Forum Moderators: open
In the short-term there isn't much, other than filtering, that you can do.
UCE/SPAMers can glean addies from posting as well as a variety of spider/bot configurations like EmailSiphon that suck up addies from web pages.
Additionally, UCE/SPAMmers will do 'Alphabet Attacks' where they'll start an alpha-numeric send program which starts with 'a'@yada.com', 'a1'@yada.com all the way thru to 'zwpjroptws'@yada.com.
Or, they'll just plain spoof the 'yada.com' to appear as though it really did come from 'yada.com'. These forms of attack usually look like: 'wqurpst', ieodidjfu', 'cjehcml', etc. and the only way you might even know of the attack is the bounced 'undeliverables' returning to your mailbox.
It has been said that up to 20% of all ISP fees are to cover the costs of UCE/SPAM. That means it (UCE/SPAM) has a negative impact on each and every Internet Access Subscriber in the World.
If the long-term is more to your liking, take a longer look at the above link and see who else is working hard to stop the proliferation of UCE/SPAM on the Internet.
Pendanticist.
The really anoying thing that seams to be happening lately is the spammer asks for a receipt. Never open one of these or send as receipt. Thats just the spammer making sure your email address is genuine. Another thing I seam to be noticing is that a lot of email titles start with "RE:" making you think it is a reply. I can see a lot of people falling for this one.
On your webpage, you could instead of using a tag like:
<mailto:username@domain.com>
use
<mailto:username@domain.com>
CAP SMALL CAP SMALL
A A a U U u
B B b V V v
C C c W W w
D D d X X x
E E e Y Y y
F F f Z Z z
G G g 1 1
H H h 2 2
I I i 3 3
J J j 4 4
K K k 5 5
L L l 6 6
M M m 7 7
N N n 8 8
O O o 9 9
P P p 0 :
Q Q q - -
R R r _ _
S S s . .
T T t @ @
I do that alot on all my web pages just to prevent getting junk mails.
<SCRIPT language=javascript>
<!--
var username = "info";
var hostname = "widgets.com";
var linktext = username + "@" + hostname;
document.write("<A HREF=" + "mail" + "to:" + username +"@" + hostname + ">" + linktext + "</A>")
//-->
</SCRIPT>
Also, you need a plan for your domain's WHOis information since this is another notorious source of Email harvesting - find a registrar with WHOis spam protection.
One of my clients was getting 200 spam mails per day (oh yeah, that's two hundred), and I finally installed TMDA for one of their boxes. In the process, I also installed it on one of my boxes and spam went down from about 30/day to 5/week.
btw, why is this message in google news?
Whenever I see a Nigerian ISP on the logs I know that it will just be a couple hours before they start flooding in. By the way, the following site gives you all the details of the scam and lets you know what to do with these messages:
[home.rica.net...]
I used to religiously place a hidden link right after the body tag on every page, to a perl cgi script which produced a contact-us page containing a selection of random fake email addresses, the idea being to pollute the spammers databases when their spambots crawled, until it occurred to me that even though the script produced such bizarre combinations as things like maybe hermionepulkerton@oehjhjytykb.com , there was always a chance of dropping some innocent bystander domain owner in the poo. Who's to say even oehjhjytykb.com might in fact not be invalid, quite apart from the hidden link probably being a touch dodgy as far as G is concerned.
So, in the end, after a number of years trying one solution or the other, I've ended up pretty much coming full circle. Let 'em all in & sift 'em manually, just viciously reporting the odd one I find truly sick, by using a combination of spamcop & manually checking through the headers.
I've found after a while, you can get pretty fast at running through the list & identifying & deleting most of the bad 'uns just by looking at the subject line. Maybe 1 out of 10 warrants more than half a seconds investigation before hitting the del key.
One thing I understand is quite effective is to turn off auto preview if you're using outlook express or similar - a lot of the spammers use image tags with a session id or similar tactics to let them know when a dictionary attack is successful. When you want to check further into a mail, use view source or equivalent, rather than letting the mail open fully.
It looks like we will make all our emails go through our cgi form based email script. seems the best way.. cant afford to lose those who have js turned off.
Bye the way, i get over 1,000 spam emails a day and around 40 legitimate ones to 3 alias email addresses. All are tagged well by mailwasher, but you still have to delete them and wait for them to download. With that many sometimes mailwasher crashed. It was time to do something!
So please watch out, I have personally not lost anything to these yet (except time) but I know people who have.
Instead of using the "mailto:..." I use the following javascript code so the Email harvesters cannot read it properly:
That javascript thing really works. I've had three email addresses on various websites for a couple of years now and two of them receive no spam at all. The third gets spam from only one source, and so I suspect that they got my address by some route other than spidering.
MeditationMan: That javascript thing really works.
Two PR6 websites I started using this Javascript Email from day one I've had only a handful of junk mails every day after almost 2 years of the sites being up.
Of course I also signed on with a domain Registrar with WHOis spam protection... since WHOis Email harvesting is wide-spread.
Another thing to avoid is if you have a Contact Email Form - having the mail-to Email address readily available in the HTML source can also cause email spam problems.
I'm referring to:
<INPUT TYPE="hidden" VALUE="info@widgets.com" NAME="recipient">
keep your address book up to date and have Outlook set to add all e-mails that you reply to your address book.
Then once a month create a rule that reads like thisif the e-mail is from someone I know move the message into a "friendly inbox"
So what if you are a webmaster and don't know visitors e-mail addresses?
"Instead of using the "mailto:..." I use the following javascript code so the Email harvesters cannot read it properly:
<SCRIPT language=javascript>
<!--
var username = "info";
var hostname = "widgets.com";
var linktext = username + "@" + hostname;
document.write("<A HREF=" + "mail" + "to:" + username +"@" + hostname + ">" + linktext + "</A>")
//-->
</SCRIPT> "
DOES THIS WORKS?.. i have recently taken off all the email addresses from my website and am still getting junk emails
I've changed it to this:
document.write("<A HREF=" + "mail" + "to:" + username + "@" + hostname + ">" + linktext + "</" + "A>")
(Note the breaking up of the 'off anchor' tag at the end.)
Also:
<SCRIPT language=javascript>
Doesn't validate
<SCRIPT language=javascript type="text/javascript">
Does validate
Not a huge deal, but a tip for those using this technique.