Its hard to prove spam sending from blog The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
Its hard to prove spam sending
Hello all,
Without going in to detail, I know it is going to be hard to prove spam sending. I know of somebody who is now accusing someone of sending spam out in regards to Asian dating, and probably other stuff.
Here is a contact form I received through MENVI, and I know my MENVI members wouldn’t send such a thing.
Below is the result of your feedback form. It was submitted by
(
)
on Sunday, June 23, 2019 at 10:55:43
—————————————————————————
name: JamesPax
City_State_Province: Rajkot
country: India
Phone: 81588552378
contactmethod: Please contact me by telephone
contact: Please have Janet Quam: assistant webmaster) to contact me
reporting_bug: No, I’m not reporting a bug with the web site at this time
reporting_bug_Yes: Rencontrez des filles sexy dans votre ville:
http://xurl.es/bhld3comments: Rencontrez des filles sexy dans votre ville:
http://xurl.es/bhld3submit: Submit comment or question to the MENVI contact team
—————————————————————————HTTP_USER_AGENT: Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36
REMOTE_ADDR: 185.130.184.216
Informazioni sull'articolo
Its hard to prove spam sending was released on June 23, 2019 at 12:00 pm by tech in article commentary.
Last modified: June 23, 2019.
Comments (2)
-
Comment by tech date 24 June 2019 alle 14:46 (),
I never finished this article. I was going to continue it, but published it and never finished it. The fact that spammers are utalizing forms, and even with Captcha which is recommended for me to put in, I refuse to do it as its not accessible, and spammers are finding ways to bypass it too. I just deal with it. But with the accusations of someone sending spam to someone when they may not have even done it, without proof, its going to be a really long fight. I don’t know why I published the post like that, I was in mid thought but just posted it as it was, maybe to prove a point. The headers when I look at them show its from my script, so, there’s nothing more I can do besides sending them to the provider that tracks the IP, but that hasn’t helped.
-
Comment by crashmaster date 24 June 2019 alle 14:23 (),
To be honest, a spammer doesn’t have to hack someone’s email to send an address, there are sites and ways to make things look like its from a person without it being like that.
The telltails are the headers which are utter junk but who actually does that user wize I certainly don’t.
Anyway unless you get hacked yourself, you really don’t notice.
A friend has had his address spoofed, he wasn’t hacked, but someone got his address and he noticed the headers were garbage.
It could be a similar address to.
There are lagit services to spoof your addresses which just makes it doubly hard.
These services used to be more important before email encription but there are like vpns still a point where you may wish to mask your email id being that email addresses, addresses themself and contact info location are generally public affairs anyway.
Spammers don’t usually do this generally but it still can happen.
The chances are that if you get spam from someone and it looks like them they could be hacked but if not sure look at the headers and well if they are junk then they are probably just getting their email address harvested.
If you don’t respond they will use another address its the easiest way to handle it.
I have never got accused of spamming anyone though I know a few that have to the point they have had to change internet providers, and or web hosts because they believed they were right and wouldn’t budge even down to killing content.
In my own experiences, I had my dad’s address get used for spam except the address was slightly differently spelt, contact info was used, but it was traced back and handled properly.
My grandpa got some person calling him claiming him to be hacking her system.
It drove my poor old grandpa off the net, he threw away his computer, and his mobile phone and simply stopped talking on the phone that much it ended him, maybe that was the intent.
Once I got someone trying to hack my system, but the trace had the guy’s info, service, etc and I was able to contact the isp with the information and they acted immediately.
I have had an attack aparently either my ms or google account and changed all passwords though it was total noncence and could have been a lagit system accessing the account.
That sort of brings me back back to the data article breach just posted and the password article last week.
Its all well and good giving up hard drives and other storage for the cloud, less failier unless loss of the net or power but there are to many issues with the cloud speed of storing and retrieving not withstanding.
The same is with passwords to.
Rely on one or 2 services and these services get quite smart and powerfull.
There are people saying google and chrome and other such companies spy on users.
With 99.9% of all information even so called private information being public now thats a given, we post our lives online as iit is and maybe to much but still the cat’s out the bag and it aint going back in.
For the services I get my information even if I get a lot of adds is fine, especially if say its something I need or would like in the future.
Getting addicted to shopping and gaming is an issue but you have to manage it, easier said then done but its just another thing to take with the digital age.
One thing not discussed is if the net dies, and you still need access to the data, you can’t.
Next, not everything we have is totally legal.
Even if it was how do you proove it is.
There is nothing stopping company x handing my data to every copywrite holder and terrorist looking for agency at all.
Computer ai still fucks up more than all those big companies would ever admit to and this is known.
Then who’s data is it.
Yours obviously, but if we take the law of the land its whoever has it and whoever you share it with, probably could take it and who knows what would happen then.
The cloud is nice, but I still will take a drive breakable that it is over full trust of the net.
I will not cry wolf like a few old privacy people are doing, privacy went with the event of twitter, get used to it!
Ransomware seems to be dropping, having backups is fine but if they are all online, and if it all ends that way, we will have to pay those crims to keep our data no matter how we do it.
Even with all the security, if I was a hacker, I would try to take down google, lastpass or something like that.
All that data is a dangerous target.
I’m by no means saying don’t, I just think we shouldn’t jump in before we know what we are jumping into.
We should remember that the net can be a dangerous place.
We should also remember that for all we do, as users, businessmen and even those in government that the net is bigger than us.
We have heard about the dark net, and how dangerous that is, but I still believe the net like any citty still has some more unknown places, places that may have secrets.
And the net may or may not give them up, some we may like, and some maybe fine.
But the rest, who knows.
One thing that concerns me of late is all the cyber warfair going on.
If we attack others, for whatever we don’t sing about it, if they attack us, we go home crying to our muthers.
With all that seems to be going on, I actually suspect that none of us, users and others alike know how to use the net effectively.
I also know that the net that we use is only a little bit of the net, like our own town or our own house or street.
I don’t know if we will ever use all of the net effectively but who knows.
The way things seem to be going in the world, in 10 years it may not even matter, maybe less than that.
Leave a comment
You must be logged in to post a comment.
navigation menu
- Archives
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
- The tech blog’s pages
- Blogroll