In addition, these individuals may use similar fake reply-to accounts, "remove me" accounts, and other types of drop boxes either in the headers or in the body of messages, on web-pages, in web-forms or in postings such as newsgroups. Individuals may from time to time forge message headers in order to suggest that the message originated with service providers such as Hotmail. Dealing with spam or junk from Hotmail addresses It is also quite common for such emails to be sent from forged addresses - the message may not have been anywhere near the site from which it appears to have originated.Īnother type of spam is called 'phishing email', where you may be asked to provide various items of personal or account information. Most people who send them keep changing their email addresses, and it is impossible for the university email system to filter these messages. There are no simple ways of stopping such emails. The basic rule of thumb is Ignore, Delete and Forget such email. DO NOT DO THIS! If you reply you are confirming that your address is valid and that you are reading email, and your reply may then attract more unwanted messages. Some such messages invite you to reply if you want to be removed from their list. It is often clear from the Subject line that a message is junk, so you may not even need to open the message to read it. If you receive any unwanted email, the best approach in almost every case is to delete it immediately. We also utilise a technique called sender verification to help block spam. Known spamming sites are blocked from sending mail to Sussex. The Sussex system uses a spam-detection system called SpamAssassin, and while this does help block a huge amount of spam, it cannot block all of it. We have had complaints from people who thought that their privacy had been invaded, and who forgot that they had published their email addresses in journals and on websites advertising conferences. Chat sites may make your email address visible, and software exists that "harvests" this information. Companies are much more likely to do this than individuals. If ever you contact anyone off site via email there is no guarantee that your email address will not be disclosed to someone else or made available to others. IT Services regularly receives queries from people on campus asking how the sender obtained their address and how to stop the messages. The main drawback of using email is receiving a constant flow of unwanted and occasionally offensive email. 961What should I do about unsolicited, unwanted, spam or junk email?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |