Your Guide to Professional
Web Site Design and Development

HTML Tips
HTML Codes
Web Development
Web Design Tips
JavaScript Codes
216 Web Safe Colors
CSS Tutorial
JavaScript Tutorial
ASCII Character Codes

 

| Web Site Development | HTML Codes | HTML Tips | Web Design TipsJavascript Snippets | 216 Safe Colors | Symbols | CSS Tutorial | JavaScript Tutorial |

PC Security — Stopping Spam, Part II: Webmaster Strategies

Spam really is an ongoing battle. The chances are very good that it will not be completely stopped during your lifetime. Spam is essentially unsolicited commercial email, and is the equivalent of junk mail that you receive in your mailbox at home, in a way. However, there is one difference. While junk mail that you receive at home does not require the use of resources, which may or may not cost you money, spam does.

Spam must be battled from many different directions, and while larger corporations can do this, the individual has a harder time understanding which bases to cover. However, there are many things that you can do to combat spam. Webmasters and email providers of course have a much harder time than anyone else. Fortunately, there are tools available.

Remember that spammers will seldom, if ever, manually harvest email addresses. This would be an all day every day job, and they still could not possibly get enough email addresses in this fashion to profit from their endeavors. They use automated tools instead, which most of us know as spambots. These programs scan websites, automatically, and extracts email addresses which are then put into the list.

Remember that spam costs money in terms of time and resources. But few people realize that one of the best ways to combat spam is to hurt the spammer where they will feel it the most - in the pocketbook. Spambots look for certain strings of characters when seeking email addresses, such as you@yourdomain.com. The way that it is strung together, as well as the presence of the @ tells the spambot that this is an email address, and it will be harvested.

If you were to simply change the address to read you_donotspam_at_yourdomain.com the address may be harvested, but it would also have to be scrubbed before it could be used by a spammer, which of course costs them time, and probably money. The drawback to this method is that legitimate people, such as customers and web site visitors, must also alter the email address before they are able to do it. Fortunately, webmasters can now also use bits of CSS and such to prevent spambots from harvesting an email address as well.

Webmasters can also make it harder, and possibly even impossible for spambots to harvest email addresses by making them part of a graphic that displays on the site. Legitimate people can easily see the correct email address - but because it is a graphic, spambots cannot. However, with this method, the email address will not be clickable, and legitimate users will have to correctly copy it down in order to use it.

Most website owners these days do not display an email address at all. Instead, they combat spam by using a feed back form on the site. Users can go and fill out the form, type their personalized message in the text box, and submit it. The information than comes to your inbox, without any spambot tag-alongs.

A more difficult and time consuming method is to block the IP numbers of known spammers from your website. There should be a place to enter IP numbers that you want to block inside the control panel of your web hosting account. If you do not see it, contact your web host to find out where it is, and how to use it. You can also have a sleeping daemon on your website which will remain asleep until a process that you've indicated starts. At that time, the daemon will awake and kill the process - and then go peacefully back to sleep.

Remember that if you can cost the spammer in terms of money or time, you will most likely win. Of course, it will require some of your time to start this spambot blocking/killing process. Do yourself, your processor, your ISP, and everyone else a favor and take the time that it takes to protect your website from spammers.

  PC Security: Index
  PC Security: Internet Browsers
  PC Security: Spam
  PC Security: Stopping Spam Part 1
  PC Security: Stopping Spam Part 2
  PC Security: Spam Scams
  PC Security: Email Security and Spam
  PC Security: Email Security
  PC Security: Computer Viruses
  PC Security: Protecting Computers From Viruses
  PC Security: Worm Viruses
  PC Security: Trojan Horse Viruses
  PC Security: Rootkits
  PC Security: Removing a Virus
  PC Security: Virus Hoaxes
  PC Security: Server Viruses
  PC Security: Home Network
  PC Security: Cell Phone Viruses
  PC Security: Spyware
  PC Security: Firewalls Part 1
  PC Security: Firewalls Part 2
  PC Security: Parental Control Software
  PC Security: Malware - Spyware and Adware
  PC Security: Data Backups
  PC Security: Pop Up Windows
  PC Security: Safe Public Computer Use

More Articles

Web Development Tutorials

  Cascading Style Sheets Tutorial: An Introduction to Cascading Style Sheets
  JavaScript Tutorial: An Introduction to JavaScript
  Web Development: A step by step guide to developing a successful Internet business
  HTML Codes Chart: Copy and paste HTML codes for your web page
  HTML Tips: Copy and paste special effect HTML codes for your web page
  Web Design Tips: Tips, tricks, and special effect codes for your web page
  JavaScript Code Snippets: Copy and paste special effect JavaScript codes for your web page
  216 Web Safe Color Chart: Hexadecimal and RGB Color Codes for your web page
  ASCII Character Codes Chart: American Standard Code for Information Interchange character codes chart