{"id":6943,"date":"2019-10-05T22:20:20","date_gmt":"2019-10-05T22:20:20","guid":{"rendered":"http:\/\/on-line-interactivity.com\/blog\/2019\/10\/05\/how-spammers-fool-whitelists-and-ho\/"},"modified":"2019-10-05T22:20:20","modified_gmt":"2019-10-05T22:20:20","slug":"how-spammers-fool-whitelists-and-ho","status":"publish","type":"post","link":"https:\/\/on-line-interactivity.com\/blog\/how-spammers-fool-whitelists-and-ho\/","title":{"rendered":"How Spammers Fool Whitelists   And Ho"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><body>&#13;<\/p>\n<div align=\"center\">&#13;<\/p>\n<p><a href=\"https:\/\/on-line-interactivity.com\">&#13;<br \/>\n  <img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/on-line-interactivity.com\/blog\/wp-content\/uploads\/2019\/12\/abbtop.jpg\" width=\"800\" height=\"120\"\/><\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/p>\n<p>&#13;<\/p>\n<table width=\"800\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tr>\n<td colspan=\"2\">&#13;<br \/>\n\t  &#13;<\/p>\n<div align=\"center\">&#13;<br \/>\n\t     <script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 728;\ngoogle_ad_height = 90;\ngoogle_ad_format = \"728x90_as\";\ngoogle_ad_type = \"text_image\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"336699\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n         ]]><\/script>   &#13;<br \/>\n\t  \u00a0<\/div>\n<\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<tr>\n<td width=\"260\" valign=\"top\">\n<p>\u00a0&#13;<br \/>\n\t  &#13;<br \/>\n\t  &#13;\n\t  <\/p>\n<div align=\"left\"><span class=\"style23\">&#13;<\/p>\n<p align=\"left\" class=\"style23\">Article Navigation <\/p>\n<p>&#13;<br \/>\n        <a href=\"index.html\"><font size=\"3\">Back To &#13;<br \/>\n          Main Page <\/font> <\/a> &#13;<\/p>\n<p\/><\/span><\/div>\n<p>&#13;<\/p>\n<p align=\"left\"\/>\n<hr\/>\n<p align=\"left\"><script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 250;\ngoogle_ad_height = 250;\ngoogle_ad_format = \"250x250_as\";\ngoogle_ad_type = \"text\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"FFFFFF\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n            ]]><\/script><\/p>\n<p>&#13;<br \/>\n            \u00a0<\/p>\n<p align=\"left\"><b><a href=\"index.html\"><font size=\"4\">&#13;<br \/>\n      <span style=\"background-color: #FF6600\">Click Here<\/span><\/font><\/a><\/b><font size=\"4\"><span style=\"background-color: #FF6600\"> &#13;<br \/>\n      for more articles<\/span><\/font><\/p>\n<\/td>\n<p>&#13;<\/p>\n<td width=\"514\" valign=\"top\">\n<div align=\"left\">&#13;<\/p>\n<table width=\"99%\" height=\"114\">\n<tr>\n<td height=\"45\"><span class=\"style7\"><!-- Search Google -->&#13;<br \/>\n<center>&#13;<\/p>\n<form method=\"get\" action=\"http:\/\/www.google.com\/custom\" target=\"_top\">&#13;<\/p>\n<table bgcolor=\"#ffffff\">\n<tr>\n<td nowrap=\"nowrap\" valign=\"top\" align=\"left\" height=\"32\">&#13;<br \/>\n<a href=\"http:\/\/www.google.com\/\">&#13;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.google.com\/logos\/Logo_25wht.gif\" border=\"0\" alt=\"Google\" align=\"middle\" width=\"75\" height=\"32\"\/><\/a>&#13;<br \/>\n<input type=\"text\" name=\"q\" size=\"31\" maxlength=\"255\" value=\"\"\/><input type=\"submit\" name=\"sa\" value=\"Search\"\/><input type=\"hidden\" name=\"client\" value=\"pub-5712520513640847\"\/><input type=\"hidden\" name=\"forid\" value=\"1\"\/><input type=\"hidden\" name=\"ie\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"oe\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"cof\" value=\"GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;\"\/><input type=\"hidden\" name=\"hl\" value=\"en\"\/><\/td>\n<\/tr>\n<\/table>\n<\/form>\n<p>&#13;<br \/>\n<\/center>&#13;<br \/>\n<!-- Search Google -->&#13;<br \/>\n<\/span><\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"22\">\n<div align=\"justify\"><span class=\"style7\">&#13;<br \/>\n                <font color=\"#FB7014\" size=\"4\" face=\"Tahoma\">How Spammers Fool Whitelists &#8211; And How to Stop Them<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"19\">\n<div align=\"justify\"><span class=\"style2\">by: &#13;<br \/>\n                <font size=\"3\" face=\"Times New Roman\" color=\"#FB7014\">Paul Judge, CTO, CipherTrust, Inc.<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<div id=\"article\">\n<td align=\"left\" height=\"12\"><span class=\"style2\">Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don\u0092t work anymore. &#13;&#13;<\/p>\n<p>Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be. &#13;&#13;<\/p>\n<p>One method used to combat spam is whitelisting. Whitelists are databases of trusted email sources. The list may contain specific email addresses, IP addresses or trusted domains. Emails received from a whitelisted source are allowed to pass through the system to the user\u0092s email box. The list is built when users and email administrators manually add trusted sources to the whitelist. Once built, the catch-rate for spam can be close to 100%, however, whitelists produce an inordinate number of false positives. &#13;&#13;<\/p>\n<p>It is virtually impossible to produce an exhaustive list of all possible legitimate email senders because legitimate email can come from any number of sources. To get around this difficulty, some organizations have instituted a challenge-response methodology. When an unknown sender sends an email to a user\u0092s account, the system automatically sends a challenge back to the sender. Some challenge-response systems require the sender to read and decipher an image containing letters and numbers. The image is designed to be unreadable by a machine, but easily recognizable by a human. Spammers would not spend the time required to go through a large number of challenge-response emails, so they drop the address and move on to those users who don\u0092t use such a system. &#13;&#13;<\/p>\n<p>Whitelists are only partially successful and impractical for many users. For example, problems can arise when users register for online newsletters, order products online or register for online services. If the user does not remember to add the new email source to their whitelist, or if the domain or IP address is entered incorrectly, the communication will fail. Additionally, whitelists impose barriers to legitimate email communication and are viewed by some as just plain rude. &#13;&#13;<\/p>\n<p>Whitelists are not widely used by email users and administrators as a primary tool to fight spam because of the high number of false positives, and the difficulties in creating a comprehensive list of email sources. Because whitelists are not widely used, spammers typically do not develop countermeasures. As with other spam fighting techniques, whitelists are most effective when used in conjunction with other anti-spam tools. &#13;&#13;<\/p>\n<p>The Solution&#13;&#13;<br \/>\n<br \/>When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.&#13;&#13;<\/p>\n<p><\/p>\n<hr size=\"-1\"\/>&#13;<br \/>\n About the author:<\/p>\n<p>&#13;<br \/>\n  Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry&#8217;s largest provider of enterprise email security. The company\u0092s flagship product, IronMail provides a best of breed <a href=\"http:\/\/www.ciphertrust.com\/products\/spam_and_fraud_protection\/index.php\">enterprise anti spam solution<\/a> designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting <a href=\"http:\/\/www.ciphertrust.com\/products\/spam_and_fraud_protection\/index.php\">www.ciphertrust.com\/products\/spam_and_fraud_protection<\/a> today.&#13;<\/p>\n<p><font size=\"-2\">Circulated by <a href=\"http:\/\/www.geekzonehosting.com\">GeekZoneHosting.Com &#8211; Register a domain name and get hosting for your own Adsense Website just like this one<\/a><\/font>&#13;<\/p>\n<hr size=\"-1\"\/><\/span><\/td>\n<p>&#13;\n            <\/p><\/div>\n<\/tr>\n<\/table>\n<\/div>\n<p align=\"left\">\u00a0        <\/p>\n<p>&#13;\n      <\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<\/table>\n<hr width=\"800\" noshade=\"noshade\"\/><a href=\"https:\/\/on-line-interactivity.com\/ADSENSEWEBSITES\">RETURN TO ADSENSE BUSINESS-IN-A-BOX MASTER ARTICLE INDEX<\/a><\/p>\n<hr width=\"800\" noshade=\"noshade\"\/>\n<div class=\"fb-share-button\" data-href=\"https:\/\/on-line-interactivity.com\/\" data-layout=\"button\" data-size=\"large\"><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fon-line-interactivity.com%2F&amp;src=sdkpreparse\" class=\"fb-xfbml-parse-ignore\" rel=\"noopener noreferrer\">Share<\/a><\/div>\n<p>&#13;<\/p>\n<div id=\"fb-root\"\/>&#13;<br \/>\n<script async=\"\" defer=\"defer\" crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v4.0&amp;appId=103650273035821&amp;autoLogAppEvents=1\"\/><!-- End of FACEBOOK SHARE BUTTON CODE --><span class=\"style6\"><br \/><span class=\"style2\">\u00a92019 - All Rights Reserved by <a href=\"http:\/\/HelpMeFindFreedom.Online\">HelpMeFindFreedom.Online<\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/span><\/span><\/div>\n<p>&#13;<br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; \u00a0 &#13; \u00a0&#13; &#13; &#13; &#13; Article Navigation &#13; Back To &#13; Main Page &#13; &#13; &#13; \u00a0 &#13; Click Here &#13; for more articles &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; How Spammers Fool Whitelists &#8211; And How to Stop [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6943","post","type-post","status-publish","format-standard","hentry","category-adsense-business-in-a-box"],"_links":{"self":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/comments?post=6943"}],"version-history":[{"count":0,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6943\/revisions"}],"wp:attachment":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/media?parent=6943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/categories?post=6943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/tags?post=6943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}