Wednesday, September 16, 2009

EMAIL SECURITY, PC SECURITY »

How to Protect an Email Account from SPAM
Thu, 6/08/09 – 17:07 | No Comment
Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.
What is SPAM?
Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.
Where do these SPAM come from?
These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.
Why do spammers SPAM?
The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.
Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising [...] Continue Reading…
Popularity: 21% [?]
ShareThis
A Virus Program to Disable USB Ports
Sun, 19/07/09 – 17:42 | 15 Comments
A Virus Program to Disable USB Ports In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with …
ShareThis
How to Compile C Programs
Sat, 18/07/09 – 20:41 | 14 Comments
How to Compile C Programs In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source …
ShareThis
Domain Hijacking – How to Hijack a Domain
Fri, 3/07/09 – 17:39 | 5 Comments
Domain Hijacking – How to Hijack a Domain In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the …
ShareThis
Cell Phone Spy – How to Spy on Cell Phones
Sun, 21/06/09 – 22:10 | 13 Comments
Cell Phone Spy – How to Spy on Cell Phones Cell Phone Spy – How to Spy on a Cell Phone

Are you curious to know how to spy on a cell phone? Do you want to secretly spy on SMS text messages, calls, GPS locations and other confidential …
ShareThis
Which Spy Software to Choose?
Fri, 5/06/09 – 11:17 | 25 Comments
Which Spy Software to Choose? Today there exists hundreds of Spy softwares available on the market. Because of this huge diversity of choice, people often get confused about which spy software to choose. Also because of this confusion there is no …
ShareThis
Tips to Find Unauthorized Activity on Your Email Account
Wed, 27/05/09 – 11:46 | 11 Comments
Tips to Find Unauthorized Activity on Your Email Account Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have …
ShareThis
How to Find the IP Address of a Remote Computer
Thu, 7/05/09 – 22:27 | 59 Comments
How to Find the IP Address of a Remote Computer Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. …
ShareThis
Speed Up PC – Top 5 Ways to Speed Up Your Computer
Mon, 20/04/09 – 19:48 | 16 Comments
Speed Up PC – Top 5 Ways to Speed Up Your Computer 5 Best Ways to Speed Up your PC
Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up …
ShareThis
A Closer Look at a Vulnerability in Gmail
Thu, 9/04/09 – 17:56 | 16 Comments
A Closer Look at a Vulnerability in Gmail Gmail is one of the major webmail service provider across the globe. But as we all know Gmail still carries that 4 letter word BETA. Sometimes we may wonder, why Gmail is still in the …
ShareThis
How to Make a Trojan Horse
Sun, 5/04/09 – 18:41 | 81 Comments
How to Make a Trojan Horse Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple …
ShareThis

2 comments:

  1. How to Make a Trojan Horse

    http://www.itilam.com/2017/04/what-trojans-are.html

    ReplyDelete
  2. Easily Boost Your ClickBank Commissions And Traffic

    Bannerizer makes it easy for you to promote ClickBank products by banners, simply go to Bannerizer, and get the banner codes for your chosen ClickBank products or use the Universal ClickBank Banner Rotator Tool to promote all of the ClickBank products.

    ReplyDelete