No announcement yet.

To those who visit

  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Originally posted by Rafael:
    What bugs me is that my host says that my site was used to send spam. ...I do not have a busy site, any spamming from it would be noticed. ...
    I know. The spam isn't originating at your host. These spammers are mining e-mail address off the web using sophisticated spiders and using those e-mail addresses as return addresses in their spam mail. It is technique that they are using out of pure malice. By using someone's real e-mail address for the return, it may get their spam through some spam filters that look for signs of randomly-contrived, illegitimate e-mail address for return addresses.

    This technique used by spammers is a wide-spread problem. Even Kim Komando talked about once on her radio show.

    The stupid host isn't bothering to consider the possibilities. They just get a complaint that spam is coming through their service because it has your e-mail address as the return address and you are a registered customer of the hosting service. Then, without doing any investigation to determine if it is indeed originating with your account, they pull the plug on you. Maybe they don't have the resources to investigate so they take the easy way out and yank your site. Who knows.

    I don't know how the spammers get other people's e-mail addresses sometimes. I've looked at the header for spam mail that I get and sometimes I just don't see how it even winds up in my inbox. They're clever little s.o.b.'s.

    But check out those spam mail headers. You may be able to track down who really is sending it and log a complaint with the spammer's hosting service.

    Good luck my friend.


    • #17
      The Woodcellar is back! The home page is still, but the forum location has changed. If you bookmarked the forum you will need to go to and click on the "Wood Talk" button. Unfortunately all posts and member registrations were lost. Please register again. If you posted for the woodworking contest I will create a new topic for you to repost your work under today.


      • #18
        Bump to get rid of that idiot rickys spam.


        • #19
          I decided to change calling the bathroom the "John" and renamed it the "Jim". I feel so much better saying I went to the Jim this morning.


          • #20
            What's HDDYTWA? Google doesn't even show it.


            • #21
              Originally posted by Rafael:
              What's HDDYTWA? Google doesn't even show it.
              Home Depot did ya twice! Want-it again?


              • #22
                Some ways to avoid becoming victim to spammers antics;

                1. NEVER, NEVER post your email address on a web site.

                2. NEVER make your email public (visible) on a forum (such as this one). check your profile, many will make you visibile be default, but the fault lies with the lazy administrator who is not thinking of the damage this can do.

                3. When frowarding that funny photo or story to your 100 closest friends, consider using BCC (Blind Carbon Copy) so that their individual email addresses are not revealed to everyone. In Outlook (and probably others) you can create a distribbution list which you give a name. That name appears in your Contact list just like any other contact, but when you send an email to that one contact (the distribution list), everyone on the list gets a copy, you don't have to click and choose 5 or 10 or 20 email addresses.

                4. NEVER answer an email request for any king of information about any forum you belong to, any type of account you have with any internet business, etc without treating it as bogus.

                5. Set you preview window to display text only if the software allows.

                6. Set your email SEND format to default to plain text, you can always override to use HTML or RTF format when needed.

                7. Create a phoney contact in your address book, use a character like " ! " or " @ " (w/o the quotes) as the name, nothing more. DO NOT enter an email address for this contact. The intent is to create a invalid contact that will halt a virus from grabbing the first 50 or so contacts out of your address book and sending them spam from your computer. This is an old trick and not as prevalent as it used to be, but its easy enough to setup so why not do it. If the virus/malware/trojan/whatever should get into your computer and try to send email out using your email program, the software will halt on the first sent email because of the bad (in this case missing) email address.

                If you have a broadband connection to the internet, you need to take extra precautions. Your 'pipe' (ie, connection bandwidth) is big enough to fire off hundreds of spam email per minute. the danger of 'always on' connections such as broadband/DSL is the spammer can send your a infected email or download a small script that runs silently in the background without your knowing it. When it detects little or no activity on the computer for some time or it is set off by a clock to run in the middle of the night when the user is less likely to see what is happening, the trojan opens a port to the spammers home computer, letting him relay his spam through you machine, so it appears to have originated from you (because it DID originate from your computer), and he gets away scott free.

                8. Run a Firewall, either software or hardware type, and close off ports you don't need. If you are running Windows XP, you should have SP2 installed, the defaults settings in SP2 will tighten your computers security greatly.

                9. If you have broadband/DSL and only one computer, you may be thinking you don't need a router, but you DO! A router will allow you to put up a fence so to speak between your home computer(s) and the internet, keeping the bad guys from gaining access to your machines and doing you harm. BAsically a router will let you create a small network ot LAN (Local Area Network) in which only those computers that are part of that network can roam. There are special IP address number ranges set up for internal networks such as this that can not be router over the internet, most routers will use one of these subnet ranges by defualt, and totally block any traffic from the outside from getting in.

                10. Run a anti-virus scanner full-time. Also get some malware detection software like Adaware or MS AntiSpyware and run that weekly to clean out all the junk.

                11. Go into IE setup (or any other browser) and reduce the size of the cache folder to 10 or 20 MB, which is more than enough. If you have a slow (dialup) connection this may cause some pages to load slightly slower. Reducing the size of the cache gives less room for junk to accumulate. Also set you cache folder to be cleared out when you close your browser.

                12. If you use your browser to do any type of online transaction, ALWAYS start in a fresh browser window, not one in which you just visited your favorite porn site or some other suspect place on the web. And ALWAYS close out that browser session when you are done with your online banking, subscribing to your favosite woodworking mag, or ordering something from any of the online woodworking stores. WHY? Because information your enter into online forms remains in your brower's memory even after you leave the website. It will be flushed out when you close the browser window(s).

                13. I am suspect of every email that purports to come from eBay or PayPal. I have received many phishing emails which try to get the receipient to click on a link in the email or reply to the email. DON'T DO IT !! Forward the email to or even if you don't use these sites. Both these companies are fighting hard to stop this abuse. They will use the email you received to help track down the culprits. They will also send you a reply (only once) telling you if the email was legit or not.

                Do some searches on computer security.
                Visit Microsoft's security website (even if you hate MS or don't use Windows) and see what they have to say that can help you understand the dangers and risks.



                Get/Use Network Associates Stinger. It is not a substitute for AV software, but running it occasionally an't hurt. It's updated about once a month and a quick download. Save it to your desktop and run it once a week.


                I am so cautious that I have segmented my home network (10 computers) into 2 subnets, one that comprises my 4 computers and another that is made up of the rest of the machines in the house that the kids and wife use. Kids may say they never visit those bad places on the internet, but sooner or later they will when they get old enough or from peer pressure or someone tricking them into opening an infected email.


                • #23
                  Awesome tips Bob....what a great note. I was going to send you an email to thank you, but wasn't able to....


                  • #24
                    bob, after reading your post, am considering not using my pc anymore.. much better using snail mail instead?? (joke)