We Have To Stop this SPAM to Get Rid of the Spyware
Understanding Spam and SPYWARE

    "What About SPAM?"
         " It Can Place A Virus  or Spyware Right in Your Computer!"

      SPAM is all of the stuff that shows up in your email
                 inbox that you never asked for.

It's usually a mixture of unrelated sales promotions, advertisements, sometimes shady and often times a scam which could also carry secret spyware programs without your knowledge

"SPAM" is the term that somehow became the easy way to refer to all of this "Unsolicted Commercial email", often called "UCE".

Unscrupulous people, and even your unsuspecting family and friends who think they are doing you a favor, can unknowingly forward 'SPAMMY' email to you.
Think about all of those chain letters,  jokes, even some of the greeting cards that end up in your email box... many have been forwarded a half dozen or more times, and at each stop along the way, it's possible that the cute little message could pick up a virus, trojan horse or worm...

... and there are dishonest 'SPAMMERS' who have the tools to harvest email addresses, including yours, so that they can send out their
scams and junk mail.

     It's often difficult to  separate real good deals from the scams
      and junk sent by the spammers


 Because many unscrupulous people take advantage of the free nature of the internet to email their often shady deals and pornographic material to those of us who don't want it, there is an ongoing effort to eliminate these intrusions into our private lives.

The US government  passed anti-spam legislation called the CAN SPAM Act, which provides severe penalties for those shady people who continue to abuse the emails. It became effective on Jan 1, 2004.

Dont SPAM ! It's probably against the LawThe rules that must be followed are very stringent and rigid. For people like us, who use our websites and emails to try to help people and provide legitimate information, it means that we must be certain that we email only to people who have given us permission to do so.

That's why we have those "Sign-up" forms on our web pages. We will not send anything to anyone who has not given us permission to do so.

The Rules even seem to require that we go back to our subscribers a second time to confirm that it was 'they' who had actually sent the opt-in form response initially.

This is referred to as "Double Opt-in permission". Subscribers opt to (agree to) receive our messages. We then must ask them to confirm the email address they used when they 'opted' to receive them.

This may tend to minimize the Spam abuse.

There are organizations like  'i-Cop, the International Council of Online Professionals', that promote integrity, honesty, and a professional approach to our internet marketing efforts.

They have published an easy to understand review of the Federal Trade Commission's year 2003 Rules and Regulations controlling commercial email. It's available for FREE by CLICKING HERE. It's a valuable tool for small businesses or private persons who have reason to send email that could be considered to be commercial in nature.

                 There are TWO VERY IMPORTANT POINTS:

The act does not prohibit the sending of non-solicited commercial e-mail. It only regulates the MANNER OF SENDING non-solicited commercial e-mail.

● The most common question people ask is, if I am a legitimate marketer or newsletter publisher and I e-mail my newsletter and offers to a list of people who have subscribed; do I need to change any of my practices to conform to the new law?.

Unless you are sending “Non-Solicited” commercial  e-mail to consumers, this act does not apply to you.

This is how the act defines unsolicited or non-solicited Email that is:

● Sent to a person who has not specifically requested to receive communications from the sender and with whom the sender does not have a prior business or personal relationship, or to a person who has previously requested not to receive communications from the sender (i.e., has opted out).
Here are recommendations to anyone sending emails in the course of their business
   ● Make sure you put an accurate Name and E-mail address
      in the FROM  LINE of your e-mail.
   ● Make sure to include your actual physical mailing address
      in the body of every e-mail you send.
   ● Make sure you are using an autoresponder service or other
      email program that has an easy one-click opt-out procedure
      for people who no longer wish to receive your e-mails.
   ● Let people know at the beginning of your email, that they
     are receiving it because they or someone on their behalf
     subscribed using their address.
   ● If you are sending unsolicited commercial email, identify it
      as an advertisement or solicitation in the subject line.

                              Save this Brief Summary
An accurate Name and E-mail address in the FROM LINE
A subject line accurately representing the  content of the
   body of your email.
An actual physical mailing address in the body
A "clear and conspicuous" notice in the  SUBJECT LINE
   that the message is an advertisement or  solicitation.
An easy opt-out procedure for people who no  longer
   wish to receive your e-mails
(The materials available here are for informational purposes only, are not legal advice and should not be relied on as such. The Materials are not intended to substitute for obtaining qualified legal advice from competent, independent, legal counsel in the relevant jurisdiction).

Only Time Will Tell How Effective
 the CAN-SPAM Act Will Be

Unfortunately, it has not completely Stopped Spam, but there are steps you can take to STOP a lot of SPAM from entering your Mail Box

CLICK HERE for a FREE  Guide to Stopping Spam - Once and For All . Get the Guide plus a Free Subscription to the Security Alert News Reporter and the 23 Vital Security Tips that will help you protect your Computer Security and Online safety against Cyber crooks 

Download instructions will be sent to your email address



More about Dangerous Spyware
Fears about "spyware" raises a lot of attention in computer security and policy circles around the world. The term itself is slippery, frequently used hazily to apply both to the information-thieving programs and the often-annoying advertising programs typically bundled with free software programs such as Kazaa or Grokster.

Among the more dangerous kinds of spyware are the commercially available programs for "remote surveillance" applications like iSpyNow, which allow the spying software to be disguised on a computer, and then report back every keystroke that is made on the computer to whoever installed it.

These kinds of remote-spying applications were solely the property of hackers or other malicious computer programmers, but now they have been marketed by some vendors as ways to keep tabs on children's or spouses' computer use.

Among the many different kinds of Spyware, you'll find:

    ● Trojan Horses  ● Keyloggers  ● System Monitors  
    ● Dialers ● Adware  ● Adware Cookies ● HiJackers

       Many of these arrive in your Unsolicited email.


   More Security Suggestions Here - Internet Security Software   

 check Out  Avoiding Identity Theft  
       Are you in danger of losing your identity to thieves?
       Links to Safe 'Family Friendly' online resources
       Are your Keystrokes being secretly monitored?
       10 Practical Steps to avoid Identity Theft

           Follow these links for information, advice, and
                               protective tools

 To Top | Avoiding Infection | Infected | Recovery |Glossary |   |Virus Hoaxes |
Cookies & PopUps | Popups Keyloggers |
SPAM & Spyware | Identity Theft | Articles & Reports |
HOME/Firewalls| Site Map |Survey
| Trojan Horse | Blog |

Virus Removal Tips|
   Maintaining your Computer System
               health is our Goal

              Share these web pages.
        Help Spread the word about our'
    Computer Security Awareness Campaign"




SPAM is Hell  - article with help for avoiding certain types of Spammer attacks

Kaspersky security software for Home Users ● Anti-Spam, Anti-virus and Anti-spyware protection
SPAM testing your own emails An easy to use FREE tool to  help prevent your messages  from being filtered by the  recipient
 Basic tutorial about SPAM   Excellent




Subscribe to our
 Security Alerts
 News Reporter

for periodic updates on
 the latest events and
 issues affecting your
 personal security
We value your Privacy

Click Button - Get your FREE report
"23 Critical Security Alerts"

 from the subscription
 signup page





Kaspersky security software for Home Users Anti-Spam, Anti-virus and Anti-spyware protection




Get latest News
 Take a look at the
Security Alert Blog

A Blog (web log) is a quick and easy way to share timely information (updated news, trends, developments), answer questions, express your opinions and exchange views.


What's your No. 1 Use of the Internet?
Please take this
50 second
Mini-Survey. Tell us how we can best serve your primary interests so you can avoid Hacker and spy ware intruders.

We'll give you a nifty and entertaining Free eBook on Coping With Your Stresses

as a Thank for your time


Chamber of Commerce - on the Web logo



© Home | Contact | Privacy Policy  SPAM   Copyright © RichardPresents.com All rights reserved