Steps to Reducing SPAM in Your Inbox

Spam first made its mark in the world in 1978 when Gary Thuerk, Marketing Director of Digital Equipment Technology sent an email solicitation to 400 employees at Arpnet. The email created a few sales, but it also created fierce backlash. Today, more than 180 billion spam messages are sent out each day to over 1 billion Internet users. This staggering statistic makes it clear why spam is such a major problem for Internet users. Many companies are working hard to solve the spam problem, but the first step to stopping spam starts with the consumer.

By following the steps below, Internet users can reduce the number of spam email messages they receive in their inbox.

Before an Invasion of Spam

Software:Choose email providers that offer built-in spam protection services. Look for service providers that promote a high success rate of blocking spam email.

Spam Filters:Spam is a cat and mouse game. Spammers are constantly looking for ways to bypass filters. Regularly check your spam filter software if you’re using non-web based email to make sure it is up to date. If you’re using web-based email,m make sure your webmail provider is working hard to protect you from spam.

Improve Security:A firewall may be one of the most important applications on a computer. It acts as a barrier between hackers and the computer, and prevents access to unauthorized information.

Limit Email Dispersal:When performing online transactions, thoroughly scan the page for any checked and unchecked boxes. Some companies will word these boxes in a way to increase the likelihood of a consumer opting-in to their email campaigns.

Shop From Known Vendors:Shopping from known vendors can greatly reduce the threat of spam email. Many companies are guilty of selling email addresses to third parties, which are then used for spam. The company’s privacy policy is supposed to list their intended uses of your personal information, such as whether they will sell your email address to third parties. Consumers can check the Better Business Bureau’s and the FTC’s (Federal Trade Commission) websites for lists of reputable companies and for lists of violators.

Once Spam Becomes a Problem

Internet users should avoid opening spam. It should be immediately deleted. Pay close attention to the senders email address as most spammers use deceptive subject lines intended to promote opening. If opened, avoid attachments, which may contain viruses, and do not purchase goods or donate to charities solicited in the message. Many spam email messages will have unsubscribe links at the bottom of the message, as dictated by the CAN-SPAM Act.

If consumers find themselves with an inbox full of spam, they can also report the spam emails to their Internet Service Provider.

There are numerous companies and organizations designed to regulate the Internet and protect users. But, it is important that Internet users are informed of the threats of spam. By following the stated suggestions and by not falling victim to the ploys of spammers, users can help put spammers out of business, and keep their inbox free of junk email.

Internet service provider

An Internet service provider (abbr. ISP, also called Internet access provider or IAP) is a business or organization that provides consumers or businesses access to the Internet and related services. In the past, most ISPs were run by the phone companies. Now, ISPs can be started by just about any individual or group with sufficient money and expertise. In addition to Internet access via various technologies such as dial-up and DSL, they may provide a combination of services including Internet transit, domain name registration and hosting, web hosting, and colocation.

How ISPs connect to the Internet

Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. In the simplest case, a single connection is established to an upstream ISP using one of the technologies described above, and the ISP uses this connection to send or receive any data to or from parts of the Internet beyond its own network; in turn, the upstream ISP uses its own upstream connection, or connections to its other customers (usually other ISPs) to allow the data to travel from source to destination.

In reality, the situation is often more complicated. For example, ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and have connections to each one at one or more of their PoPs. ISPs may engage in peering, where multiple ISPs interconnect with one another at a peering point or Internet exchange point (IX), allowing the routing of data between their networks, without charging one another for that data - data that would otherwise have passed through their upstream ISPs, incurring charges from the upstream ISP. ISPs that require no downstream and have only customers and/or peers, are called Tier 1 ISPs, indicating their status as ISPs at the top of the Internet hierarchy.
Routers, switches, Internet routing protocols, and the expertise of network administrators all have a role to play in ensuring that data follows the best available route and that ISPs can "see" one another on the Internet.

Virtual ISP

A Virtual ISP (vISP) purchases services from another ISP (sometimes called a wholesale ISP or similar within this context) that allow the vISP's customers to access the Internet via one or more point of presence (PoPs) that are owned and operated by the wholesale ISP. There are various models for the delivery of this type of service; for example, the wholesale ISP could provide network access to end users via its dial-up modem PoPs or DSLAMs installed in telephone exchanges, and route, switch, and/or tunnel the end user traffic to the vISP's network, whereupon they may route the traffic toward its destination.
In another model, the vISP does not route any end user traffic, and needs only provide AAA (Authentication, Authorization and Accounting) functions, as well as any "value-add" services like email or web hosting. Any given ISP may use their own PoPs to deliver one service, and use a vISP model to deliver another service, or, use a combination to deliver a service in different areas. The service provided by a wholesale ISP in a vISP model is distinct from that of an upstream ISP, even though in some cases, they may both be one and the same company. The former provides connectivity from the end user's premises to the Internet or to the end user's ISP, the latter provides connectivity from the end user's ISP to all or parts of the rest of the Internet.

A vISP can also refer to a completely automated white label service offered to anyone at no cost or for a minimal set-up fee. The actual ISP providing the service generates revenue from the calls and may also share a percentage of that revenue with the owner of the vISP. All technical aspects are dealt with leaving the owner of vISP with the task of promoting the service. This sort of service is however declining due to the popularity of unmetered internet access also known as flatrate.