Handling SPAM

Well it’s not a new debate, thats for sure, and I have very strong views on this topic (especially blacklists and ISP’s restricting trade), as well as an approach to a new Protocol termed ‘Authenicated Mail’ or ‘amail’. I’ll need to put my notes on my blog one day.

The purpose for note, is the ongoing increasing spam and inappropiateness of mail that is coming to a general web accessible email address for a client.
I’ve proposed they move to a Challenge Response System for at least general listed email addresses on web sites. This will at least cut down the amount received at the mailbox, however it doesn’t eliminate the mail, the traffic, time, money and space used in mail.

What other approaches can you try. Well, not having a mailto link on your site is a good start. The use of an image to display an email address and not text is also a sound entry approach. I’d also recommend that for general web inquiries, you rotate your names, for example: website@domain.com , inquiries@domain.com , contactus@domain.com etc. As the address is only used on the website, changing the email, and turning the old name into an invalid mailbox will help.

I’ve also found another novel approach, this is the second time I’ve seen this. The website asks you to please add predefined characters into the subject line. Here’s and example.

http://r0.unctad.org/ecommerce/ecommerce_en/contact_en.htm

Tagged with: General

Related Posts

Creating a More Realistic Benchmark

Common benchmark approaches fall into two general categories, synthetic testing and realistic testing. You have the most generic operations from a synthetic test, starting with the most simple example using a single table, a single column, and for a single DML operation.

Read more

Testing, Benchmarking, Evaluating

Testing and benchmarking are widely used terms in software technology, each serving a distinct purpose and goal. With the increasing adoption of AI in software development, the term evaluating has become significant and with this the re-emergence of what is quality assurance.

Read more

Your Attack Vector Extends Beyond Production Systems

A common data security issue is the unprotected copying of production data to non-production environments without any redaction, masking, or filtering. This practice poses a serious risk. A malicious actor will target the weakest link in your infrastructure, including non-production accounts and the developer systems accessing them.

Read more