14.5. Fighting Email PestsAs helpful and convenient as the Internet can be, it's also a fairly lawless land. Email has become a tool of sleazy, shady individuals, so treat all messages from strangers with a skeptical eye and a cautious mouse. Many of the programs mentioned in Chapter 21 can help protect you and your computer from two of the Internet's biggest infectious parasites: spam and viruses.
14.5.1. SpamBecause it's inexpensive and efficient, email is a great communication tool for people to keep in touch with each other, but those qualities also attract people trying to make a buck. Unsolicited email ads have increased exponentially since email first began to gain traction in the 1990s. Junk mailbetter known as spam now constitutes 80 percent of the messages sent around the Internet. Note: The term spam comes from a famous Monty Python sketch about a caf menu that features spam in just about every dish (" Lobster thermidor aux crevettes with a Mornay sauce served in the Proven §ale manner with shallots and aubergines, garnished with truffle pat , brandy and with a fried egg on top and spam ") and Vikings who nonsensically sing the word over and over. (Get it? They drown out the legitimate conversations going on around them.) Most spam messages are designed to hawk products of questionable legality (bootleg software, pharmaceuticals , and so on), and come in such volume that your mailbox can easily get flooded in a single day. Other forms of junk mail may be from sites or services you've used on the Web, but forgot to uncheck the box next to the "Send me information about special offers" when you signed up to download that free media player or program update. You may even get junk mail the first day you open your email account. Spammers use programs that crunch through millions of potential variations of email addresses, and then spew messages to those addresses whether they're real working addresses or not. (Why not? It's free.) Even though laws have been passed against sending spam, tracking down the perpetrators is difficult because most return addresses are forged (also referred to as spoofed ). Worse, many messages begin, or are routed through, other countries , where U.S. laws have no leverage. Spam can also contain viruses sent by people who would love nothing more than to plant a program on your computer that lets them control your machine from afar. Once spammers plant a control program on your PC, they can turn your machine into a relay station that secretly shovels out even more spamright over your own Internet connection. You don't even notice except perhaps for the fact that your PC seems to be getting slower in its old age. Here are some ways to cut spam out of your mailbox's diet:
14.5.2. VirusesEmail viruses have found a friend in spam, and some criminals are using the blended threat of unsolicited mass mail with a virus payload tucked inside the message. Email viruses, like Melissa in 1999 and ILOVEYOU in 2000, used infected attachments to propagate themselves to every email recipient in a computer's address book, destroyed files, and shut down entire office networks. New Windows viruses are turned loose every day. Many viruses appear to be coming from people you know (they snatch addresses from your address book), so the old advice to open attachments only from acquaintances isn't entirely foolproof. The best way to stay safe is to be alert and keep your Windows antivirus program up to date. Many of the Internet security suites mentioned in Chapter 21 include spam filters along with antivirus and antispyware components . They're designed to separate the wheat from the spam-encrusted virusesand catch them if they happen to escape onto your computer. If you use the Internet frequently, installing protective software is becoming almost mandatory for safe online computing in general. The ones that smack down spam make life online a little bit better. |