Images Events Jobs Premium Services Media Kit Network Map E-mail Offers Vendor Solutions Webcasts
IT Management Webcasts:
The Role of Security in IT Service Management

Preparing for an IT Audit

More Webcasts

Search EarthWeb Network

Be a Commerce Partner
Car Donations
Phone Cards
Web Hosting Directory
Condos For Sale
Domain registration
Promos and Premiums
Calling Cards
Compare Prices
Memory Upgrades
Logo Design
Holiday Gift Ideas
Desktop Computers
Corporate Gifts

Linked Data Planet Conference & Expo

IT Management : Columns : Executive Tech: Can Antispammers Win the War?

Install What You Need with Windows Server 2008
Windows Server 2008 is Microsoft's most full-featured server operating system yet, so it's ironic that one of its most exciting new features is an install option that cuts out most of the other features. Paul Rubens explores why a Server Core installation makes a great deal of sense in many instances. »

Identify Hardware and Software That Meet Microsoft Standards
The "Certified for Windows. Server 2008" logo identifies hardware and software solutions that meet Microsoft standards for compatibility and best practices with the Windows Server 2008 operating system. »

Windows Server Catalog: Certified Hardware Devices
Search the Windows Server 2008 catalog to find solutions to deploy with confidence. »

Windows Server Catalog: Certfied Servers
Search the Windows Server 2008 catalog to find servers you can deploy with confidence. »

Download the Windows Server 2008 Trial
With Windows Server 2008 you can develop, deliver, and manage rich user experiences and applications, provide a secure network infrastructure, and increase technological efficiency and value within your organization. »

Related Articles
Vioxx Offers Topple Porn for Spam Crown
Protect Your Passwords -- Part 2
Protect Your Passwords -- Part 1
Hello 'Certified Server,' Goodbye Spam
- ITSMWatch Newsletter -
Tech Focus: Security

Cybersecurity: Laws Only Go So Far

Mozilla Firefox vs. Internet Explorer: Which is Safer?

Is Your Blog Leaking Trade Secrets?

The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?

Stopping Spammers at The Point of Sale

Product Watch
IOGEAR KVM - Includes Audio/Peripheral Sharing
Coverity Prevent / Coverity Thread Analyzer - Analyze Source Code For Defects, Security Vulnerabilities
USSD Series - SDRAM-Based Solid State Drives to 256 GB
UltraSMS - Send SMS From Your PC
Sentinel Sensors - Wi-Fi Based Temperature Monitoring Especially For Cold Storage

more products >>

Datamation Definitions
data mining
grid computing
network appliance
FREE Tech Newsletters

Case Study: Logistics Firm Improves Solution with HP All-in-One Storage Solution. Growing rapidly, Langham needed a disaster-recovery solution to improve system uptime and support continued expansion.

Can Antispammers Win the War?
February 1, 2005
By Brian Livingston

Brian Livingston The way things are going, it looks like spam will make up 99.9% of all e-mail before too much longer.

The onslaught of spam (and the viruses and spyware that it often carries with it) is turning a significant number of people away from the Internet. In a survey of U.S. consumers conducted by Osterman Research from Jan. 18 to 20, more than one-third (34%) said spam, spyware and related problems had reduced their use of e-mail or the Internet "a bit," with another 10% saying they'd reduced their use "a great deal."

According to the research firm's president, Michael Osterman, mail-monitoring companies say 88% of all e-mail in 2004 was spam. And estimates indicate that the figure will reach 92% in 2005. Hmm, does that mean we'll hit 100% by 2007?

But there may be some good news. Antispam experts attending a recent conference expressed some optimism that they may finally have some tools to dramatically reduce spam, if not eliminate it.

A Who's Who of Spam Fighters

The event was the second annual "Spam and the Law Conference," held Jan. 28 at a hotel near the San Francisco Airport. The roster of speakers included representatives of some of the biggest names in the spam wars:

Lisa Rosenthal, an attorney with the U.S. Federal Trade Commission, which she said had filed more than 60 lawsuits against spammers since 1997 — three of them since the so-called CAN SPAM Act went into effect Jan. 1, 2004;

Michael Grow, chair of the technology department of the Washington, D.C., law firm Arent Fox Kintner Plotkin & Kahn, who is credited with helping AOL convict notorious "spam king" Sanford Wallace in 1996;

Aaron Kornblum, an attorney for Microsoft Corp., which he said has filed more than 120 lawsuits since 2003, reaping $306 million in legal judgments (although Kornblum acknowledged that an "insignificant amount" of that has actually been collected from the elusive spammers).

Much of the conference focused on the same legal approaches to fighting spam that have been employed for years. But two aspects of the spam problem seem to lend themselves to new defenses, which may be more effective.

Catching Spammers in Four-Tenths of a Second

Matthew Prince, a cofounder of Unspam LLC, an antispam consulting service based in Chicago, described recent advances that he believes can identify spammers much more quickly than ever before.

Unspam, which I reported on in this space on Nov. 30, has massively expanded Project Honeypot, its program that generates unique, one-time e-mail addresses on Web pages around the globe. Spammers use harvesting software to collect addresses from pages at random. When an Unspam address is harvested, the organization makes a record to use against the spammer.

At the end of November, Unspam had planted only about 4,000 decoy addresses on the Internet. Since that time, however, the effort has exploded, growing to more than 32,000 addresses, according to a counter on the organization's home page.

Prince says his organization's servers are capable of notifying Internet services providers (ISPs) and others within 0.4 seconds of a decoy address receiving a message. Such a transmission could only have come from a spammer, since the address in question never signed up for any legitimate e-mail lists.

Unspam's online blocklist, known as HTTP:BL, will become available in spring 2005, Prince says. The list can be used by ISPs to disable accounts as soon as it's clear they're being used for spamming, Prince says.

Although many antispam experts have criticized the U.S. CAN SPAM Act as too weak, Prince notes that the act includes an absolute prohibition against two techniques spammers depend upon to acquire addresses in the first place. These are harvesting attacks, as described above, and dictionary attacks, in which spammers send messages to random addresses to learn which ones are active.

By linking pieces of spam to their original harvesting attacks, Prince argues, withering technical and legal measures can be brought to bear against spammers. CAN SPAM allows ISPs to sue spammers, with damages ranging up to millions of dollars and jail terms up to five years.

Make Sure Your Address Isn't in the Dictionary

A major change in the nature of spam, however, is making dictionary attacks more common than harvesting attacks, according to Andrew Oakley, technical architect for MessageLabs, a respected mail monitoring service based in London.

He reports that since more homes have broadband access  and more home computers are left on all the time  spammers now have access to far greater bandwidth with which to send spam. About 80% of today's spam emanates from home computers that've been infected with "zombie" software controlled by spammers.

As a result, Oakley says, many spammers no longer bother to harvest addresses from Web pages. Instead, they have enough raw horsepower to simply send spam to every name that might appear on the left-hand side of the "at" sign (@) of a major company's domain.

One company that recently asked MessageLabs for help, Oakley said, was receiving 30 million spam messages a day. That number dropped to a more manageable 100,000 a day when the company — which Oakley would identify only as a teen-lifestyle site — started filtering out mail to nonexistent addresses. The spammers were using a list of some 6,000 common names, 200 of which happened to match real e-mail addresses at the company, which used each employee's first name to form the addresses.

This kind of attack can be deflected, Oakley says, by configuring your mail servers to drop connections from senders who mail to a lot of addresses that don't exist. You should also make sure your e-mail addresses contain punctuation marks and don't include names and words that can be found in a dictionary.

The Race Goes To The Swift

Anne Mitchell, president of the Institute for Spam and Internet Public Policy (ISIPP) and sponsor of the conference, feels the problem of spam is not a hopeless one.

"I don't think anyone enters this room with a single plan to end spam," she says. "People know it has to be a multi-pronged approach." The solution to spam, Mitchell says, will be a combination of technology, legislation and education.

She points out that, although spam volume is increasing, she's seen anecdotal evidence that corporate workers are seeing less and less spam as filters become more effective and widely used. That doesn't keep spam from being sent in the first place — the senders are generating more mail just to penetrate the filters, Mitchell says — but it may be the beginning of the end of spam.

For more information on the ISIPP and the next antispam conference, see

Brian Livingston is the editor of and the co-author of Windows Vista Secrets and 10 other books. Send story ideas to him via his contact page. To subscribe free and receive Executive Tech via e-mail, visit our signup page.

Add to your favorites
Add to your browser search box
IE 7 | Firefox 2.0 | Firefox 1.5.x
Receive news via our XML/RSS feed

Executive Tech Archives



Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info

Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Advertise | Newsletters | Tech Jobs | Shopping | E-mail Offers

Whitepapers and eBooks
Microsoft Article: Will Hyper-V Make VMware This Decade's Netscape?
Microsoft Article: 7.0, Microsoft's Lucky Version?
Microsoft Article: Hyper-V--The Killer Feature in Windows Server 2008
Avaya Article: How to Feed Data into the Avaya Event Processor
Microsoft Article: Install What You Need with Windows Server 2008
HP eBook: Putting the Green into IT
Whitepaper: HP Integrated Citrix XenServer for HP ProLiant Servers
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 1
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 2--The Future of Concurrency
Avaya Article: Setting Up a SIP A/S Development Environment
IBM Article: How Cool Is Your Data Center?
Microsoft Article: Managing Virtual Machines with Microsoft System Center
HP eBook: Storage Networking , Part 1
Microsoft Article: Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
Intel Video: Are Multi-core Processors Here to Stay?
On-Demand Webcast: Five Virtualization Trends to Watch
HP Video: Page Cost Calculator
Intel Video: APIs for Parallel Programming
HP Webcast: Storage Is Changing Fast - Be Ready or Be Left Behind
Microsoft Silverlight Video: Creating Fading Controls with Expression Design and Expression Blend 2
Downloads and eKits
Sun Download: Solaris 8 Migration Assistant
Sybase Download: SQL Anywhere Developer Edition
Red Gate Download: SQL Backup Pro and free DBA Best Practices eBook
Red Gate Download: SQL Compare Pro 6
Iron Speed Designer Application Generator
Tutorials and Demos
How-to-Article: Preparing for Hyper-Threading Technology and Dual Core Technology
eTouch PDF: Conquering the Tyranny of E-Mail and Word Processors
IBM Article: Collaborating in the High-Performance Workplace
HP Demo: StorageWorks EVA4400
Intel Featured Algorhythm: Intel Threading Building Blocks--The Pipeline Class
Microsoft How-to Article: Get Going with Silverlight and Windows Live