Wednesday, March 13, 2019

Spam War

If you order your term paper from our custom writing service you will receive a perfectly written assignment on Spam War. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Spam War paper right on time.


Our staff of freelance writers includes over 120 experts proficient in Spam War, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Spam War paper at affordable prices!


Spam Wars



Half of all e-mail will be junk-costing billions and clogging the Internet. Spam is ultimately called a tragedy of the commons. It is more akin to the marketer who would mount loudspeakers on a vehicle and drive through your neighborhood at 00 A.M. blasting an advertisement. Or someone who would break into a TV or radio signal with his own broadcast or cable equipment in order to insert his advertisements. The counterattack has begun, software companies are rushing to build defense .


Key Points In The Article


Moore's Law (Gordon Moore) of microchip processing power the number of daily spam messages is doubling roughly every 18 months. To avert such catastrophe, electronic warriors are fighting the scourge of spam using three-principle tactic.


1.The rapid adoption of spam-blocking-and-filtering software by consumer, corporate networks and Internet service provider.


.Instituting more drastic changes in the way e-mail and the Internet work, perhaps imposing new costs to send messages or developing the ability to trace e-mail messages like phone calls.


.Involving not only better law enforcement and prosecution of spammers but even a ban on all unsolicited commercial e-mail.


An Anti-Junk Arsenal


The filter processes about 10 percent of the world's email flow.Junk e-mail operators use programs called spambots to register for thousands of free online e-mail accounts. It is not only harvest e-mail addresses posted on web sites but connect to the major Internet service providers and systematically send standard address verification request to guessed addresses.


Smarter Shields


When a user deletes several unopened messages about mortgage refinancing, for instance, a Bayesian filter learns to discard e-mail with that kind of terminology. If you typically do read such messages, however, the filter will take note of that and consider it normal e-mail. If everyone's filter has different probabilities of different messages getting through, it makes it harder for the spammers.


Crippling the Attackers


Blacklist are collections of Internet Protocol addresses, domain names and server farms that have been implicated in spewing spam; any mail originating from these tainted places will be blocked. Authentication based on domain identity with digital signatures should block spam attacks.


The Legal Front


Technology alone will never win the war. Fewer than 00 people send ninety percent of spam.Spam plague is a criminal-justice dilemma that can be eradicated only with active participation of legislatures and courts. US House of representative passed an anti-spam bill.


Critical Thinking Questions asked and answered


What is the real issue about spam?


Unsolicited Bulk E-mail (UBE) is a core problem. If we control UBE, there will be a meaningful impact on spam.


Why not Internet Service Provider block there spammer users?


In this down economy all telecomm companies are looking for potential customers. Spammer's are the premium customer for the most of the ISP.


How can e-mail address that's neither listed nor used start-receiving spams?


Slammer use Dictionary attacks to find e-mail addresses.


What are the ways of controlling spam?


1.Signature based filtering


.Collaborative filtering in which users vote on which messages constitute spam.


.Gateway corporate network that intercepts spam before it reaches desktops.


4.Heuristic or rule based content filtering in which a filter scans e-mail for junk mail tip-off terms.


5.Bayesian or probability based filtering that learns each user's definition of spam.


6.Circle of trust clearance, which only lets through e-mail from pre-authorized users.


7.Vaccination, which hides users e-mail addresses from spammers.


How Spam Spreading mechanism works?


1.Software systematically guesses e-mail addresses and opens a connection to an unsecured open proxy server


.The open proxy ser, which disguises the spammer's identity, relays requests for verification of each of the addresses.


.The open proxy server routes responses to the verification requests back to the spammer.


4.Software sorts the responses and adds the valid addresses to the spammer's mailing list.


What If We Just Do Nothing?


Spam has the potential to act as a denial of service attack against real mail. Real messages may easily get missed in amongst all the spam. Accounts may go over quota from spam, and begin bouncing all email. Spam sent to mailing lists you host may get sent on to subscribers, who may then unsubscribe from those lists.


Impact / relation to your organization/job


Mail blocking by imperfect mail filters causes significant losses to legitimate business use of email. Keeping in mind that much spam may contain particularly objectionable sexually related content which is against companies rules. Cost of fighting spam includes peoples time, hardware, software and services.


Recommendations


1.If spammers show up uninvited, then lets eliminate all mail that does not have prior permission, no matter how much such mail is a critical part of commerce and serendipity.


.If spammers use HTML content, then we must ban all HTML in e-mail.


.If spammers send mail about Viagra or pornography, then we must ban all mail that mentions these things, no matter the impact on free speech.


4.If we make sure that an e-mail sending host is properly identified, host identification is at the core of a number of popular proposals.


5.If we make sure that the author of each e-mail is properly identified. We could make every e-mail host identify itself, and we would still have masses of spam. We could require that message content be signed, and we would still have masses of spam. We can not eliminate all the spam, but we can control them down to an acceptable level.


6.There is no international law and we are never going to get all countries in the world to pass, and vigorously enforce, strong anti-spam laws. Spammers will mount their global attacks from whatever haven is available. Better laws will provide a clear, common, operational definition of spam, and better laws will provide meaningful guidelines for acceptable behavior. We need to build laws under World Trade Organization (WTO) umbrella.


7.Never respond to remove instructions unless you really subscribed to their list.


Summary


The junk in your mailbox is just the tip of that iceberg. Lying beneath the surface are the, guesses the spammer made to discover your mailbox. This is likely to grow worse as spammers work harder to get around anti-spam schemes. Spam is organized crime come to the Internet. Theyre just the first wave. Next will come the real, professional, marketers, the ones with the millions, and in some cases billions, of dollars in their ad budgets. We need a build, deploy and enforce anti-spam technogies.


Reference


Evan I. Schwartz (00, July/August). Spam Wars. Technology Review, 106(6), -.


Gordon Moore's Law, from http//www.intel.com/research/silicon/mooreslaw.htm


Please note that this sample paper on Spam War is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Spam War, we are here to assist you.Your cheap custom college papers on Spam War will be written from scratch, so you do not have to worry about its originality.


Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!