[Copyright 2002,2003,2004 Frank Durda IV, All Rights Reserved. Mirroring of any material on this site in any form is expressly prohibited. The official web site for this material is: http://nemesis.lonestar.org Contact this address for use clearances: clearance at nemesis.lonestar.org Comments and queries to this address: web_software_2011 at nemesis.lonestar.org]
Spam and other Internet abuse is created by a relatively small number of
individuals. However, spam and other abuse is allowed
(or at least passively accepted) to be generated or relayed by the vast
majority of Internet Providers, and the senders of spam are frequently
encouraged (or at least the spam is passively accepted) by the
vast majority of Internet Customers. These two factors are the main
reasons why the volume of spam keeps growing.
If Internet Providers took action to deny the technical ability of their customers to spam and to prevent spammers located elsewhere from exploiting the Internet Providers network, and if both Internet Providers and Internet Customers made an effort to reduce or eliminate the financial gain of sending spam, these actions would do far more to eliminate spam from the Internet than anything else.
The following pages provide general and specific technical recommendations that will prevent spam and other forms of abuse. For Internet Providers, details on how to configure servers and networks to prevent spam and abuse are provided, along with suggestions on what corporate processes and policies are needed by all Internet Providers in order to maintain control of their own networks, something that they can easily lose through legal injunction.
For Internet Customers, there are specific suggestions on how to prevent spam, to negate the value of spamming, and to prevent your own computers from being exploited by spammers and hackers.
Section 1: The Internet Customer Anti-Spam Creed (HTML)
Words for the Internet Customer to live by.
Section 2: The Internet Providers Anti-Spam Creed (HTML)
Words for the Internet Provider to live by.
Section 7: Internet Provider Anti-Spam Mail Server Configuration (NOT YET AVAILABLE)
For the spam that gets past your fortified network (the recommendations made
in Section 6) and some spam still reaches your mail servers, improved checking
and filtering on your mail servers can keep most spam from reaching any
mailboxes.
This information is provided by the author and contributors "AS IS" and any express or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the author or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods of services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this information even if advised of the possibility of such damage. There is no obligation to provide any form of support, updates or assistance, and such queries may not receive any acknowledgment.
[Copyright 2002,2003,2004 Frank Durda IV, All Rights Reserved. Mirroring of any material on this site in any form is expressly prohibited. The official web site for this material is: http://nemesis.lonestar.org Contact this address for use clearances: clearance at nemesis.lonestar.org Comments and queries to this address: web_software_2011 at nemesis.lonestar.org]
Visit the nemesis.lonestar.org home page and index