How to avoid spam emails

Be careful when entering your address

Use a disposable address.

Don't expose your address

Use a good email client or a web client.

  • Do not post your e-mail address in an unobfuscated form on the Internet. If you need to post your e-mail address, obfuscate it so it cannot be easily harvested such as "name -at- hotmail - dot- com,"Or if you need to include your e-mail address in your signature, include a small graphic image containing your e-mail address.
  • Check to see if your e-mail address is visible to spammers by typing it into a Web search engine such as www.google.com. If your e-mail address is posted to any Web sites or newsgroups, remove it if possible to help reduce how much spam you receive.
  • Lots of ISPs provide free e-mail addresses. Set up two e-mail addresses, one for personal e-mail to friends and colleagues, and use the other for subscribing to newsletters or posting on forums and other public locations. If you have a more complex e-mail address, it is less likely to receive spam than one that could be easily dictionary-attacked.
  • Many ISPs also offer free spam filtering. If this is available, enable it. Report missed spam to your ISP, as it helps reducehow muchspam you and other members of the same ISP receive. If your ISP does not offer spam filtering, use anti-spam software to reduce the amount of spam delivered to your inbox.
  • When replying to newsgroup postings, do not include your e-mail address.
  • When filling in Web forms, check the site's privacy policy to ensure it will not be sold or passed on to other companies. There may be a checkbox to opt out of third party mailings. Consider opting out to receive less opt-in e-mail.
  • Never respond to spam. If you reply, even to request removing your e-mail address from the mailing list, you are confirming that your e-mail address is valid and the spam has been successfully delivered to your inbox, not filtered by a spam filter, that you opened the message, read the contents, and responded to the spammer. Lists of confirmed e-mail addresses are more valuable to spammers than unconfirmed lists, and they are frequently bought and sold by spammers.
  • Do not open spam messages wherever possible. Frequently spam messages include "Web beacons" enabling the spammerto determine how many, or which e-mail addresses have received and opened the message.Or use an e-mail client that does not automatically load remote graphic images, such as the most recent versions of Microsoft® Outlook® and Mozilla Thunderbird.
  • Do not click on the links in spam messages, including unsubscribe links. These frequently contain a code that identifies the e-mail address of the recipient, and can confirm the spam has been delivered and that you responded.
  • Never buy any goods from spammers. The spammers rely on very small percentages of people responding to spam and buying goods. If spamming becomes unprofitable and takes lots of effort for little return, spammers have less incentive to continue spamming. Would you risk giving your credit card details to an unknown, unreputable source?
  • If you have an e-mail address that receives a very large amount of spam, consider replacing it with a new address and informing your contacts of the new address. Once you are on lots of spammers' mailing lists, it is likely that the address will receive more and more spam.
  • Make sure that your anti-virus software is up to date. Many viruses and Trojans scan the hard disk for e-mail addresses to send spam and viruses. Avoid spamming your colleagues by keeping your anti-virus software up to date.
  • Use the firewall included with your operating system, or use a firewall from a reputable company, to avoid your computer being hacked or infected with a worm and used as a spam-sending zombie.
  • Do not respond to e-mail requests to validate or confirm any of your account details. Your bank, credit card company, eBay, Paypal, etc., already have your account details, so would not need you to validate them. If you are unsure if a request for personal information from a company is legitimate, contact the company directly or type the Web siteURL directly into your browser. Do not click on the links in the e-mail, as they may be fake links to phishing Web sites.
  • Do not click on unusual links. Confirm the sender did send the e-mail if it looks suspicious.
  • Never give out your login details to anyone.
  • IT departments should train their users not to give out sensitive information.

 

 

 

 

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

How to check for viruses on your computer

AVG Antivirus AVIRA Antivirus Desktop Update Package avast! 4 Home Edition ClamWin Antivirus...

Password Security

PASSWORD SECURITY Create strong passwords Strong passwords are important protections to help...

Email Security

EMAIL SECURITY   Did you know that when you send your email messages, they do not go...

How to Secure Your Website

HOW TO SECURE YOUR WEBSITE There are three basic steps to maintaining a clean site:...

How to backup your Site Using Cpanel from BulaWebs.com

How do I backup / restore / move from one cPanel host to another? How can I restore my site...