ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

Did you know that there are software programs that view web sites and steal email addresses? It's called "harvesting" because they're harvesting your email address from your site. This may be one of the reasons your web site email address is receiving more s*p^a#m than wanted email.

When I first started teaching web design classes, I strongly suggested that students place their email address on each page - it makes your site a bit more "trustable." But it turns out this is just leaving you wide open to harvesting.

So now, what I suggest are links on each page directed to a single contact information page, where your email address is encrypted. If the s*p^a#mmers end up figuring out the encryption, it's still easier for you to change one page worth of information vs. many pages of information. Encrypting your email address makes the gathering process a little more difficult while it provides that legitimate email get through to you.

If you find that one encryption program has stopped working, see if the provider updated the code you were using (many provide regular updates) or change to another service.

Do you have PayPal payment or shopping cart links on your site? Up until about a month ago, the old PayPal coding included your email address. If you haven't upgraded recently, update your PayPal links to include the encrypted code they provide, too. Changing that code stopped quite a bit of unwanted email from reaching me.

Here are some helpful encryption program resources:

http://automaticlabs.com/products/enkoderform/
http://www.robertgraham.com/tools/mailtoencoder.html
http://natata.hn3.net/antispam_encoder.htm
http://www.tucows.com/preview/266685.html
http://innerpeace.org/escrambler.shtml
http://www.wbwip.com/wbw/emailencoder.html
http://w2.syronex.com/jmr/safemailto/

Encryption programs - A VERY good thing to use on your web site to reduce unwanted email.

? 2004 Maria Marsala, Business Builder and former Wall Street Trader. "Powering-UP service busine$$es and their owners". Providing articles, tips, classes, and business resources in our ezine "SIMPLE Business Steps" Learn more at http://www.elevatingyourbusiness.com

Airbnb cleaning service Arlington Heights ..
In The News:

Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.
Flying drones could help retailers fight a 93% increase in theft rates as Flock Safety promotes airborne security systems to track suspects and deter crime.
The Fox News Artificial Intelligence Newsletter brings you the latest news on the emerging technology every Saturday, highlighting top stories.
Hacker group Radiant stole data from 8,000 children at Kido nursery chain, demanding ransom and directly contacting parents with intimidation tactics.
As 18 states implement bell-to-bell cell phone bans, creative students use Google Docs, iMessage on MacBooks and Post-It notes to stay connected in class.
A sheriff's captain says deputies often spend hours writing reports between calls, but Axon's AI program, Draft One, helps them save crucial time in the field.
Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.

How To Stop Spam (Especially If You?re Already a Victim)

Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More

Sick Of Wading Through Spam?

It's a nightmare isn't it? You fire up your email... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Wiki Reek-y Havoc

The Vandals are coming! And this time they're after your... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

Avoiding the Spam Trap: Get Your Message Delivered!

Your message is not being delivered.If you send emails to... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

The 4 Ws of Junk E-mail

Junk e-mail or spam has become the scourge of the... Read More

Spam - Its Whats For Breakfast

The first thing I do every morning when I wake... Read More

Your Dolphin E-mail Caught In Spam Tuna Net?

Let me ask a couple of questions:If (potential) customers sends... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

reliable maid service Winnetka ..