|

Each
month, we will post information for our members
regarding new services, important Internet notices, and helpful tips.

Domain
Scams
The
Trouble With Spam and
New Ways to Deal With It
How
to Fight Spam
Filtering
Junk & Adult Mail
New
Type of Spam
Spy
Ware - What it Does to You
The
"419" Scam or Nigerian Letter Scam
Protect
Yourself from Identity Theft
E-Greeting
Downloads Porn Keyboard
Shortcuts for Netscape
Online
Shopping Safety Tips

Visit our Previous Features and
Stories
(more on Spam here)
PLEASE VISIT
OUR SPONSOR:
Do
you have a suggestion for the Bulletin Board?
Is there something you would like us to cover?
Tell us

 THE
TROUBLE WITH SPAM AND NEW WAYS TO DEAL WITH IT
The unwanted
junk email that comes flooding into our email each day feels like a
sustained attack from unseen enemies. The
offers of herbal Viagra, cheap ink-jet cartridges, jobs working from
home, bigger body parts, smaller mortgage payments, porn, wealth,
beauty, and many, many more go unheeded by the vast majority of
recipients.
Ever-increasing
Spam
Close to
a million Spam messages flow into CVC Internet, LLC alone every day.
Some 80% of incoming CVC messages are Spam. That does not count
mail stopped by CVC's Spam filters. The amount of global Spam
sent each day has increased by a factor of five in the past year
according to some estimates. Predictions conservatively show
that the total number of Spam email messages sent will increase from
10 billion per day today to 30 billion a day by 2006.
It's
obvious that Spam "evildoers" are just scattering junk mail
to the wind, trolling for suckers. They'll Spam 10 million
people in order to make 100 sales. But the net effect is
needless aggravation, wasted time and money, and the unspoken
psychological damage of being unable to stop the mess from pouring
into our mailboxes.
Declaration
of war
Spam is
spoiling the Internet, reducing the convenience and value of email,
and making people think twice about letting kids go online.
Current legislation doesn't work. Email can come from anywhere
in the world. Filters are temporary because spammers figure out
how to get around them. Lawsuits have done nothing to slow the
onslaught.
Yes,
it's a war. They're attacking us - and we've got to fight
back. We'll never end all Spam forever. The goal is to
make Spamming expensive, difficult and spectacularly unpleasant
enterprise that just isn't worth the trouble.
Spamming
is expensive and difficult. Sending millions of email messages
costs tens of thousands of dollars. Changing ISP's, keeping
identities secret, evading the law (something Spammers cannot avoid)
all costs a bundle.
The goal
of Spam should be to make it as difficult, expensive, and painful as
possible by working to end Spam for ourselves, and for less technical
people who need help stopping Spam.
Anti-Spam
software and services
-
It
turns out that the easiest, cheapest, and most effective way to
stop Spam also helps harm Spammers worldwide. It's called SpamNet
from Couldmark.
This program only works with Outlook, but will soon work with
Outlook Express. This is a free download.
The installation creates a "Spam" folder in Outlook and
dumps most of your Spam there automatically. When Spam isn't
caught by SpamNet, you can simply select that message and click
"Block." The best part of this program is when you
click on "Block" it tells central SpamNet servers that
the message is Spam and the message, sender, and advertiser are
placed on the global block list, which means you are helping to
identify Spam for other users. The software becomes more
effective for you, and more damaging to Spammers with each passing
day.
-
MailWasher
is another program that is very effective on the war against
Spam. MailWasher is highly configurable shareware so you can
customize it until it eliminates 99% of all Spam. The best
feature of this program is the automatic fake error message to the
spammers telling their automated computers that you email address
is no longer valid.
-
There
are a wide variety of other anti-spam solutions available.
Some cost money, others are free. Some emphasize
effectiveness, others convenience. Each taking a slightly
different approach to stopping Spam. It is recommended that
you experiment with a variety of programs to see which works best
for you. Here are some other programs available:
Mail
Shell
Spam
Assassin
Choice
Mail
Spam
Killer
Spam
Cop
I
Hate Spam
Postini
Anti-Spam
Tips and Tricks
The
reality of Spam is that you as a user need to valid email addresses to
register for websites, verify passwords and so on. Some of those
websites sell or rent their list of email address to Spammers.
Here is
a list of techniques used for managing Spam in random order:
-
Ask
your friends and family to never send e-cards to your main email
address. (In doing so, they risk giving your email address
to spammers.)
-
Never
forward jokes or chain letters without first deleting the
addresses that traveled with it. You can use Blind
Carbon Copies
to avoid sharing email addresses with the rest of the world.
You just never know who will get their hands on those addresses!
-
Never
reply to Spam, even to request removal. When you reply, you
verify that your email address is current, which means Spammers
can sell your address to other Spammers and make even more money.
-
Use mail
filters
in your mail program to block unwanted mail.
-
Create
a special email address for email newsletters, or even a separate
address for each newsletter you receive. (This will show you
who sells your email address.)
-
Never
post your private email address on the Web, in a chat room,
message board, or anywhere else.
-
Never
reward Spammers by buying anything advertised through Spam.
-
Create
a rule in your mail program that automatically deletes any email
that doesn't contain your email address in the "To:"
field. (Make sure you exempt any newsletters you want to
receive.)
(Back
to the top of the page)
how
to fight Spam
The
volume of Spam has increased ten times throughout the year 2001 -
these numbers are staggering - and we're sure that you have noticed
the increase of Spam in your mailbox. It
may seem CVC Internet, LLC has nothing in place to take care of this problem,
but CVC fights Spam on several levels. We
handle internally-maintained lists of offending domains and IP
addresses, we carefully use and monitor text filtering and scan
attachments for viruses.
Overall,
our defense is helping to curb the load of Spam but it's not
eliminating this continually growing problem. Spammers
often use various techniques to make it difficult or impossible for us
to block them and we need to be careful that we don't block legitimate
messages.
One person's Spam
could be another's legitimate message. We tend to err on the
side of letting the message through.
CVC
Internet, LLC can only do so much to keep the Spam out of your
mailbox.
You can help with the "war" on Spam - here are a few
suggestions:
|
PREVENTION
If you
send e-mail or surf the net, Spammers can find your
contact information. Here are five things that expose
you to Spam:
- Chatting
Online
- Posting
notes to message boards or newsgroups
- Joining
mailing lists
- Creating a
member profile on a Web Site
- Creating a
Web Page and being listed as the Webmaster
Precautions
to help limit your exposure on the net:
- Create
"Dummy" Identities
- Be careful
where you expose your address
- Check a
Web Site's Privacy Statement
- Avoid
replying to any Spam
Read a
report on what behaviors generate the most Spam: www.cnet.com |
EVADE SPAM
Spammers
will often use programs to scan the net and collect e-mail
addresses. No matter how careful you are with your
e-mail address, you will get Spam. When you find it in
your mailbox, here are some suggestions to avoid getting more:
- DELETE IT!
The best defense is using this button in your mail
program.
- Choose
carefully when you reply to an e-mail. Replying to
Spam often validates your e-mail address and ensures that
you'll get even more Spam!
- Don't
click on any links in a Spam e-mail. Spammers are
now using html (Internet language) messages with embedded
links (another way of validating your e-mail address).
More often then not, these links don't lead to a valid
page.
- Use e-mail
filters
in your mail program. (In
the Previous
Features and Stories section
of the CVC Bulletin Board you can find how to place these
filters.)
|
REPORT
SPAM
Reporting
Spam is one of the most productive defensive strategies. ISP's
dislike Spammers as much as you do and Spammers also move
around quite a bit. The problem is getting the correct
information to the right people. Here are some links we
have found that can help:
|
DEFENSE
There are
many programs available to help you combat the war on Spam.
- ZD-Net
and C-Net
are two sites that are always on the lookout for new tools
to help with Spam.
|
For more
information on Spam click
here.
(Back
to the top of the page)
How
to Filter Junk and Adult Content E-mail Messages
in Microsoft Mail Programs (Exchange, Outlook, Outlook Express, etc.)
There is a growing business in using e-mail
messages as a direct marketing tool. If you do not wish to
receive these kind of messages, Microsoft mail can search for commonly
used phrases in such messages, and automatically move them from you
Inbox to a junk e-mail folder, your deleted items folder, or any other
folder you specify. The list of
terms that Microsoft Mail uses to filter suspected junk e-mail
messages, can be found in a file called Filters.txt (please refer
to the help menu within the mail program, for more information on this
file and the usage of e-mail filtering).
You can
also filter messages based on a list of e-mail addresses of junk and
adult content senders. There are third party filters, which are
regularly updated, that you can add to Microsoft's mail. These
filter's have the latest list of commercial and adult content senders.
For more information on setting up and using e-mail filters, please
visit Microsoft's site by going to http://www.microsoft.com
How to
Filter Junk and Adult Content E-mail Messages
in Netscape Communicator
To activate the
Mail Filters in Netscape, open the Netscape program, and open the Mail
window. In the Mail window, click on the Edit menu, select
Message Filters, and adjust the settings as needed. For more
information on using Mail Filters in Netscape, please refer to the
Help menu located within the software program, or go to Netscape's
site located at http://www.netscape.com.
(Back
to the top of the page)
NEW
TYPE OF SPAM
Beware of e-mail
trying to sound like they are a part of CVC Internet, LLC. It has been
brought to our attention a company called FreshAddress.com is trying to verify
your e-mail address. Do
not respond to this e-mail! It is simply a ploy to get you to verify your
address and probably resell it for a profit.
(Back
to the top of the page)
The
"419" Scam or Nigerian Letter Scam
This
scam has been around for over 20 years according to the Oregon
Attorney General's office. In broken often sheepish English, the
writer claims to be from Africa, most often from Nigeria, Zimbabwe or
South Africa. The
writer is desperate to move large amounts of money out of the country
and into a foreign bank. Targets of the shakedown are told they
can keep a share of the money in exchange for their help. The
cut is usually around a fourth of the total making for a multimillion
dollar payoff. The
US State Department has published a booklet about this scam and it can
be downloaded in Adobe Acrobat format at:
www.state.gov/www/regions/africa/naffpub.pdf
If you have
lost money to this scam, please contact Financial Crimes Division at 950 H
Street NW, Washington D.C.; call 202-406-5850; or visit www.secretservice.gov/contact_fcd.shtml
If you have NOT
lost money, but received a letter are being asked to fax a copy of the letter to
the Secret Service in Washington D.C. at 202-406-5031.
To protect
yourself from other scams, please check out this website:
Korva
Multimedia - this
website is devoted to exposing scams including the McDonalds meat story, lost
children, etc.
(Back
to the top of the page)
SPYWARE
- WHAT IT DOES TO YOU
Spyware or adware is
defined as a third party application that is bundled into a downloaded program
from the Internet. Once these programs are installed on your computer,
they can install a wide assortment of DLLs and other executables files sending a
continuous data stream to the parent marketing company out from your
computer; leave a
backdoor open for hackers without your knowledge - they can install other
programs directly on to your computer without your knowledge and they can send
and receive cookies to other spyware programs and invite them into your computer
(even if your cookies are disabled).
To make matters worse, they
can also add Trojan horses into your system, many are fully independent
executable files which are self sufficient programs which take on the
authorization abilities of the user, they include auto install and auto update
capabilities and can report on any attempts to remove or modify them, and just
generally create havoc on your computer.
Currently,
there are well over 800 shareware/freeware products which also include
additional components for what the Internet community call adware and
spyware. These applications are located all over the Internet as easy
downloads. They can be found on CNet, Tucows and several other locations
offering free and low cost bargains. Most
of these products make no real statement that they include adware or spyware and
if they do, it is buried in the "terms of use" or make a small reference
that they are supported this way. Some developers might include a small
privacy statement which does not fully explain what information will be gathered
or give a full explanation regarding what will be done with the
information.
Unfortunately
programs like Go!Zilla and Lime Wire, iMesh, Kazaa along with most file-sharing
apps also install several applications to finance its development including
TopText and Gator, Cydoor, and BonziBuddy. For
example, Gator's
capabilities include helping you manage your personal information, banking
records, credit card account numbers, passwords and other vital information and
can process forms on your behalf while shopping online - this sounds great
- IF all the personal
information it held remained securely on your personal computer, but all of it
does not and much of it gets included in the data stream to Gator's headquarters
where it can be sold to third parties.
There is help
available. There is a freeware program you can install into your computer
that will tell you every piece of spyware installed on your system and help you
uninstall it to avoid any damage on your computer. Visit www.lavasoftusa.com
for more information about their product.
(Back to the top of
the page)
PROTECT
YOURSELF FROM IDENTITY THEFT
Identity
theft is the use or attempted use of credit cards, checks, access
codes (ie: ATM cards), or identifying information such as your social
security number or mother's maiden name to get goods or services.
On average, it
takes 15 months for a victim to discover identity theft, giving crooks plenty
of time to operate and get away. The good news is that a victim is
responsible for no more than the first $50 of credit card charges if misuse is
reported promptly. The bad news is that the average victim faces $18,00
in fraudulent charges that must be removed from his or her credit history.
How Identity
Thieves Operate
Some scammers
buy fake birth certificates and IDs while others hack into databases. In
March 2001, the FBI reported that 40 corporations in 20 states were targeted
by hackers operating outside the United States. Activities compromised
the security of more than 1 million credit cards numbers stored by the hacked
corporations. Most of the hacking activity originated in Eastern Europe,
China, and the former Soviet Republics.
The latest trend
in identity theft is "skimming." Take a restaurant as an
example. A waiter swipes your credit card two times: once for the
meal, and once to copy all the data off the magnetic strip into a small
device.
The criminal who
supplied the waiter with the skimming device then downloads the swiped card's
information into his or her computer, puts the information on counterfeit
cards, and uses those cards to buy goods and services using your account.
Protect
Yourself From Identity Theft
You can take
several steps to avoid falling prey to identity thieves:
-
Buy a
shredder. Destroy all pre-approved credit offers that come in the
mail as well as credit card receipts you no longer need. Call
1.888.OPTOUT to reduce the number of future unwanted credit card offers
you get in the mail.
-
Keep
important numbers safe. Don't carry social security card numbers or
PIN numbers in your wallet. Cover your hand when you're entering a
PIN or long distance access code at a bank machine or pay phone.
This will prevent "shoulder surfers" from copying your number.
-
Give your
credit card number or social security number over the phone only if you
initiated the purchase or transaction.
-
Check your
credit report for credit cards or charges you don't recognize once a
year. Credit reports are available for $8 each from each of the
three credit reporting bureaus:
Equifax: 1.800.685.1111
Experian: 1.800.397.3742
TransUnion: 1.800.916.8800
What if you
are a victim?
If you discover
you're a victim of identity theft, follow these steps:
-
Make a
police report in the town you live in. Local police are required to
file the report, even if the ultimate case will be referred to a different
location for prosecution (for example, where the goods are being shipped).
-
Call the
three credit reporting bureaus' fraud lines to report the misuse and place
a fraud alert in your file. By federal law, a victim is entitled to
a free credit report (you may have to provide them copies of the police
report). The fraud numbers are:
Equifax: 1.800.525.6285
Experian: 1.88.397.3742
TransUnion: 1.800.680.7289
-
Check your
credit reports carefully, and contact any unfamiliar creditors.
Close any credit card or bank accounts that have been tampered with, and
open new ones at your proper address. Add extra password protection
to avoid changes by anyone other than yourself.
-
To report a
stolen or misued social security number, call 1.800.269.0271 or email oig.hotline@ssa.gov
(Back to the top of
the page)
E-GREETING
DOWNLOADS PORN
The email may
look harmless enough; it appears someone has sent you an e-card.
If you click on the link, it will take you to the site to pick up your
card. Easy enough right? Email
marketers (many being porn sites) are increasingly borrowing tactics
used by hackers to trick potential customers into seeing their
messages using Microsoft products to instantly download their unwanted
programs. The latest site is from www.xxxgreatings.com and will
mimic many legitimate greeting card sites by including a personalized
subject line.
Within the
message, there is a link to the Web site and a small note:
"E-card viewer plug-in may be required to view some cards" -
after accepting a lengthy agreement unwittingly download a program
that is porn-filled pop-up ads and hands over the email address in
their Outlook address book to the marketer.
It has been suggested to avoid
clicking on email links you do not recognize.
(Back to the top of
the page)
KEYBOARD
SHORTCUTS USING NETSCAPE
The following
list shows keyboard shortcuts for Netscape browser:
-
ALT + Left
Arrow - takes you back to the previous site
-
ALT + Right
Arrow - takes you forward to the next site
-
Ctrl + O -
Opens the open dialogue box (caution using this shortcut - this can
easily lead to a pornographic site)
-
Ctrl + D -
will add a site to your bookmarks
-
Ctrl + N -
opens another browser window (Quick tip: to open a link on the current
page in a new window: place the cursor over the link you want to open and
right click on your mouse button and select "open in new
window")
-
Ctrl + W -
closes window
-
Ctrl + F -
opens the "find" dialogue box
-
Ctrl + G -
find again
-
Ctrl + P -
opens the print dialogue box
-
Ctrl + R -
refreshes the current page
-
Ctrl + S -
saves the current page to your hard drive for access while offline
-
Ctrl + H -
opens history
-
Ctrl + ] -
increase font size
-
Ctrl + [ -
decrease font size
-
Ctrl + A -
select all text/graphic
-
Ctrl + C -
copy
-
Ctrl + V -
paste
-
Ctrl + X -
cut
-
Ctrl + Y -
redo
-
Ctrl + Z -
undo
-
Page Up -
moves the page up one screen at a time
-
Page Down -
moves the page down one screen at a time
-
Ctrl + Q -
quit Netscape
Shortcuts for
Netscape Mail:
-
Ctrl + Shift
+ 1 - opens the Message Center
-
Ctrl + K -
compress space on the Mail Folder
-
Ctrl + L -
forward message as an attachment
-
Ctrl + M -
create a new message
-
Ctrl + S -
save message
-
Ctrl + R -
reply to message
-
Ctrl + T -
check for new mail
(Back to the top of
the page)
ONLINE
SHOPPING TIPS
Visa USA and
the Better Business Bureau (BBB) offer these tips to keep you safe:
-
Shop with e-tailers
you know, or research before you buy. A responsible online retailer
will clearly post its physical address and telephone number on its
website. Use that information to check the business's complaint record
with the Better
Business Bureau or
local consumer protection agency. If a site displays a BBBOnline
Reliability seal, you can click on the seal to quickly check BBB information
on the company and be assured the company will stand behind its
service.
-
Use your
payment card to shop online. If you decide to use your payment card to
purchase goods and services online, your liability under federal law is
limited to $50. Visa also offers Zero Liability protection for
purchases made with a Visa card. Using your credit or debit card can
also provide you with extra cardholder benefits. Check with your card
issuer for protection details or other advantages.
-
Know the e-tailer's
customer satisfaction policies and the terms of the sale. Before
making a purchasing decision, consumers should look for information
regarding shipping timeframe; return, refund, or exchange policies
(including related fees, if any); product warranty/guarantee details; and
information concerning the online store's commitment to resolve any disputes
that might arise.
-
Understand the
difference between buying from a business and buying from a private
seller. It's now more common for individuals to sell goods via
auctions and other sites on the Internet. Be aware that your legal
rights against an individual may not be the same as against a
business. While many private sellers are legitimate, your legal
recourse may be different if you're not satisfied with the merchandise.
-
Be in a secure
environment at point of purchase. Before providing your credit card or
financial information, be certain you are using a secure browser that will
encrypt the personal data you are about to transmit online. At the
point of purchase, look for the prefix "https://" at the beginning
of the e-tailer's Web address in the uniform resource locator (URL) box.
-
Investigate
the e-tailer's "security system" - look for information aobut the
online store's security policies that indicates if the e-tailer provides an
industry-standardlevel of security for the storage of personal data.
-
Protect your
password. Some online stores require you to register a user name and
password before buying an item. Just as you keep your automated teller
machine (ATM) code secret, keep your password secret from outside parties.
-
Exercise the
right to protect your privacy. Shop at e-tailer sites that have posted
privacy policies that reveal what personally identifiable information is
collected about you and how it will be used, and offers you options about
the use of your personal information. Look for signs that the site has
been reviewed by trustworthy organizations, such as BBBOnLine, to ensure
that the business has demonstrated compliance with credible online privacy
principles. The only information reputable online stores typically
require is your password, credit card number and shipping information.
-
Keep a record
of your transactions Print out and save a record of all online
transactions, including the retailer's URL (Internet address). That
way, you'll have information at your fingertips in case questions arise
about the order or terms of the sale.
-
Know your
consumer rights. The same laws that protect you when you shop by phone
or mail apply when you shop in cyberspace. Under the law, a company
must ship your order within the time stated in its advertisements and no
more than 30 days after the order date.
(Back to the top of
the page)
Copyright © 1996-2008, CVC Internet, LLC. All rights reserved.
Certain names, logos, designs, titles, words or phrases on this site
may
constitute trademarks, service marks or trade names of CVC Internet,
LLC.,
or other entities which may be registered in certain jurisdictions.
This web site contains
links to other Internet sites, and such links are not
endorsements of any products or services of such sites, and no
information
in such Internet sites
has been endorsed or approved by CVC Internet, LLC.
CVC Internet, LLC
disclaims any responsibility, if some web site you link
to has material on it that offends you in any way. If problems or
questions arise with the use of any of the linked web sites, please
contact the company that owns or operates the Internet site.
|