Oracle Consulting Oracle Training Oracle Support Development
Home
Catalog
Oracle Books
SQL Server Books
IT Books
Job Interview Books
eBooks
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
image
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
 Phone
 800-766-1884
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books
image
image

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle

STATSPACK Viewer

Privacy Policy

 

   
 

ss

Oracle Tips by Burleson 

Web Stalkers
Chapter 13 - Spam, Spam, Spam, Spam

An Alternative View of Spammers

The loss of privacy was not part of the deal for those patrons who were kind enough to take the time to complete the survey in the first place.  To make matters worse, the lack of response from the restaurant when the problem was brought to their attention showed a serious lack of concern for their patrons e-mail security.  Despite repeated attempts to resolve the problem, it took several months of dealing with management before similar e-mails were stopped.  

Learning More about Spam

It may help to know more about the way e-mail works in order to understand how spammers use it effectively.  Figure 13.6 below is a representation of a popular e-mail scam.  This category of fraudulent spam is known as a phish-scam.  It is designed to convince the recipient that they have been contacted by a major financial institution with important business to conduct. 

The sender of the message does not know anything about the recipient’s actual financial status or where they have accounts.  The scammer is playing a game based on percentages.  They know from experience that a certain number of people will accept the message as legitimate and respond to the message accordingly.  This will always have negative results for the unsuspecting victim, since the goal is to extract actual financial information from the target recipient.

Once information is released, such as bank account numbers or credit card information, the scammers will empty accounts or run up charges to the limit.  Users must be vigilant.  This sort of information should never be exchanged via e-mail.

Figure 13.6 - Phishing scams will appear to come from a legitimate company.


The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert
 

http://www.rampant-books.com/book_2004_2_stalkers.htm


Download your Oracle scripts now:

www.oracle-script.com

The definitive Oracle Script collection for every Oracle professional DBA

Linux Oracle commands syntax poster

ION Oracle tuning software

Oracle data dictionary reference poster



Oracle Forum

BC Oracle consulting support training

BC remote Oracle DBA   

 

   

 Copyright © 1996 -2016 by Burleson. All rights reserved.


Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks