Skip to main content

The Underbelly of Junk Mail

I just finished watching a report about porn junk mail on NBC's Dateline tonight and saw something that reminded me of some other business actions not allowed in the US. The story went along the line that people, family people, where receiving pornographic e-mail without asking for it. The reporter John Hockenberry then went on a journey of two continents and 4 cities to trek down and confront the actual person that send the e-mail. I found it interesting that even though each piece of mail is identified with a code that shows you who sent the mail, no one wanted to correct the problem. Through Mr. Hockenberry's trips to Toronto, Las Vegas and Montreal He came across companies that did not have a physical listing. At the same time he found that several companies employed the same people even though they know they are breaking policies set by the company.

This is all fine and well and I do think that junk mail is a part of business that laws have turned there back on. What I don't see is why the companies that have fake or non physical addresses get strict penalties imposed on them for there illicit activities. The company that is being advertised in the junk mail has records of who is sending the mail and while some companies are out of the bounds of US law a large part of them still are and so they should be forced to give up who is behind all this internet clogging mail.

Internet providers are trying to fight the problem buy locking down the network they control. The logic is that you or me have some virus or Trojan that turns us into what's been called a SPAM ZOMBIE. If you become a zombie the locked down network now forces you to sign in to send mail. the zombie program doesn't use your outlook or thunderbird mail application so it doesn't know what it is and therefor is blocked. This will help for a few months but is not the answer. So instead of one person sending millions of e-mail it's thousands of people sending hundreds of thousands of e-mail. You don't know it and mail doesn't show up in your sent folder because the program that is doing this is different from the outlook or thunderbird program. Some answers for a common user like you and me is to use temporary e-mail accounts like mytrashmail.com or mailexpire.com. They are free to use, easy to sign up for, and you have no obligation to the account after it's created. The alternate solution is to have one account that you use for anything that asks for your e-mail address. Wait a few weeks to see if new types of junk mail is sent to you. Once a few weeks pass you change your e-mail account that you signed up with to one that you don't give out to just anyone. Another idea has been to restrict who can send you mail by placing them in your contact list.

Link to Datline story

Comments

  1. If you have a GMail account you can sort out unwanted email and know who gave the spammer your address.
    Simply enter the below when you enter your email address.
    emailname+place you signed up with@gmail.com.
    Adding the plus symbol between your e-mail addres and something else will allow you to get the email and sort it out based on what is after the plus.

    ReplyDelete

Post a Comment

Popular posts from this blog

QR Codes

  So what are all these mixed up checker board looking things you're seeing everywhere? They are called QR codes, and they make your smart phone a whole lot smarter. Imagen you are walking through the mall and you see a poster of that new movie everyone is talking about. You want to discover more about it, but you're never going to remember the web address. Then you see the QR Code in the corner. You scan the code with your phone's camera and you are taken to the web page. All with a few taps of your fingers and none of it typing on a keyboard. Let's find out what else QR codes can do and what is needed to read them.   QR is the abbreviation for Quick Response, and was named so because the 2D bar code is meant to be decoded at high speed. It was developed in 1994 by Denso-Wave for automobile parts tracking. Since then the technology has evolved to allow much more. To use them you will have to have a camera phone and an app designed to read the QR codes. Google has pu

Icon Sushi

It isn't often that I come across a program that I think deserves to be mentioned. So often they miss the mark. Some programs will be intuitive and easy to use but lack the power or ability to do anything effective. Other times the application is powerful and give the user limitless potential but requires classes or several books to just learn how to use. This little application is one such wonder that makes it easy to use but just misses the mark on ability. That said I still like this programme. The first thing that sets this application apart is the ability to use PSD, PNG, BMP, EXE and ICO formats. Have a picture you want to crop and make an icon? you can do it with the standard windows paint program and Icon Sushi. Have an avatar or logo you spent hours in Photo Shop with to get alpha and transparency just right? you can open it in Icon Sushi and translate the work into icon form. It has the ability to create icons without sacrificing quality. It also has the ability to add al