The Evolution Of Spam

And now – you're among the lucky recipients chain letters. At the dawn of mass mailings they were simple emails, advertise any goods or services. From the beginning they were not desirable because the compulsive Marketing, though bearing fruit, but most repellent. In recent years the scale of the spam mailing is truly amazing. Along with an obsessive supply of goods and services – is now the content of spam messages can contain harmful information one way or another aimed at the commission of unlawful acts against the recipient. The word spam is originally from spiced ham (English – "spiced ham").

Is a registered trademark Company Hormel, which has a 1937 on the stock got a huge amount of illiquid third grade of meat packed in tins. The Corporation has entered the American market and literally subsided entire stock of U.S. Army which in turn also failed to "overpower". And under the terms of the Lend-Lease this "spam" was handed over to the British. Thus was born the concept of providing unnecessary.

" The network she got a second life. Until 1994, the Internet was Academic Network for professors and graduate students. The commercial sector has come to the Internet until much later. Networking spam started coming in conferences UseNet, which are available to private ads in the branches of the discussions. However, such announcement did not reach their destination – administrators are often removed them faster than they have been read by participants in the discussion. Britons in the late 80's got just a huge number of letters in their mailboxes.

Microsoft

Law 4. If an attacker was able to download the application your Web site, it's no longer your web site In fact, I would have such a law is removed. Web site – this is also a computer and the Act repeats the law number 1. But apparently this is quite an important point, since Microsoft has made a separate item. And as recommendations – all web sites is better to keep at home, rather than from 'unknown', even 'very reliable' ISP. Only in this case, we can guarantee at least some security. Law number 5. Weak passwords make useless any security system is really so.

For each password should apply rule 3 of 4 (where 4 – is 4 types of characters: lowercase letters, uppercase letters, numbers and special characters) and have a minimum length of 8 characters. In this case, the password can to know only one person! owner login. (In some companies, even the administrator, there are separate lists of users with all the passwords, and these lists of 'lying' to 'very safe' place, including, for example, on the FMS … which is easy to lose. And on the other hand if you have a password on a web server, 'Doe' coincides with the password to Exchange – OWA … then your password is already aware that most 'Doe' as mimnimum. Since these passwords are very hard to remember, and over time their accumulates a lot, you can use special programs such as RoboForm, to store passwords in an encrypted form.