Oracle Consulting Oracle Training Oracle Support Development
Oracle Books
SQL Server Books
IT Books
Job Interview Books
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle


Privacy Policy




Oracle Tips by Burleson 

Web Stalkers
Chapter 13 - Spam, Spam, Spam, Spam

Using Spam Control Programs

As might be expected, there are various techniques employed by anti-spam programs to achieve the goal of reducing spam.  One method defines a list of words that are often used in spam messages and then scans the incoming e-mail for those words.  If a message contains too many of the words on the list, the message will be identified as spam and then dealt with accordingly.  A second method compiles a list of known spam senders and automatically deletes any message received from a target address.

Both methods have their limitations.  The word list variation is particularly weak for two primary reasons.  First, the word list rule is extremely easy for spammers to get around.  All that is necessary to skirt the word list filter is to modify a word in any way that obscures the ability of the filter to identify it as a target word.

This is, in fact, the same method introduced earlier as a way to make an e-mail address non-machine-readable.  For example, the sender of spam e-mail targeting dog owners may choose to use the representation “d0gs” when the word dog is intended. The meaning is clearly communicated, and the spam filter cannot pick up the target word because it is not present.  There are thousands of variations on this theme that are used every day to defeat word list spam filters.

The second primary weakness of the word list filter method is that it is impossible to identify words that will appear exclusively in spam messages.  A spam message highlighting a pornographic website may contain the word “breast.”  A word list spam filter configured to delete messages containing the target word would indeed deal with the incoming spam; yet, it would also delete a message regarding a local fundraising event for breast cancer research.

The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert

Download your Oracle scripts now:

The definitive Oracle Script collection for every Oracle professional DBA

Linux Oracle commands syntax poster

ION Oracle tuning software

Oracle data dictionary reference poster

Oracle Forum

BC Oracle consulting support training

BC remote Oracle DBA   



 Copyright © 1996 -2017 by Burleson. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks