%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240518075548+00'00') /ModDate (D:20240518075548+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4794 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 48.481 521.469 698.253 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 48.856 520.719 697.503 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HOW TO AVOID SPAM)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Spam is unsolicited and often profitable bulk email. Spammers can send millions of emails in a single campaign for very )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(little money. If even one recipient out of 10,000 makes a purchase, the spammer can turn a profit. Unfortunately spam is )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(more than a mere nuisance. It is also used to distribute malware. )] TJ ET BT 61.016 522.066 Td /F3 9.0 Tf [(Here are a few tips to prevent your mailbox from being flooded with unwanted, dubious e-mails.)] TJ ET BT 61.016 502.077 Td /F4 9.0 Tf [(Never make a purchase from an unsolicited email.)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(By making a purchase, you are funding future spam. Spammers may add your email address to lists to sell to other )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(spammers and you will receive even more junk email. Worse still, you could be the victim of a fraud.)] TJ ET BT 61.016 460.110 Td /F4 9.0 Tf [(If you do not know the sender of an unsolicited email, delete it.)] TJ ET BT 61.016 449.121 Td /F3 9.0 Tf [(Spam can contain malware that damages or compromises the computer when the email is opened.)] TJ ET BT 61.016 429.132 Td /F4 9.0 Tf [(Don’t use the preview mode in your email viewer.)] TJ ET BT 61.016 418.143 Td /F3 9.0 Tf [(Spammers can track when a message is viewed, even if you don’t click on it. The preview setting effectively opens the )] TJ ET BT 61.016 407.154 Td /F3 9.0 Tf [(email and lets spammers know that you receive their messages. When you check your email, try to decide whether a )] TJ ET BT 61.016 396.165 Td /F3 9.0 Tf [(message is spam on the basis of the subject line only.)] TJ ET BT 61.016 376.176 Td /F4 9.0 Tf [(Don’t overexpose your email address.)] TJ ET BT 61.016 362.989 Td /F3 9.0 Tf [(How much online exposure you give your email address is the biggest factor in how much spam you receive. Here are )] TJ ET BT 61.016 349.253 Td /F3 9.0 Tf [(some bad habits that expose your email address to spammers:)] TJ ET BT 61.016 335.517 Td /F3 9.0 Tf [(- Posting to mailing lists that are archived online)] TJ ET BT 61.016 321.781 Td /F3 9.0 Tf [(- Submitting your address to online services with questionable privacy practices)] TJ ET BT 61.016 308.044 Td /F3 9.0 Tf [(- Exposing your address publicly on social networks \(Facebook, LinkedIn, etc.\))] TJ ET BT 61.016 294.308 Td /F3 9.0 Tf [(- Using an easily guessable address based on first name, last name and company)] TJ ET BT 61.016 280.572 Td /F3 9.0 Tf [(- Not keeping your work and personal email separate)] TJ ET BT 61.016 253.336 Td /F4 9.0 Tf [(Use the bcc field if you email many people at once.)] TJ ET BT 61.016 239.599 Td /F3 9.0 Tf [(The bcc or blind carbon copy field hides the list of recipients from other users. If you put the addresses in the To field, )] TJ ET BT 61.016 225.863 Td /F3 9.0 Tf [(spammers may harvest them and add them to mailing lists.)] TJ ET BT 61.016 198.627 Td /F4 9.0 Tf [(Use one or two secondary email addresses.)] TJ ET BT 61.016 184.891 Td /F3 9.0 Tf [(If you fill out web registration forms or surveys on sites from which you don’t want further information, use a secondary )] TJ ET BT 61.016 171.154 Td /F3 9.0 Tf [(email address. )] TJ ET BT 61.016 143.918 Td /F4 9.0 Tf [(Opt out of further information or offers.)] TJ ET BT 61.016 130.182 Td /F3 9.0 Tf [(When you fill out forms on websites, look for the checkbox that lets you choose whether to accept further information or )] TJ ET BT 61.016 116.446 Td /F3 9.0 Tf [(offers. Uncheck if you don't want to receive any more correspondence.)] TJ ET BT 61.016 95.907 Td /F3 9.0 Tf [(Take note that information below is an extract from the)] TJ ET 0.373 0.169 0.255 rg BT 278.114 95.907 Td /F3 9.0 Tf [(Sophos Threatsaurus,)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 278.114 94.756 m 366.656 94.756 l S 0.400 0.400 0.400 rg BT 366.656 95.907 Td /F3 9.0 Tf [( compiled by Sophos, a security software and )] TJ ET BT 61.016 84.918 Td /F3 9.0 Tf [(hardware company.)] TJ ET BT 61.016 66.429 Td /F3 9.0 Tf [(Posted in:E-mail,Security | Tagged:Malware,Spam | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 278.1137 95.0746 366.6557 104.2321 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://www.sophos.com/en-us/medialibrary/PDFs/other/sophosthreatsaurusaz.pdf?la=en) >> endobj xref 0 14 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000551 00000 n 0000005397 00000 n 0000005509 00000 n 0000005616 00000 n 0000005732 00000 n 0000005852 00000 n 0000005979 00000 n trailer << /Size 14 /Root 1 0 R /Info 5 0 R >> startxref 6114 %%EOF How to avoid spam « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

How to avoid spam

Spam is unsolicited and often profitable bulk email. Spammers can send millions of emails in a single campaign for very little money. If even one recipient out of 10,000 makes a purchase, the spammer can turn a profit. Unfortunately spam is more than a mere nuisance. It is also used to distribute malware. 

Here are a few tips to prevent your mailbox from being flooded with unwanted, dubious e-mails.

Never make a purchase from an unsolicited email.
By making a purchase, you are funding future spam. Spammers may add your email address to lists to sell to other spammers and you will receive even more junk email. Worse still, you could be the victim of a fraud.

If you do not know the sender of an unsolicited email, delete it.
Spam can contain malware that damages or compromises the computer when the email is opened.

Don’t use the preview mode in your email viewer.
Spammers can track when a message is viewed, even if you don’t click on it. The preview setting effectively opens the email and lets spammers know that you receive their messages. When you check your email, try to decide whether a message is spam on the basis of the subject line only.

Don’t overexpose your email address.
How much online exposure you give your email address is the biggest factor in how much spam you receive. Here are some bad habits that expose your email address to spammers:
– Posting to mailing lists that are archived online
– Submitting your address to online services with questionable privacy practices
– Exposing your address publicly on social networks (Facebook, LinkedIn, etc.)
– Using an easily guessable address based on first name, last name and company
– Not keeping your work and personal email separate

Use the bcc field if you email many people at once.
The bcc or blind carbon copy field hides the list of recipients from other users. If you put the addresses in the To field, spammers may harvest them and add them to mailing lists.

Use one or two secondary email addresses.
If you fill out web registration forms or surveys on sites from which you don’t want further information, use a secondary email address. 

Opt out of further information or offers.
When you fill out forms on websites, look for the checkbox that lets you choose whether to accept further information or offers. Uncheck if you don’t want to receive any more correspondence.

Take note that information below is an extract from the Sophos Threatsaurus, compiled by Sophos, a security software and hardware company.

Tags: ,

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.