Hello dear readers of the blog site. Surely you have already encountered spam, even if you did not know exactly what this disgrace is called. And for this it is not even necessary. Spam with enviable regularity is poured into an ordinary mailbox - these are the very countless advertising brochures that are slipped to you in the hope that you will order or buy something.

So, spam is just is the annoying one, climbing from all sides advertising(but not only advertising - sometimes worse). You didn’t order it, you don’t need it, but it rushes and rushes from all cracks. In this heap, the information you need can easily get lost and you have to spend a lot of time filtering it out.

In our computer age, the main source of spam. And besides advertising spam mailings can be dangerous both for your wallet (phishing, social engineering, wiring) and for your computer (viruses, worms, trojans).

What does it mean Spam word, what it happens and how you can deal with it, you will learn by looking at this small note. Hope it will be interesting (well, definitely useful - I promise you that).

Spam - what is it

WHAT DOES SPAM MEAN IN GERMAN?

Itself Spam word comes from the name of canned meat, which was fiercely advertised after the end of the Second World War (obviously, it was necessary to urgently sell the soldiers' meat rations).

The advertising was so aggressive, all-embracing and ubiquitous that this word (and the associated "sediment") was remembered, but already about the intrusive advertising that appeared along with it in conferences (then still in the feed, if anyone remembers).

The word stuck, especially since the obtrusive advertising did not become less, but rather the opposite. When e-mail gained popularity, unauthorized mass advertising and malicious mailing of letters became commonplace. For spammers, such mailings were beneficial, because without special costs necessary information communicated to a large number of people.

But e-mail is not limited to... Spam in a personal social networks, on forums, instant messengers, message boards, blog comments, open for editing and adding text by everyone. They also send spam to your phone, for example, by advertising calls or by sending advertising SMS messages.

Where can you find him on the Internet

  1. Email Is just a klondike for spammers. With the help of mass mailing you can sell anything you want, you can cheat and rob, you can infect computers and send out worms. Databases for mass mailings are collected independently (using programs), or purchased from those who are professionally involved in this.
  2. Forums, comments blogs, wikis and message boards - here, in fact, everyone is allowed to leave messages and it is difficult for spammers to resist not to sleep. This is not always advertising - often in this way publishers try to get free link to your site so that it stands higher in the search results of Yandex or Google for various queries. This brings them traffic and money.
  3. Social networks and dating sites - spam is very common among incoming personal messages. It is also available in the comments to the messages.
  4. Messengers (like) are also subject to this scourge.
  5. SMS- messages from people unknown to you of an advertising nature. Probably everyone is familiar.
  6. Search spam- a rather specific thing, but familiar to everyone. You had such a thing that you enter a request into Yandex (Google), and in the answers there are entirely sites with some kind of bilibery that have nothing to do with the case. These are the so-called doorways (sites with automatically generated useless texts). They spam the results of search engines, but they make money on visits to them by visitors (in different ways).

Those. all letters in your mailbox (or messages on the forum, blog comments, messages in a personal message) of an advertising or other nature from a sender unknown to you - this is spam... True, the mailings to which you subscribed can also be annoying, but you can still unsubscribe from them (refuse to receive them further).

Spam by itself is annoying and annoying, because it litters where it appears. Most often, this is your inbox, and it can be difficult to separate the wheat from the chaff when there are too many unwanted messages. But spam can also pose a real threat to both you and your computer. Let's deal with this with everything.

Understanding the types of spam (harmless and dangerous)

Now and further, I will mainly talk about spam messages received by e-mail, for it is this channel that is considered especially susceptible to this phenomenon. Everything else is not so running and not so actively used by spammers, and this does not apply to all network users. But the problem of their protection from unwanted messages is acute.

Types of harmless spam

  1. Advertising of legal goods and services- in this case, the business owner simply chose spam mailings as one of the channels for attracting customers and buyers, because it is not expensive, quickly and brings results. Naturally, he does not really think about the moral (or rather immoral) side of this matter.
  2. Prohibited advertising- there are goods and services that are prohibited by law to advertise, and for them spam mailings can be the main channel for attracting customers. By the way, spammers also advertise their services using mass mailings, because this activity is prohibited by law. This also includes advertising defaming competitors, because it is also forbidden to do this by law (praise yourself, but do not scold others).
  3. Impact on public opinion- very often spam becomes a good choice for those who are trying to manipulate public opinion in the right direction. It can be politics, as well as. Letters in general can be sent out supposedly from some person in order to compromise him, change his opinion about him or use his authority for profit. But personally, this does not pose any danger to you.
  4. Letters that ask for forwarding to others- these can be varieties of the so-called "letters of happiness" (send it to 10 friends and you will be happy), or asking to send information to friends for some other reason. Often such letters are used by spammers to collect or replenish the existing base of emails for subsequent mass mailings.

High-risk spam - what it can be

If regular (harmless) spam can only slightly affect your peace of mind and mental health, then the examples below can be very dangerous for your wallet or computer. And this is not a joke.

I myself (the one who teaches and teaches everyone) a couple of years ago "bought" this type of letter (phishing) and parted with several thousand rubles (read ""). I just wound myself up and did everything “on the machine” just to fall behind, but when I realized it, it was too late.

  1. - highly effective method deceiving not only gullible, but also simply busy or inattentive people (there is a hook for anyone). They send you a letter supposedly from your bank, e-money service or somewhere else. In this letter, you are sure to be overwhelmed with something (unsettled) and asked to log in to the site to solve the problem. You log in, but the site will be fake (although it looks like a real one) and the data you provided is immediately used to steal all your money.
  2. Nigerian letters- you will learn that you can get a large amount of money (different pretexts - from unexpected inheritance to helping a prince in exile). You don't believe for a long time, but they convince you. When you believe it, you will be asked to transfer some money for "related expenses." You translate and no one will bother you anymore.
  3. Viruses, worms, trojans- the letter may contain an attached file with a malicious program (or a link leading to a website with a virus). She can immediately cause problems with the operation of the computer, or she will sit quietly in a corner and carefully write down all the passwords, logins and other useful things in the household you enter. Among other things, worms are also able to send themselves to your friends at the addresses found in the E-mail contacts (as they will then ...).

Spam protection

Where do spammers get databases with email addresses from?

  1. Spammers (those who produce mass mailings) collect email addresses from all available sources. These can be forums, guest books, chats, social networks and other sites where postal addresses can be publicly available.
  2. Hackers manage to get to some databases of addresses stored on sites.
  3. E-mails are collected in most cases by a programmatic method (with the help of search bots - harvesters) and this does not require much effort (only time is not very much). Moreover, similar spam email databases you can not collect, but buy them from those who specialize in this matter ().
  4. Billions of postal addresses are registered all over the world, and therefore you can simply try to generate emails using special programs using the appropriate dictionaries. Most likely, many of them will actually exist. Read about how spammers check the validity of addresses below.
  5. There are special worms (viruses) that can send themselves to the database of addresses found on the victim's computer. The base collected in this way will already be cleared of non-working mailboxes.

How do spammers clean databases from inactive email addresses?

Those who collect the base of addresses, in fact, do not care who owns this or that address - they send letters to everyone in a row, because there will still be someone who will react to them (as they say, they beat the squares).

But nevertheless, in order to optimize costs and increase the return on mailings, it is beneficial for them to clear the databases of non-existent addresses. How do they do it? Let's see.

  1. The simplest thing is to place a picture in the letter (it may not even be visible - one pixel in size), which will be downloaded from the site belonging to the spammer when the user opens the letter. If the picture is loaded, it means that the letter has been opened and the Email is valid.
  2. Many e-mail clients (programs for working with e-mail) automatically send a message about reading the letter, which again plays into the hands of spammers.
  3. The letter may contain a link calling to go somewhere, promising mountains of gold. Have passed - consider that your email will now be marked as good. The most unpleasant thing is that such a link can be disguised as an unsubscribe button, which in fact will lead to the opposite effect.

How to reduce the likelihood of your email getting into the spam database?

In general, as soon as your mailbox is "confirmed", spammers won't just get off of you. It is important to understand that no one is immune from spam. But you can significantly reduce the likelihood of getting into such a spam database if you take specific precautions:

  1. You can, of course, not publish your Email anywhere and not tell anyone about it. But in most cases this is difficult to do, so I advise except for the main box have one or two secondary ones that you will use to register on forums, etc. Often they can be useful and that can be obtained without registration at all.
  2. Do not follow links in spam emails (even if there is an "Unsubscribe" button there is a trap) and, if possible, disable automatic download images in your email client program. There is a chance that your email will be counted as inactive and bulk mailings will not be received by a hundred per day.
  3. If you have not registered a mailbox yet or are planning to start a new one (for example, due to the complete clogging of the old with spam), then proceed not from the convenience and ease of remembering it, but, on the contrary, make it more authentic and more complicated. You will still send it to your friends electronically, but spam brute-force programs are unlikely to guess it.

What to do if spam doesn't let you breathe anymore?

These were all preventive measures to combat spam (or rather, to reduce its amount). But there is a possibility of effective struggle even in an already completely neglected situation. In this case, it becomes extremely important,.

The fact is that in such large services as or, there are powerful anti-spam filters.

They place all suspicious emails in separate folder"Spam", thereby freeing the "Inbox" from garbage. Yes, there is no perfect spam cutter, and as far as possible, the contents of the "Spam" folder before cleaning it would be better to look diagonally for legitimate correspondence. But it's still much easier than digging through all this garbage all the time.

If you have a mailbox on another service, where the spam cutter is useless (for example, as in), then you should not despair. Get yourself an Email on Gmail or Yandex, and then set up the forwarding of mail to it from your old mailbox. Moreover, these settings can be made as in the old box (i.e., set up forwarding - shown in the screenshot):

In the same way, in the new mailbox, you can configure the collection of mail from your existing Emails (the screenshot shows the settings for collecting mail in Gmail):

The same can be said for mail client programs... Most of them also have a built-in spam cutter.

But in this case, do not forget that the mail service will have its own spam folder, which will also need to periodically look through (or look for messages that should come, but did not reach - for example, confirmation of registration anywhere is often cut by a spam filter), because mail from it will not be sent by default to your computer (although this can be corrected in the settings of the service or client program).

Good luck to you! See you soon on the pages of the blog site

You may be interested

Account - what is it, how to create or delete it
How to create an email - what is it, how and where to register and which email (mailbox) to choose
What is E-mail and why is it called e-mail
How to restore a page in Contact (in case of loss of access, deletion or blocking)
CAPTCHA (captcha) - what is it and what is it used for Moon Bitcoin (Litecoin, Dash, Dogecoin, Bitcoin Cash) - earnings on cryptocurrency faucets Should you buy image links?
Dog symbol - why is the dog @ icon so called, the history of the appearance of this sign in the address Email and on the keyboard

What methods are there to combat spam?

There are two main methods of protecting a mail server from spam: protecting against incoming spam when it is received by the mail server, and "separating spam" from the rest of the mail after it is received by the mail server.

Among the first method, the most popular are such methods as using DNS Black List (DNSBL), Greylisting and various delays in sending mail; the use of various technical means, such as checking the existence of a user on the sending side (callback), checking the "correctness" of the sending server by such methods as the presence of a record in the reverse DNS zone, the legality of the name when setting up an SMTP session (helo), checking the SPF record (for work the corresponding DNS record for the host uses the corresponding record for the legitimate sender servers).

Among the methods for analyzing the content of a letter, the most popular methods are checking against various algorithms, such as finding special keywords advertising nature or based on Bayes' theorem. The algorithm based on the Bayesian theorem contains elements of the theory of probability, is initially trained by the user for letters that, in his opinion, are spam, and then separates messages containing spam according to their characteristic features.

So, let's take a closer look at these email filtering methods.

Blacklists or DNSBL (DNS Black Lists)

The black lists contain addresses from which spam is sent. Lists such as "open relays" and "open proxies" are widely used, and various lists of dynamic addresses that are allocated by providers to end users. Due to the simplicity of implementation, the use of these blacklists is done through the DNS service.

Greylisting

Greylisting is based on spamming tactics. As a rule, spam is sent in a very short time in large quantities from any server. The job of the greylisting is to deliberately delay the receipt of emails for a while. In this case, the address and time of transfer is entered into the gray list database. If the remote computer is a real mail server, then it must keep the message in the queue and repeat the transfer within five days. Spambots, as a rule, do not save letters in the queue, therefore, after a short time, they stop trying to forward the letter. It has been experimentally established that the average time for sending spam is a little more than an hour. When re-sending a letter from the same address, if the required amount of time has passed since the first attempt, the letter is accepted and the address is entered into the local white list for a sufficiently long period.

Efficiency analysis

The first two methods filter out about 90% of spam even at the stage of delivery to the mailbox. Mail that has already been delivered can be marked up by means of analyzing the contents of the message, for example, using the SpamAssassin program. This product allows, on the basis of special algorithms, to add corresponding lines to the message headers, and the user, based on the mail filters in the mail client, can filter mail into the necessary folders of the mail program.

Conclusion

Of course, there are other ways to protect against spam, the most effective, unfortunately, on this moment are preventive measures, such as not leaving your real e-mail box on sites, forums and message boards, using temporary addresses for such needs, which can later be deleted, if it is necessary to publish a mailbox on the site, use a graphic image instead of text, and the like measures.

You can connect and configure GreyListing through the ISPmanager panel in the "Features" section

You can learn more about configuring anti-spam methods through the control panel here DNSBL and here Greylisting.

According to statistics, more than 80 percent malware penetrate into local area network precisely through e-mail. The mail server itself is a tasty morsel for hackers - having gained access to its resources, the attacker gets full access to the archives. emails and lists of e-mail addresses, which allows you to get a lot of information about the life of the company, projects and work being done in it. Eventually, even lists of email addresses and contacts can be sold to spammers or used to discredit a company by attacking those addresses or writing fake emails.

At first glance, spam is much less of a threat than viruses. But:

  • a large flow of spam distracts employees from completing their tasks and leads to an increase in non-production costs. According to some reports, after reading one letter, an employee needs up to 15 minutes to get into a working rhythm. If more than a hundred unsolicited messages arrive per day, then their need to view them significantly disrupts current work plans;
  • spam contributes to the penetration of malicious programs into the organization disguised as archives or exploiting vulnerabilities in email clients;
  • a large flow of letters passing through the mail server not only impairs its performance, but also leads to a decrease in the available part of the Internet channel, an increase in the cost of paying for this traffic.

With the help of spam, some types of attacks using social engineering methods can be carried out, in particular phishing attacks, when a user receives letters disguised as messages from completely legal persons or organizations, with a request to take any action - for example, enter a password for his bank card.

In connection with all of the above, the e-mail service requires protection without fail and in the first place.

Solution Description

The proposed solution for protecting the enterprise mail system provides:

  • protection against computer viruses and other malicious software distributed by e-mail;
  • protection from spam, both entering the company by e-mail and spreading over the local network.

Modules can be installed as additional modules of the protection system;

  • protection against network attacks on the mail server;
  • anti-virus protection of the mail server itself.

Solution components

The mail services protection system can be implemented in several ways. The choice of a suitable option is based on:

  • company policy information security;
  • operating systems, controls, security systems used in the company;
  • budget constraints.

The right choice allows you not only to build a reliable protection scheme, but also to save a significant amount of money.

As examples, we give the options "Economical" and "Standard"

Option "Economical" is built on the basis of operating system Linux and making the most of free products. Option composition:

  • anti-virus and anti-spam subsystem based on products from Kaspersky Lab, Dr.Web, Symantec. If a company uses a demilitarized zone, it is recommended to move the mail traffic protection system into it. It should be noted that products designed to work in a demilitarized zone have more functionality and greater capabilities to detect spam and attacks than standard ones, which improves network security;
  • a firewall subsystem based on the iptables2 firewall and management tools standard for the Linux operating system;
  • Snort-based attack detection subsystem.

Mail server security analysis can be done using Nessus

The solution based on the "Standard" option includes the following subsystems:

  • a subsystem for protecting mail server and mail gateway services from malware based on solutions from Kaspersky Lab, Dr.Web, Eset, Symantec or Trend Micro;
  • firewalling and attack detection subsystem based on Kerio Firewall or Microsoft ISA.

Mail server security analysis can be done using XSpider

Both of the above options do not include IM and Webmail protection modules by default.
Both the “Economical” and the “Standard” options can be implemented on the basis of FSB and FSTEK certified software products, which allows them to be supplied to government agencies and companies with an increased level of security requirements.

Benefits of the proposed solution

  • the solution provides reliable protection against the penetration of malware and spam;
  • the optimal selection of products allows you to implement a protection scheme that takes into account the needs of a particular client.

It should be noted that a full-fledged protection system can only function if the company has an information security policy and a number of other documents. In this regard, Azone IT offers services not only for the implementation of software products, but also for the development of regulatory documents and audit.

More detailed information about the services provided, you can get by contacting the specialists of our company.

Spam is the mass mailing of messages to users who have not given their consent to receive them. It is carried out for the purpose of advertising certain products, disseminating information, stealing personal data, etc. This is an intrusive advertisement of something. In most cases, spam is presented in the form of sending emails, but in fact it is used wherever there is open access to the dissemination of information: social networks and media, forums, comments on sites, instant messengers, e-mails, SMS to the phone. There is spam even in the offline space. For example, advertising brochures in your mailbox. People who send spam are called spammers. Spam advertising is one of the cheapest methods of online promotion, but not the most effective. Such mailing is negatively perceived by the audience, which does not allow all companies to use it. Those who value reputation and image do not use spam.

Where does the word "spam" come from?

The word "spam" first appeared in the 40s of the 20th century, in the post-war period. Initially, it meant the name of canned food included in the soldiers' meat diet. After the war, they had to be urgently sold before the expiration date expired and they deteriorated. This led to the fact that advertising for this product was everywhere: on the streets, in newspapers, in transport. It was specially made aggressive, imposing on people the need to purchase these canned food. It was this event that was remembered when this kind of advertising began to be actively used on the Web. Aggressive and intrusive distribution of advertising messages has received the appropriate name - spam. Since then, the word "spam" means "mass mailing of intrusive advertising". The user did not ask, did not subscribe, but they send him letters, in the content of which he is not interested. In the early days (as soon as the Internet and e-mails appeared), spam advertising on the Internet was more effective than it is now. People were not used to this, and there was no advertising "blindness" at that time. But it still remains one of the most inexpensive ways to reach the maximum audience, which allows it to stay afloat as one of the most demanded ways to promote its services and products.


A spam attack is the distribution of spam messages with an increased concentration on certain sites or channels. For example, spammers found out that a certain forum has a high return rate. This information spread among the spam circles, and a huge wave of messages with intrusive advertisements hit the site. This event is called a spam attack. Spam attacks are not always carried out due to the high return on the site. Sometimes they happen on someone's malicious intent in order to harm the site and its owner. For example, they are carried out by unscrupulous competitors.

Types of spam

All spam can be classified according to several criteria.

By area of ​​distribution:

    online spam - spreads in the online space;

    offline spam - spreads in offline space.

By distribution method:

    manual - messages are sent manually.

According to the degree of danger:

Most of the popular websites and e-mails have sufficient protection against dangerous spam. They use spam filters. Messages that can cause real harm are blocked automatically. The most dangerous ones are deleted irrevocably, the less dangerous or simply dubious ones are placed in the "Spam" folder. Often, the system mistakenly places messages in the "Spam" folder that do not cause any harm to the user, for example, a letter confirming registration on some site. For the system, these are unfamiliar sources, therefore, it does not trust them. Therefore, regularly check your "Spam" folder and remove the necessary letters from there.

Safe

    commercial advertising. It includes sending messages with advertisements for various goods, services, sites, etc. As mentioned earlier, spam mailing is one of the most inexpensive ways to promote on the Web. Hence, it is in demand among internet entrepreneurs. They just chose spam as one of their marketing channels;

    advertising that is prohibited by law. In the Russian legislation there is a list of goods and services that are prohibited from advertising. Most popular channels ( search engines, social networks) adhere to these requirements, and sometimes add their own. This causes certain difficulties for advertisers. Electronic mailing does not have such restrictions, which allows advertisers to freely advertise any goods and in any form;

    manipulation of public opinion. Spam is often used as a tool to influence the public opinion of the audience. These are not only political motives, but also commercial ones. For example, someone decides to send incriminating material to a competitor or send mail on behalf of someone else in order to receive negative reactions in return. Such mailing does not harm users, but it can cause certain moods in society;

  • distribution with a request to forward the message. A particularly popular form of spam in social networks... As a rule, it does not carry any semantic meaning and does not pursue any goals. These are messages in the spirit of "Forward this letter to 20 friends and next year you will find the love of your life." Oddly enough, but there are people who continue to do this. Rarely may contain hidden ads.

Dangerous (malicious)

This type of spam can cause real harm to users - steal their personal data (logins, passwords), gain access to electronic wallets, infect a computer with viruses, etc. Most often, the content of such letters includes links or attachments. In any case, do not go through them and do not download. Types of dangerous spam:


Distribution locations

Where can spam be found?

    In email, the most common place for spam messages. Before sending, letters are not moderated, therefore, their content is not limited by anything. Typically, spam filters are used after submission.

    Forums - those sites where there is no moderation are very popular among spammers, as this allows you to freely publish any information. Forums where all posts are verified are not used at all or are used to publish hidden advertisements.

    Comments on sites - similarly to forums, sites without moderation are very popular among spammers.

    Social media - The number of spam messages on social media has only increased in recent years. Personal messages and comments are the most popular dissemination tool. Spam on social networks is more “friendly”. Senders, as a rule, do not just send you an advertising message, but try to enter into dialogue and get to know each other. Of course, such an unexpected desire to communicate is caused only by commercial goals - to sell a product or service.

    Messengers - in recent years, with the growing popularity of messengers (Viber, Telegram, WhatsApp), the number of spam messages in them has also grown.

    SMS - everyone probably received SMS with advertisements from unknown numbers on their phone. This is spam.

How spammers find email addresses

One of the most popular questions is "How do spammers know my address or phone number?" Finding user contacts is not a big problem. You can get them in several ways.


Based on the above, the conclusion suggests itself: do not leave your contact information anywhere. Create multiple email addresses - one for important correspondence and important services, the other for everything else. If spam catches up with you, then let it be in the second mailbox.

How to disable spam

In some cases, it is easy to disable spam - just click the "Unsubscribe" button in the email. The method works if you yourself have once subscribed to the source. Sometimes the subscription is issued automatically after registering on the site.

But be careful. Sometimes spammers design links in the form of an "Unsubscribe" button. Of course, after clicking, no unsubscription will occur. You will simply be transferred to the promoted resource. If the source seems unfamiliar to you, it is better to use the following method and block it to get rid of annoying emails. In most email services, as well as in social networks, you can block addresses and users from whom unwanted messages come. How to block spam (for example, Gmail mail):


Done! After the actions taken, the selected address will not be able to send you letters. Now he is blacklisted. Similar actions can be performed on social networks.

Anti-spam methods

In order not to have to manually block each spammer (there can be hundreds of sources), it is enough to follow simple tips and tricks on spam protection.

    Do not post your address and contacts in public and questionable places.

    Create a second box for unimportant messages and use it.

    Do not download files as attachments.

    Use only popular email services (they have the highest level of spam protection).

    Create a more complex mailing address. The lighter the address, the easier it is for spam programs to generate it.

Most secure mailboxes

From the point of view of protection against spam mailings, the most secure mailboxes are:

    Google mail (gmail);

    Yandex mail;

    Mail.ru-mail.

It is important to understand that no service will give 100% protection. Sales letters will always slip through. After all, spam methods are improving every year, becoming more sophisticated and secretive, spammers are constantly finding new ways to bypass filters. But the above services are capable of minimizing the number of unwanted messages.

- € 55-250 million annually. 60% world mail traffic.
50-75% from all Russian mail traffic. Modern antispam tools filter 85-98% of spam. The global market for antispam filters and services in 2004 was approximately $ 500 million (IDC estimates).
Most antivirus vendors have included anti-spam components in their products. There were several purchases of anti-spam software vendors by anti-virus companies during the year (notably the $ 340 million purchase of BrightMail by Symantec). In Russia, antispam filters have been installed by most of the holders of public mail services and most of the providers, which made it possible to remove the urgency of the problem of spam for their clients. The undoubted leader in Russia in terms of sales and the number of protected mailboxes is the Spamtest technology.
1. PREVENTION The # 1 anti-spam tool is to protect your email address. No spammers will know your address - no spam. Highlight your address on the network, you will have to throw it away and start a new one, it will only be a matter of time. And, as a result, tell all your friends and partners a new address again, and you may lose a number of contacts. To prevent this from happening Get two email addresses. One address for long-term contacts (do not shine it on the network).
Another address for making contacts, using the network (chats, message boards, etc.).
Then there should be no spam on the first address, because it is not known on the network.
When spam goes to the second address, just throw it away and start a new one.
2. CHOOSING A NAME People tend to get the most concise address. Let's say sergey@ mail.ru is cool and what a pity that all simple addresses are already taken. Rest assured that on [email protected] spam is pouring in without stopping. It's cool to have a laconic name for the site, but you still have to tell the email address to everyone personally, let it be from numbers or an original, not a hackneyed word. By the way, for this purpose the leading mail gmail.com registers names of at least 6 characters. All short names have long been included in spam lists.
3. HTML SPECIAL CHARACTERS The simplest and most commonly used method of protecting against spiders is to encode the email address using special HTML characters. Instead of a dog - @ ... But today this method is hopelessly outdated.
Robots can easily find such addresses.
4. JAVASCRIPT On the Anti-Spam Code Generator page, you can generate your own script. Since these scripts for hiding the address are crafted, they are very motley and there are no programs that would be able to fetch email from JavaScript. This is the most reliable address protection on the network today.
5. ANTISPAMMERS But, what if you are spotted, or you are so famous that it is impossible for you not to get spotted, then you cannot do without an anti-spammer. There are many antispam programs that you can download online.
What I do not advise.
I came to the conclusion that all these antispams are small and weak, and a sensible antispam cannot be handled by a person, only a reputable company, such as Gmail.com, can do that. Their spam remains on the server, you can always go in and correct it. So my strong advice: get yourself a mail on Google.
I have never seen a better spam filter, all spam remains on the server, which, if desired, can always be viewed and corrected. Antispammers do not completely solve the problem, but make life easier in the problem.
6. POCKET PC AND WAP Spam has reached this level, but today there are fairly reliable means of protection. Therefore, the development of this issue is not relevant.