Learn an IT concept in 10 easy steps.
Here's how it works: We give you a little background about the concept, a glossary to look up related terms, some outside reading, and a self-assessment quiz. You spend as much (or as little) time as you like moving through the ten steps and exploring the concept.
Directions: Read steps 1-9 and their related links. In step 10, use the glossary to look up any terms you do not know. When you're done, take a quiz to see how much you've learned!
| Glossary
|
1. What exactly is spam? The term is said to derive from a famous Monty Python sketch ("Well, we have Spam, tomato & Spam, egg & Spam, Egg, bacon & Spam...") that was current when spam first began arriving on the Internet. SPAM is a trademarked Hormel meat product that was well-known in the U.S. Armed Forces during World War II. According to a report from the Spamhaus Project anti-spam organization, over 90% of all the spam received in North America and Europe originates from only about 200 senders. Most spam falls into the category of unsolicited commercial e-mail (UCE), but the term also encompasses other types of mass mailings, such as e-mail chain letters, personal campaign mailings, messages with virus-laden attachments, and messages containing virus hoaxes, among other possibilities. Here's a break-down on spam categories by percentage:
2. How bad is the spam problem?
3. Just how effective is spam, anyway? Successful spammers do a lot better than that. For example, Ron Scelson, known as the "Cajun Spammer," claims to get responses from 1% of messages he sends: that comes to 10,000 responses per million messages sent, 100,000 responses per day if he sends out 10 million messages. Scelson, who works on a commission basis, says he makes between $4,000 and $5,000 for each mailing. 4. What's your average spammer's modus operandi? Spamming is not rocket science. Here are some simple step-by-step instructions:
5. Is spam in your inbox really any different from 3rd class junk mail that arrives in your mailbox, or telemarketing? 6. How can I combat spam in the enterprise? At the server: Here's how to do it in Exchange Server: In the Registry Editor, navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceMSExchangeIMCParameters. Add a REG_DWORD value named RelayFlags. Set this value to 8. This will allow both remote and local hosts with valid credentials to use the server; others will be rejected. Next, you can block specific senders or whole domains. For example, in Exchange 2000, open Exchange System Manager and select Server > Global Settings > Message Delivery. Right click, and go to properties. Select the filtering tab, which then gives you options to block by e-mail address or by domain. There are a number of server-side spam filter applications, such as Roaring Penguin's CanIt and MIMEdefang. Several organizations, such as the Spamhaus Project, maintain blacklists of known sources of spam. You can make use of such a list, adding to it as you wish. You might want to also establish a whitelist of addresses or domains that are to be automatically accepted by the server. Other options exist, such as that of archiving filtered messages, which may be advisable while you're seeing how a new filtering system works. By making changes at the server, you save a good deal of time and resources spent by individual recipients at your organization. At the client: In terms of educating the user, you should establish guidelines for prudent online behavior, such as:
7. How do spam filters work? Spam filters block messages that are detected to match program-specified or user-specified criteria, such as words in the subject line, or messages that are detected to be machine-generated, part of a bulk mailing, or from a known source of spam. Other spam filters, such as Bayesian and heuristic programs take more complex approaches to detecting spam. A Bayesian spam filter is based on probability (Bayesian logic is an area in mathematics that deals with decision making and probability inference). The program considers each message as a collection of tokens: each word, number, and header is considered separately. A database is consulted that contains probabilities of given tokens being content of a spam message, and a message is given a spam probability score based on the number and score of its tokens. CanIt, a server-side anti-spam application from Roaring Penguin, includes Bayesian filtering capabilities that can be fine-tuned to suit the particular environment it's used in. In an interview with ITBusiness, David Skoll, president of the company, said that by implementing CanIt, businesses will see a return on investment within the first year. A heuristic spam filter, such as SpamAssassin, checks messages against criteria established in a rule base and assigns each message a score based on matching that criteria. Above a specified score, messages are flagged as spam. SpamAssassin is often used in conjunction with MIMEDefang: SpamAssassin provides the heuristics for identifying likely spam and MIMEDefang provides the actual filter mechanism that allows administrators to decide how to deal with it. One problem with many filtering tools is that if they are configured stringently enough to be effective, there's a fairly high chance of getting false positives: legitimate messages that are stopped by the filter and don't get to the intended recipient. The chance of accidentally blocking an important message has been enough to keep many administrators from filtering spam at all. However, an effective spam filtering application -- combined with wise management -- can save a company substantial amounts of time and money that would otherwise have been lost to dealing with spam.
8. What's the current status of anti-spam legislation? The United States has tended towards an opt-out approach, which many fear will make the problem worse than ever. The Can Spam Act, passed 97-0 in the Senate October 22, 2003 makes it illegal to send UCE to anyone who says they don't want to receive it. However, the only way to refuse future UCE from a particular sender is to respond to their message. According to experts, that's something you should never do: spammers use such responses to verify active e-mail addresses, which can be sold for a higher price. As a rule, the result is even greater volumes of UCE. The bill also makes it illegal to harvest addresses from Web sites or to disguise your identity in a commercial e-mail. Various states are taking more stringent legislative action on their own. However, for anti-spam legislation to be effective, it really needs to be national -- if not international -- in scope. A proposed "do not spam" list, similar to the telemarketing-targeted "do not call" list could be effective, although it would work in a roundabout way. E-mails would be marked to attest that the sender abides by the list. One way of ensuring this would by using ePrivacy Group's Trusted Email Open Standard. The standard works by inserting small -- less than 1 KB -- digital certificates into the headers of e-mails. The certificates assure the recipient that messages actually originated from the addresses they claim to come from. UCE without such a certificate could be blocked by the ISP's mail server or the user's spam filter.
9. Spam Words-to-Go Glossary:
10. Self-assessment: |
Learn an IT concept in 10 easy steps.
Here's how it works: We give you a little background about the concept, a glossary to look up related terms, some outside reading, and a self-assessment quiz. You spend as much (or as little) time as you like moving through the ten steps and exploring the concept.
Directions: Read steps 1-9 and their related links. In step 10, use the glossary to look up any terms you do not know. When you're done, take a quiz to see how much you've learned!
| Glossary
|
1. What exactly is spam? The term is said to derive from a famous Monty Python sketch ("Well, we have Spam, tomato & Spam, egg & Spam, Egg, bacon & Spam...") that was current when spam first began arriving on the Internet. SPAM is a trademarked Hormel meat product that was well-known in the U.S. Armed Forces during World War II. According to a report from the Spamhaus Project anti-spam organization, over 90% of all the spam received in North America and Europe originates from only about 200 senders. Most spam falls into the category of unsolicited commercial e-mail (UCE), but the term also encompasses other types of mass mailings, such as e-mail chain letters, personal campaign mailings, messages with virus-laden attachments, and messages containing virus hoaxes, among other possibilities. Here's a break-down on spam categories by percentage:
2. How bad is the spam problem?
3. Just how effective is spam, anyway? Successful spammers do a lot better than that. For example, Ron Scelson, known as the "Cajun Spammer," claims to get responses from 1% of messages he sends: that comes to 10,000 responses per million messages sent, 100,000 responses per day if he sends out 10 million messages. Scelson, who works on a commission basis, says he makes between $4,000 and $5,000 for each mailing. 4. What's your average spammer's modus operandi? Spamming is not rocket science. Here are some simple step-by-step instructions:
5. Is spam in your inbox really any different from 3rd class junk mail that arrives in your mailbox, or telemarketing? 6. How can I combat spam in the enterprise? At the server: Here's how to do it in Exchange Server: In the Registry Editor, navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServiceMSExchangeIMCParameters. Add a REG_DWORD value named RelayFlags. Set this value to 8. This will allow both remote and local hosts with valid credentials to use the server; others will be rejected. Next, you can block specific senders or whole domains. For example, in Exchange 2000, open Exchange System Manager and select Server > Global Settings > Message Delivery. Right click, and go to properties. Select the filtering tab, which then gives you options to block by e-mail address or by domain. There are a number of server-side spam filter applications, such as Roaring Penguin's CanIt and MIMEdefang. Several organizations, such as the Spamhaus Project, maintain blacklists of known sources of spam. You can make use of such a list, adding to it as you wish. You might want to also establish a whitelist of addresses or domains that are to be automatically accepted by the server. Other options exist, such as that of archiving filtered messages, which may be advisable while you're seeing how a new filtering system works. By making changes at the server, you save a good deal of time and resources spent by individual recipients at your organization. At the client: In terms of educating the user, you should establish guidelines for prudent online behavior, such as:
7. How do spam filters work? Spam filters block messages that are detected to match program-specified or user-specified criteria, such as words in the subject line, or messages that are detected to be machine-generated, part of a bulk mailing, or from a known source of spam. Other spam filters, such as Bayesian and heuristic programs take more complex approaches to detecting spam. A Bayesian spam filter is based on probability (Bayesian logic is an area in mathematics that deals with decision making and probability inference). The program considers each message as a collection of tokens: each word, number, and header is considered separately. A database is consulted that contains probabilities of given tokens being content of a spam message, and a message is given a spam probability score based on the number and score of its tokens. CanIt, a server-side anti-spam application from Roaring Penguin, includes Bayesian filtering capabilities that can be fine-tuned to suit the particular environment it's used in. In an interview with ITBusiness, David Skoll, president of the company, said that by implementing CanIt, businesses will see a return on investment within the first year. A heuristic spam filter, such as SpamAssassin, checks messages against criteria established in a rule base and assigns each message a score based on matching that criteria. Above a specified score, messages are flagged as spam. SpamAssassin is often used in conjunction with MIMEDefang: SpamAssassin provides the heuristics for identifying likely spam and MIMEDefang provides the actual filter mechanism that allows administrators to decide how to deal with it. One problem with many filtering tools is that if they are configured stringently enough to be effective, there's a fairly high chance of getting false positives: legitimate messages that are stopped by the filter and don't get to the intended recipient. The chance of accidentally blocking an important message has been enough to keep many administrators from filtering spam at all. However, an effective spam filtering application -- combined with wise management -- can save a company substantial amounts of time and money that would otherwise have been lost to dealing with spam.
8. What's the current status of anti-spam legislation? The United States has tended towards an opt-out approach, which many fear will make the problem worse than ever. The Can Spam Act, passed 97-0 in the Senate October 22, 2003 makes it illegal to send UCE to anyone who says they don't want to receive it. However, the only way to refuse future UCE from a particular sender is to respond to their message. According to experts, that's something you should never do: spammers use such responses to verify active e-mail addresses, which can be sold for a higher price. As a rule, the result is even greater volumes of UCE. The bill also makes it illegal to harvest addresses from Web sites or to disguise your identity in a commercial e-mail. Various states are taking more stringent legislative action on their own. However, for anti-spam legislation to be effective, it really needs to be national -- if not international -- in scope. A proposed "do not spam" list, similar to the telemarketing-targeted "do not call" list could be effective, although it would work in a roundabout way. E-mails would be marked to attest that the sender abides by the list. One way of ensuring this would by using ePrivacy Group's Trusted Email Open Standard. The standard works by inserting small -- less than 1 KB -- digital certificates into the headers of e-mails. The certificates assure the recipient that messages actually originated from the addresses they claim to come from. UCE without such a certificate could be blocked by the ISP's mail server or the user's spam filter.
9. Spam Words-to-Go Glossary:
10. Self-assessment: |
Tech TalkComment
Share
Comments
Results
Contribute to the conversation