This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
How To Avoid Getting Scammed
by: Dean Phillips
Listed below are some of the most popular and common scams:

1. Nigerian Letter Scam:
This one's been around for many years but continues to flourish. Many of these e-mails claim to be from a person in Africa, usually Nigeria. The writer claims to have access to millions of dollars, either from a relative or from knowledge of an idle account. A percentage of this money is promised to the victim if they will allow the money to be processed through their personal bank account. The victim is instructed to keep their share and send the remaining money to the scammer.

The check given to the victims is fraudulent. The victim is then liable to the bank for the check they wrote to the scammer.

Here's what will happen when you give strangers your bank account information: They will take your money. Period.

2. Phishing Scams:
"Phishing" is a high-tech scam that uses spam or pop-
up messages to deceive you into disclosing your credit card
numbers, bank account information, Social Security number,
passwords, or other sensitive information.

Phishers send an e-mail or pop-up message that claims to be
from a business or organization that you deal with--for
example, your Internet service provider (ISP), bank, online
payment service, or even a government agency. The message
usually says that you need to "update" or "validate" your
account information.

Recent phishing victims include Yahoo, Citibank, eBay, Best
Buy and Bank of America among others.

If you get spam that is phishing for information, forward it to spam@uce.gov.

3. Chain Letters:
In this classic scam, you're asked to send a small amount of money (usually $5.00) to each of several names on a list, and then forward the letter including your name at the top of the list, via bulk e-mail. Many of these letters claim to be legal. They even include a section of the U.S. Postal Code on illegal schemes. Don't be fooled. They are not legal. And if you participate, not only will you be breaking the law, you'll lose your money as well.

4. Work-At-Home And Business Opportunity Scams:
These scams tempt victims with ads stating "no experience necessary," promise high earnings and claim to have inside information. The scammers usually require victims to pay anywhere from $35 to several hundred dollars or more for information, kits or materials that do not provide the promised results.

Frequently, these schemes involve making handicrafts, stuffing envelopes, medical billing, or state, "Use your home PC to make money fast in your spare time!"

In the craft making or envelope stuffing scam, after paying fees and completing the assembly of the products, victims are told their work is low quality and unworthy of compensation.

Medical billing scams require victims to purchase supplies and lists of doctors who, inevitably don't exist or are not interested in the service.

5. Bulk E-mail Scams:
These solicitations offer to sell you bulk e-mail addresses (spam software) or services to send spam on your behalf. Example: "Reach 100 million websites, $39.95"! The software is usually of poor quality. It's spam and a scam. Don't do it.

6. Auction and retail scams:
These schemes typically offer high-value items, such as Cartier watches, Beanie Babies and computers, in hopes of attracting many consumers. What happens is the victim wins the bid, sends the money and receives nothing or receives products of much lower quality than advertised.

7. Guaranteed Loans or Credit Scams:
This scam comes in a variety of flavors: home equity loans that don't require equity in your home, personal loans regardless of credit history, etc. After you pay the application fees, you receive a letter saying that your loan request was denied. Usually, you never here from these companies again.

8. Credit Repair Scams:
These scams promise to erase accurate, negative information from your credit file so that you can qualify for loans, mortgages, unsecured credit cards, etc. It doesn't work. Not only that. If you follow their advice and lie on loan or credit applications, misrepresent your social security number, or get an Employer Identification Number from the Internal Revenue Service under false pretenses, you will be committing fraud and violating federal laws. Another variation of this scam is the promise of a brand new credit file. Don't do it.

9. Vacation, Sweepstakes And Prize Award Scams:
In these scams you receive notification congratulating you because you've won a fabulous vacation, a car or some other prize award. All you have to do to collect your prize is pay a small fee (usually several hundred dollars). In return, what you end up getting is a toy car, (I kid you not) or a vacation certificate to the Bahamas or some other exotic vacation spot. It's really a lousy deal. You have to pay for your own airfare, and the accommodations that they arrange are usually in rundown hotels. Let the buyer beware!

10. Employment Scams:
Employment scammers take advantage of job seekers. They claim to offer employment services, inside information or inside contacts to jobs. After paying a fee, victims learn they only provide advice, help writing a resume--or less. Some fraudulent employment services simply sell lists of companies that they have gotten from public directories. They usually have not contacted those companies directly or know if there really are any job openings.

11. Multi-level Marketing (MLM) or Network Marketing Scams:
I know I'm going to ruffle a few feathers with this one, so let me just say right now that all MLM or network marketing companies are not scams. Obviously, there are some good, reputable companies out there. However, there are so many bad ones that I'm compelled to include the entire industry on this list. Before getting involved with any MLM or network marketing company, investigate, investigate and then investigate some more. Don't get caught up in the hype. And here's a fact no MLM or network marketing company will ever tell you--not even the legitimate ones: Unless you have outstanding sales ability and/or people skills, it is extremely difficult to make any money in MLM or network marketing.

Here are some other things you should watch out for: Make sure the website you’re visiting contains all three of the following:

1. A real persons name (not just a company or business name)

2. A telephone number

3. A street address (not just a P.O. Box)

If all three of the above are not present, walk away from the offer.

Before purchasing anything, you should always check first to see if the company has had any complaints lodged against it. The following websites publish complaints and/or scams:

http://www.scamwatch.com

http://www.worldwidescam.com

http://www.bbb.org

If you do get scammed, report it to the aforementioned websites immediately. You probably won’t be able to recover your money. Few people ever do. But at least by reporting the crime and making it public record, you make it harder for that company to scam anyone else.

In closing, always carefully investigate any business opportunity, and remember: If it sounds too good to be true, it probably is!




About the author:
Dean Phillips is an Internet marketing expert, writer,
publisher and entrepreneur. Questions? Comments? Dean can be
reached at mailto: dean@lets-make-money.net

Visit his website at: http://www.lets-make-money.net



Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

Spam Blocking Information

Read Articles:

11 Proven Methods For Maximizing Your...
What Is Spyware - An Overview Of Spy ...
The 10 Most Important Questions To As...
9 Steps to Protect your MS Windows Sy...
The Top Twelve Threats No Computer Us...
Tops in toolbars?
Does Your PC Have Worms?
So, Is It Possible To Earn Free Money...
How to protect yourself from online a...
The email blues
Tiscali Broadband
Anatomy Of A Reciprocal Linking Campaign
Do I Need an RSS Feed?
Banned By Google And Back Again.
My Top 10 Favorite Internet Tools
5 Good Reasons For Using Yahoogroups ...
What’s with all this fraud and theft ...
Predicting The Future Online
Amazing Explosive Ways To Turbo-Boost...
Are You A Spam Zombie?
What are the best strategies or ideas...
5 Linking Strategies that Work
The Money Keyword List - Superchrage ...
Honesty and the Internet
Simple Identity Theft Prevention
Niche Software Steals Microsoft's Thu...
Web Summary Authoring
The End of Spyware?
7 Great Tips on Driving Targeted Traf...
Your computer is infected with Spywar...
Increase in Customer Sales = Increase...
How to Avoid Problems and Errors of S...
Why offline advertising is so importa...
Keeping your pc healthy at little or ...
Finding An Internet Access Provider T...
5 Ways To Drive Visitors Away From Yo...
Internet ISP's
Spyware: What It Is and How to Combat...
Top 10 Tips for WinXP Users
How to Choose a Web Hosting Company?
Take back control of your inbox. Elim...
Malware: Computing's Dirty Dozen
Money Doubler Madness
M-Commerce Twice the Cash Value of E-...
Understanding the power of viral mark...
How To Use Spyware Elimination Software
Are Surf For Money Ventures For You?
BT Internet Broadband
Search Engine Placement - Most Overlo...
Simple Search Engine Optimization
Adware And The Case Against Bundled S...
An quick guide in Payment Processing ...
What is the Robot Text File?
Search Engine Optimization History
Reclaim Your PC from the Internet Spies
SEO And The Outsourcing Of Inbound Li...
Top Paying Keywords: How to Increase ...
Creating Online Communities
Professional Traffic Building Tips
Internet Scams 101 -- Attacking You T...
Uncle Sam Cracks Down Online!
What are doorway pages?
IT Support Services in London
5 Tips For An Unbreakable Password
Building Links To Your Site
Spyware Protection - The Only Way To ...
Registry Cleaner: Protection for Your PC
Shocking Facts about Updating Your PC...
Buying a laptop that you can use as a...
What To Look For In A Web Host

More Article Pages 1 - 2 - 3

Winning the War On Spam

For years I didn't worry much about spam.

But lately it's got out of control. Over half of my email is now spam, and it was growing by the week - until I took action.

This article shows you some strategies for winning the war on spam.

------------------------------------------------

How Do They Get Your Address?

------------------------------------------------

In the old days, spammers got their addresses mainly from Newsgroups - if you didn't post to Newsgroups, you were reasonably safe. But they're now using a much more efficient method to build their lists - email harvesters.

Email harvesters are robots that roam the Internet collecting email addresses from web pages. Examples are EmailSiphon, Cherry Picker, Web Weasel, Web Bandit and Email Wolf, to name just a few.

How can you protect yourself from email harvesters?

By 'munging' (mung = 'mash until no good') or cloaking your email address.

There are many ways of munging your address - the easiest technique is to use ASCII code for the punctuation in your email address (instead of symbols).

For the colon after mailto use : and for the @ symbol use @ and for the period use . . With this method, your email address would become:

mailto:yourname@yourdomain.com

but it will display as:

mailto:yourname@yourdomain.com

Your email address will appear exactly as it did before, and it will still be 'clickable', but email harvesters will ignore it and move on.

There are also JavaScript's that you can insert into your web page that will make your email address visible to humans but invisible to harvesting programs. Here's one that works very well: http://pointlessprocess.com/JavaScripts/anti-spam.htm

-----------------------------

How To Fight Spam

-----------------------------

The most important thing is never, ever, reply to spam.

Most spam contains an innocent-looking 'remove me' email address. Do not use it. Here's why:

Spammers typically buy a CD containing a million or so email addresses, but they have no idea how many of those addresses are active. So before beginning their marketing campaign in earnest, they send out a 'test message' to the entire list.

The test message contains an email address for removing yourself. When you reply to that address, it confirms to the spammer that your address is active and therefore worth spamming.

Worse still, the spammer may be distilling from that CD a list of confirmed active addresses that he will then sell to another spammer.

The key to dealing with spam is to report it to a 3rd party: (1) the affiliate program that the spammer is advertising, (2) the spammer's web host, or (3) the ISP the spammer used to connect to the Internet.

When you report spam to a 3rd party, remember to be polite - they didn't send the spam and they're probably just as anti-spam as you are.

(1) Reporting to Affiliate Programs

Many spammers are affiliates advertising someone else's products or services. So look for a website address that contains an affiliate link, something like this: www.affiliateprogramdomain/841526

Then just send an email to the affiliate program (abuse@affiliateprogramdomain.com), informing them that you are receiving spam from one of their affiliates.

Most affiliate programs have zero tolerance for spamming and will remove an affiliate spammer without warning.

Now, affiliate spammers don't want you to see their affiliate link, so many of them send their email as HTML. All you see in the message are the words 'Click Here and Order Now'.

But in your browser just click on 'View Source Code' and search for the letters 'http'. That will take you to the spammer's affiliate link.

(2) Reporting to Web Hosts

If the spam doesn't contain an affiliate link, it's likely that it is coming from the owner of the domain name. In that case you'll have to report it to the spammer's web host or their ISP.

To make a report to the spammer's web host just go to Whois, the directory of registered domain names: http://www.netsol.com/cgi-bin/whois/whois

Type in the spammer's domain (the website address that appears in the spam) together with the extension (.com, .org, .net etc).

The host for that domain will usually be listed as the Technical Contact in the Whois record and there will be an email address for contacting them.

(3) Reporting to ISPs

To report a spammer to his Internet Service Provider, you'll have to look at the spam's 'extended headers'.

Extended headers show the servers that the message passed through in order to get to you. The instructions for viewing extended headers will vary depending on what email client you are using.

=> In Pegasus Mail, open the offending message and then

right-click and choose 'Show raw message data'.

=> In Eudora Light, click on 'Tools' in the top menu

bar, and then 'Options', and then select the

checkbox option that says 'Show all headers (even

the ugly ones)' and click OK.

=> In Outlook Express, open the offending message,

select 'Properties' from the File menu and then

click the 'Details' tab.

Reading and understanding extended headers is quite a detailed subject. Here's an excellent free tutorial on how to decipher extended headers: http://www.doughnut.demon.co.uk/SpamTracking101.html

As an alternative to these reporting techniques, you could use a web-based spam reporting service such as SpamCop (www.spamcop.net). SpamCop deciphers the spam's message headers and traces the mail back to its source.

Wishing you every success in the fight against spam!

------------------------------------------------------------
Michael Southon has been writing for the Internet for over 3
years. He has shown hundreds of webmasters how to use this
simple technique to build a successful online business. Click
here to find out more: http://ezine-writer.com/
------------------------------------------------------------


 



©2005 - All Rights Reserved

JV Blogs Visit free hit counter