{"id":37911,"date":"2016-11-09T13:15:09","date_gmt":"2016-11-09T19:15:09","guid":{"rendered":"http:\/\/webirix.com\/?p=37911"},"modified":"2016-11-09T13:15:09","modified_gmt":"2016-11-09T19:15:09","slug":"que-es-spam","status":"publish","type":"post","link":"https:\/\/webirix.com\/en\/que-es-spam\/","title":{"rendered":"What is spam"},"content":{"rendered":"<p><strong>Spam is any message sent to multiple recipients who did not specifically request such a message.<\/strong>. Because of that, spam is known as junk email.<\/p>\n<p>The spammers generally buy or generate a list of e-mail addresses to which they send the messages. <strong>El origen de estos mensajes tienden a ser &#8220;falsificados,&#8221; para ocultar qui\u00e9n realmente las envi\u00f3<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.informatica-hoy.com.ar\/software-seguridad-virus-antivirus\/imagenes\/no_spam.jpg\" alt=\"Spam\" \/><\/p>\n<p><strong class=\"subtitulos-internos\">To learn more about Spam:<\/strong><\/p>\n<p><strong class=\"subtitulos-internos\">Spammer:<\/strong><br \/>\nIt is one that uses addresses of unknown recipients to send unsolicited messages in large numbers. <strong>There are three types of spammers<\/strong>:<\/p>\n<p><strong class=\"subtitulos-internos\">Spam User:<\/strong> It is that spammer that <strong>use unknown recipient addresses<\/strong>to promote your products and services.<br \/>\n<strong class=\"subtitulos-internos\">E-mail Deales:<\/strong> It is that spammer that <strong>sell lists of email addresses<\/strong> without authorization from their owners.<br \/>\n<strong class=\"subtitulos-internos\">Spam Dealer:<\/strong> It is that spammer that uses <strong>your address lists and sells spam services<\/strong> to a spam user.<\/p>\n<p>The most condemnable are the email dealer and spam dealer as they are those who make a profit through the illicit sale of a product or service. <strong>They are true traffickers of the privacy of others and therefore much more harmful than the spamuser<\/strong>. For this reason, e-mail dealers and spam dealers invariably make use of the most various strategies to remain anonymous.<\/p>\n<p><strong class=\"subtitulos-internos\">Direct marketing:<\/strong> It is the name that spammers traditionally give to spam. It is a blatant understatement. Marketing, by definition, is the attention to the needs of the client, taking into account their interests and preferences. <strong>Obviously, the indiscriminate and insistent use of unknown email addresses, with an expectation of return that hardly reaches a rate of 0.1 percent, does not cover anyone&#039;s expectations.<\/strong>. On the contrary, it becomes a great lack of respect for the recipient of the message in addition to congesting the communication channels.<\/p>\n<p><strong class=\"subtitulos-internos\">Tools most used by spammers:<\/strong><br \/>\n<strong class=\"subtitulos-internos\">Harvesting:<\/strong> <strong>Consiste en obtener automaticamente direcciones de e-mail de los sitios de internet a trav\u00e9s de programas llamados &#8220;e-mail collectors&#8221; o &#8220;e-mail extractors&#8221;<\/strong>. There are an infinity of these programs, some can be downloaded from the <a title=\"Internet\" href=\"http:\/\/www.informatica-hoy.com.ar\/historia-de-la-computadora\/Los-creadores-de-internet.php\">Internet<\/a> for free, others are sold. It is the activity that supplies the raw material for spam.<\/p>\n<p><strong class=\"subtitulos-internos\">Bulk Mailer:<\/strong> <strong>Programs for automatic sending of a large number of messages<\/strong>, and that allow the use of open servers.<\/p>\n<p><strong class=\"subtitulos-internos\">Crimes frequently committed by spam dealers:<\/strong><br \/>\nFaced with the natural reaction of society against spam, many spam dealers, who feel their business threatened, resort to illegal acts such as:<\/p>\n<p><strong class=\"subtitulos-internos\">E-mail Forgery: <\/strong>Tambi\u00e9n conocido como &#8220;<a title=\"Email Spoofing\" href=\"http:\/\/www.informatica-hoy.com.ar\/software-seguridad-virus-antivirus\/Tipos-de-Spoofing-Web-Spoofing-Mail-Spoofing.php\">Email Spoofing<\/a>&#8220;. <strong>It consists of masking the sender, placing a false name and address in the sender field of the message<\/strong>. It can be either a non-existent or temporary address, or an address that belongs to someone else. For this reason, care must be taken when marking a sender as spam, as the true origin of the sender must always be verified. <a title=\"IP\" href=\"http:\/\/www.informatica-hoy.com.ar\/aprender-informatica\/Que-es-la-direccion-IP.php\">IP<\/a> of the message.<\/p>\n<p><strong class=\"subtitulos-internos\">Revenge Spam:<\/strong> Or vindictive spam, <strong>is an attack perpetrated by a spammer who uses his e-mail and E-mail Forgery lists (see definition above) to denigrate the image of the e-mail holder used in the forgery<\/strong>. It is the crime of False Identity and Ideological Falsehood of different criminal codes of various countries. It can be reported to any legal entity. In civil justice, it is sensitive to a sentence of payment of compensation for damages and moral damages.<\/p>\n<p><strong class=\"subtitulos-internos\">Joe-Job:<\/strong> <strong>It is a RevengeSpam attack with the specific objective that the messages returned by wrong addresses reach the supposed sender of the message<\/strong>. This only happens when the servers that receive the emails do not verify the IP of origin of the message, which cannot be forged. The victim and his server are then targets of countless returned emails and can also be erroneously reported in the spam fighting media.<\/p>","protected":false},"excerpt":{"rendered":"<p>Spam is any message sent to multiple recipients who did not specifically request such a message. Because of that, spam is known as junk email. The spammers generally buy or generate a list of e-mail addresses to which they send the messages. The origin of these messages tend to be ...<\/p>","protected":false},"author":24,"featured_media":37912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-37911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"jetpack_featured_media_url":"https:\/\/webirix.com\/wp-content\/uploads\/2016\/11\/no_spam.jpg","_links":{"self":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/37911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/comments?post=37911"}],"version-history":[{"count":1,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/37911\/revisions"}],"predecessor-version":[{"id":37913,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/posts\/37911\/revisions\/37913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media\/37912"}],"wp:attachment":[{"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/media?parent=37911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/categories?post=37911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webirix.com\/en\/wp-json\/wp\/v2\/tags?post=37911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}