• 91000000
  • فارسی
  • Charge ADSL2+
  • Contact Us
  • Join Shatel

Client Area
  • Home
  • Services
    • ADSL2+
    • VDSL
    • Voice (Phone) Service
    • Broadband Services
    • Point-to-point Connection Services
    • Special services for tower blocks and apartments
    • Shatel Mobile
    • Data center Services
    • Shatel security solution for Android
    • More
  • Shatel in Provinces
  • Support
    • Support Services User Guide
    • Smart Technical Support System
    • Traffic Usage Management
    • MyShatel Application
    • Download Speed Test
    • Claim SLA violation compensation
    • Online Tutorial Videos
    • Educational Content
    • Questions & Answers (Q&A)
    • Security Tips
    • Download Center
    • More
  • About Shatel
    • Shatel at a Glance
    • Mission and Vision Statement
    • beyond business
    • The Road to Excellence
    • Shatel Academy
    • Safe Shatel
    • More
search ...
Home » Technical Support » Educational Content » What is spam?
More Info

What is spam?

Dear subscriber,
Shatel Company plans to take new measures to prevent increasing problems and interferences that are caused for networks by spams.
If you use internal MailServer to send emails, click here to change your SmartHost server settings. To apply these measures, the send email port (25) will be closed and users will need to use Submission Port (TCP587) to send their emails through Microsoft Office Outlook, Outlook Express, Thunderbird, and so on.

Note: If you use Web Browser to connect to sites like Yahoo, Gmail, Hotmail, etc., in order to access your email service, you will not need these settings!

Note: Users who use SMTP / POP3 settings to access Gmail do not need to make any changes!
To use these measures and to avoid potential problems, and if you use the mail client to send emails, it is required to make necessary changes in settings for sending emails. You can refer to mail client setup guide for more information on this. If you encounter any problems, contact Shatel Technical Support department.

Note: Settings for receiving emails do not require any changes!
In addition, it should be noted that new measures are just about sending emails and do not apply to other Shatel services. If you wish, you can learn more about SPAM and the problems it causes by reading the following.

Identifying Spam
  • If you have been using the Internet for a long time, you have probably already received a large number of unwanted emails (Unsolicited Bulk Email). Some claim to make you rich quickly. The rest promise new products or services. Some occupy a space in your mailbox and ask you to send the email to others or visit a specific website. In the online community, unwanted e-mails (sometimes commercial) are called spam. Spam is more than a nuisance to Internet users and seriously affects the efficiency of the network and email servers. This is because it costs spammers very little to send hundreds of thousands or even millions of emails at once. Spam attacks take a lot of bandwidth, fill in mailboxes, and waste e-mail readers’ time. Sometimes you can recognize spam by their strange, irrational, and ridiculous subject lines. The table below shows the percentage of emails that have been recognized as spam over a one-year period broken down by month.
    Percentage of all emails known as spam
    March 2004 63%
    February 2004 62%
    January 2004 60%
    December 2003 58%
    November 2003 56%
    October 2003 52%
    September 2003 54%
    August 2003 50%
    July 2003 50%
    June 2003 49%
    May 2003 48%
    April 2003 46%

    As stated in the table, in the first months of 2004, nearly 63% of all sent emails were spam. This number reached 83% in 2005. Other statistics show that spam emails are 10 times smaller than ordinary emails in size; however, in 2005, every day 2.5 TB of spam was sent, which is astounding in its own right.

    Imagine there are only 15,000 Internet users, and each one gets 50 spam emails every day. Now we assume that scanning and deleting every spam takes only 2 seconds. This means just wiping off the spam takes users more than 2,500 hours per week. However, the actual figures were higher than the above example and are growing every day.Now, it’s clear how these unwanted emails affect the productivity and effectiveness of Internet users.

    In addition, another important point about spam is its inappropriate content. Spam is sometimes used to spread viruses, Trojans, and spyware.

Definition of Some Terms
  • SMTP: The Internet uses the Simple Mail Transfer Protocol (SMTP) to send email messages. This protocol was designed many years ago, when the Internet was a much smaller and friendlier network than the current one, which is why it is weak in terms of security. One of the main weaknesses of this protocol is that it’s easy to hide the sender’s identity.
  • Open Relays: This term refers to Mail Servers, which allow Spammers to send spam through these servers and hide their identities due to weaknesses in the design or configuration of the Mail Server.
  • Bot: Bot is an abbreviation for Robot. This term refers to a computer that is used to send spam (Relay). A computer is converted to Bot when it is infected by a Virus, Trojan Worm or Trojan Horse which are designed to install Backdoor on the system. Backdoor is a program that allows spammers to have access to and control the system, and then spammers use the system to send spam. One of the most common and effective methods spammers use to send spam is first they infect the computers of a great number of internet users by spreading Virus and Spyware on the Internet, and then, in their own methods, detect and control infected computers. Thus, they start spamming from computers in many parts of the world (most of them personal computers connected to the Internet via DSL lines). This is how every day a huge amount of spam is being sent from PCs in to the Internet world. It’s clear that great volume of spam can be reduced through applying several simple policies and managing emails sent from personal computers.
    If the volume of emails sent from PCs that are connected to the Internet is not controlled, serious risks will threaten internet users and service providers.Personal computers connected to the Internet that are controlled by spammers or unauthorized persons are called zombies or botnets.
    Every day, more than 80% of the spam is sent by Zombies.
Fight Spam
There are different methods to fight spam. However, it can never be claimed that spam has stopped completely. For example, we can refer to methods including Blacklisting, Heuristic Filtering, White Listing, Throttling, SPF (Sender Policy Framework) and so on.
However, in recent years, the focus has been on fighting spam at the source, which is very effective in its own way. One of these methods is Port 25 Blocking, which is explained in the following lines.Internet users normally deliver their email to MailServer and then send their emails through it. In this method, sending email should be done through the Submission Port (tcp 587). (RFC 2476).Therefore, there is no reason for ordinary users’ computers to be directly connected to port 25 of the Internet servers and send data. Statistics indicate that most personal computers directly connected to port 25 of Internet servers are infected and abused.It is worth mentioning that a very small percentage of this type of connection (connection to port 25) of personal computers is also due to incorrect settings and that users are unaware of the existence of Submission Port, which causes them to send their email to their email server via Port 25 instead of Submission Port.One of the most effective spam prevention methods that has been in place in many countries in recent years is to prevent Zombies from sending spam. For this purpose, access to port 25 from personal computers is blocked by Internet service providers, which of course, does not cause any internet interruptions.
Tips on Email
  • Do not give your email address to others with no reason:
    Email addresses have become so common that you can notice a specific field for your email address on all forms that collect your personal information. A large number of people record their email address everywhere and in all forms without considering the potential risks.
  • Examine Confidentiality Policies:
    Always ask yourself if you are recording your email address on sites that are trustable or not. You must, before sending your email address or other personal information, read the policies announced by the site, and find out what the owners and / or site authorities are about to do with the information you provide them with.
  • Be careful with the options that are enabled by default:
    When you “Sign In” for a new service or account, there may be a part that will provide you with a set of options for receiving emails on new products or services. In some cases, options are selected by default. So if you leave them in the situation as they are, in future, you will receive a great number of electronic mails that you may not expect.
Using Filters
      A large number of mail programs have the ability to filter. This will allow you to block certain addresses or to receive mail only from the contact list on your computer.

Never click on the links in Spam Emails:
Some spam sources attempt to authenticate an email address by sending a variable of email addresses in a particular Domain. (For example, identifying valid email addresses on Hotmail or Yahoo). If you click on a link sent by a SpamEmail, unwanted messages including the tempting “unsubscribe” link, you are in fact letting them use this tool to ensure that your email address is valid. (By clicking on these links, you will ensure the Spammer that in addition to receiving the spam email, you have read the content!)

Disable automatic download of graphics in HTML formatted emails:
A large number of companies send HTML formatted emails with a graphic link, which is used to track the person who has opened the electronic message. When your email client application downloads a graphic file from the server, they will know that you have opened the electronic message. By disabling HTML Mail and viewing messages in plain text format, you can avoid this.

Creating additional new accounts:
A large number of sites are offering email addresses for free. If you are constantly using email (for online shopping, receiving service, etc.), you may have to create another account in order to protect your primary account against spam. Additionally, you must use another account when you send information on to online news bulletins, chat rooms, public mailing lists or Usenet. Thus, you can create an appropriate level of protection against receiving spam on your primary email address.

Do not send spam to others:
Be a committed and responsible user. Act rigorously about messages that you intend to forward. Never forward a message to all contacts in your address book, and if someone asks you not to forward a message to them, respect them and their request.

 

TECHNICAL SUPPORT

  • Support Services User Guide
  • Smart Technical Support System
  • Traffic Usage Management
  • MyShatel Application
  • Download Speed Test
    • Speed Test Results
  • SLA Request
    • SLA Implementation Procedure in Shatel
    • Rules of Communications Regulatory Authority
  • Short Audio Files (Podcasts)
  • Educational Content
    • What is spam?
    • Practical Commands
    • Differences between Bit and Byte in Calculating Internet Speed
    • Modem Auto Configuration
  • Q&A (Questions & Answers)
  • Security Tips
    • Mikrotik Router Security Tips
    • Important Security Tips for Gmail Users
    • Security in Internet Browsers
    • Wireless Security
  • Download Center
  • About Shatel
  • FAQ
  • Voice of Customer
  • News
  • Online Chat
  • ADSL2+ Speed Test

Copyright © 2020. SHATEL

  • FCP License No. 100-94-15
  • Complaints