing the e-mail address.
Image-based spam: when sending e-mail, e-mail spam is not sent through the form of text, but in the form of images. The goal is that anti-spam can not know what the content of messages sent.
Challenge: every send e-mail, you will receive confirmation and must respond. If appropriate, you will be entered into the whitelist. Besides making, what if the e-mail this challenge even go to spam mail in-box or spoof?
Now you have to know how the trick can be done for the spam into your computer via e-mail. Now you select the application to stay the spam prevention in accordance with your wishes

