• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

In this chapter, you learned how spammers determine whether email addresses are active and what steps you can take to prevent them from tracking your address. Although these steps don't prevent spam, they can be an additional line of defense in keeping your personal information out of the hands of email attackers.

You learned how spammers use Web bugs to track your email usage and gather demographic information about your email account. In addition, you saw how clicking links in email messages and using vacation responders without caution can add to your spam woes. Finally, you saw some examples of con games, such as trying to elicit a response or getting you to access an indirect email system.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint