navigate site menu

Start learning with our library of video tutorials taught by experts. Get started

Managing Spam Essential Training
Don Barnett

Managing Spam Essential Training

with Bill Weinman

 


Unwanted email has grown increasingly common and sophisticated. It now includes not only unsolicited commercial messages, but also fraud schemes, identity theft attempts, and dangerous attachments. Because the majority of this mail is now sent from virus-infected computers, many of the strategies that worked to combat spam a few years ago have become less effective. In Managing Spam Essential Training, William E. Weinman describes the state of spam today, shows how to recognize the various types, and explains the dangers they present. He also shares techniques for ensuring that legitimate email continues to get through, and offers up-to-date strategies for reducing the amount of junk email received at important addresses.
Topics include:
  • Defending against "phishing" attacks (identity theft) Identifying 419 scams, malware, and more Setting up spam filters and block lists Sorting spam from legitimate email daily Using tagged or separate addresses for different situations Being a good email citizen

show more

author
Bill Weinman
subject
Business, Email
level
Appropriate for all
duration
1h 17m
released
Sep 05, 2008

Share this course

Ready to join? get started


Keep up with news, tips, and latest courses.

submit Course details submit clicked more info

Please wait...

Search the closed captioning text for this course by entering the keyword you’d like to search, or browse the closed captioning text by selecting the chapter name below and choosing the video title you’d like to review.



Introduction
Welcome
00:00E-mail is an amazing thing. You can write a letter to someone and they can
00:03receive it almost instantly or not, their choice. No interruption like with the
00:08telephone, no stuffing an envelope or finding the correct postal to running to
00:11the mailbox. It's just there. Amazing but it's not all kittens and
00:15marshmallows either. Along with all that convenience we get spam, lots and lots
00:20of spam. Some of us get many times more spam than legitimate e-mail.
00:24In fact we sometimes lose the mail we want because of the defenses we set up to
00:28deal with the spam that we don't want. That's why I recorded this course.
00:32I am Bill Weinman and I have been involved in the battle against spam since
00:35about 1995 as a programmer, author and as the owner/operator of a hosting
00:40company and e-mail services provider. You should be able to get your mail with
00:44as little fuss and bother as possible. I can't end the spam for you but I can
00:48give you a set of tools to help you manage it without losing the power and the
00:52enjoyment and the wonder of your e-mail. You should be able to easily get the
00:56spam out of the way so you can have the mail you really want and it's my
00:59intention to give you the tools you need to do just that.
Collapse this transcript
1. What Is Spam?
What this course covers
00:00In this course, we are going to about what is spam, then we want to make sure
00:04that we have our definition straight, we want to make sure that we are talking
00:07about the same thing. That when I am talking spam, you know what it is I am
00:10talking about and you are not thinking that it might be in some other form of
00:13spam and we'll cover the different ways that people use the term a little bit
00:17and exactly what it is that we mean or what it is that I mean when I talk about
00:21spam in this course.
00:22We will talk about why do spam happen and also how does spam happen. This is
00:28really two sides of the same coin I found in my research-- I have been
00:31researching the subject for a number of years-- that there's both a
00:34technological and a sociological reason for spam. The technological being the
00:40how it happens and the sociological being why it happens. In fact, things like
00:45spam have been going on for many years even before we had computers and networks.
00:49We will talk about how to manage your spam and we will show examples in a
00:53number of popular e-mail programs including Microsoft Outlook, Entourage, Apple Mail
00:59and Thunderbird. In fact, we are going to do a lot of the examples in
01:03Thunderbird because it's free, it's open source and it's available on all the
01:06popular computing platforms including Windows, Macintosh and even Linux.
01:13We will talk about how you can reduce spam, not just how you can reduce the
01:16spam that you receive although we will cover that but also how you can reduce
01:20the spam that you send and you might be saying to yourself "Well, I am not a spammer."
01:23 and most of us are not spammers. But we do things that sometimes are
01:27spam-like and that might be received as spam and it might actually get caught
01:31in people's spam filters and prevent our e-mail from being received. So we will
01:35talk about how we can reduce this and how we can be better citizens of the internet.
01:40Finally, how you can get involved, how you can get involved in the effort to
01:44reduce spam worldwide and across the internet. These are the subjects that will
01:49be covered in Managing Spam Essential Training.
Collapse this transcript
What is spam?
00:00Spam is a term that's tossed around a lot. It can mean a lot of things.
00:05It's often used to refer to any communication that a person just doesn't want, even
00:10if it's not in violation of any rules in particular. For our purposes, for the
00:14purpose of this title, it needs to be a specific thing and so we are going to
00:20take a moment and define it.
00:22First off, the lawyers at Hormel say it's okay to use spam to refer to the
00:27stuff on the internet as well as the stuff that comes in the can as long as you
00:30only use it in all caps for the stuff in the cans. So you see here on the
00:35screen that SPAM is in all caps and that is the name of the canned meat product
00:39from Hormel and the can looks like that and it's got the word SPAM on it all in
00:42capital letters.
00:44For the purposes of the internet, spam is anything that is repeated over and
00:48over again and it's substantially the same as it's repeated. It might have a
00:52word here or a word there different or something like that. So this was applied
00:56to a lot of repeating things and then somebody came up with the idea of sending out
01:00bulk e-mail to lots of people advertising their products and of course this
01:04got called spam because of this usage of the word spam on the internet by
01:09the geeks who like Monty Python.
01:10So spam came to mean anything that's repeated over and over usually in
01:15one-to-many communication. One-to- many communication being things like chat rooms,
01:19of course e-mail when it's sent to multiple addressees, IM, the cellphone SMS.
01:25 I don't know if you have received cellphone spam. I have. It's a pretty
01:29annoying thing and it really shocked me the first time that happened because it
01:32actually costs the recipient money, especially in places other than US. I know I
01:37get a few free SMS messages with my plan, but in Europe and in Asia and in
01:42other places in the world you don't get any and they don't have bulk SMS plans like that.
01:47For the purposes of this title, spam refers to specifically e-mail spam, what I
01:52call Unsolicited Bulk E-mail. Some people use the term Unsolicited Commercial E-mail.
01:57It means pretty much the same thing. I say bulk instead of commercial
02:02because now and then you get some spam that's not commercial in nature. So for
02:06the purposes of this title e-mail spam is the focus and I sometimes refer to it
02:11as UBE or Unsolicited Bulk E-mail.
Collapse this transcript
The impact of spam on users
00:00Why do I care about spam? Why should I care about spam? What's the matter with
00:04deleting a few extra messages everyday? I get a few extra messages that I don't want,
00:08I just hit Delete. Why is it this has to be such an issue? There are a
00:13number of costs directly and indirectly that can be attributed to spam.
00:17The amount of times spent wading through your unwanted e-mail. For a lot of people
00:21that's not a lot time, it might be just a few minutes a day or few minutes
00:25every time you check your e-mail. Of course that adds up over the course of time.
00:29But for most people that probably seems like it's just an annoyance. On the
00:33other hand there are people like me who get a tremendous amount of e-mail
00:36everyday and a tremendous amount of spam. The number of spam messages that I
00:41get per day amounts to the thousands. Over the course of a week, it adds up to
00:46about 6 gigabytes of mail and because of that this represents a significant
00:51time investment every day. It takes me 30 minutes, sometimes an hour just to
00:55deal with the spam in my e-mail everyday.
00:58First, I have to go through my inboxes and my various places that I receive
01:01mail and mark as spam all of the messages that are spam, that are not messages
01:06that I actually have asked for or want. Then I have to go through the spam
01:12mailboxes and deal with what's called the "false positives", the messages that
01:15got marked as spam that are not actually spam because of my spam filters and
01:20over time because of the way that spam works,
01:22the spam filters have to become trained and how this happens is by dealing
01:27with the false positives and the messages that did not get caught and marking
01:30those as spam and then going through the spam boxes and finding the messages
01:33that are actually are not spam and marking those as not spam and this is just
01:36a fact of life in dealing with e-mail for somebody like me who gets lot of e-mail,
01:41that some of the mail that is actually for me is going to accidentally
01:44get marked as spam for some reason. A lot of mail that is not for me is going
01:48to end up in my Inbox and is going to have to get marked as spam.
01:50This takes a certain amount of time every day and because of the volume of spam
01:55that I get, and a lot of people like me, I can't use a free e-mail service.
02:01Well I use Gmail for some of my mail because they have a high enough limit but
02:05I have to use a hosted mail solution for the bulk of my mail which I spend a
02:08few hundred dollars a year on because that can handle the volume that I was not
02:13able to handle with a free e-mail account and so these are real costs to
02:18somebody who gets a lot of mail.
02:19Well, there are other costs to people who are in the general public who don't
02:25actually get a lot of mail and might not be associated with spam. One of the
02:28largest of these is what's called Phishing with a ph, which is a major source of
02:33information for the people who steal information for identity theft purposes.
02:37A Gartner Research Study that was done just this past December found that in the
02:41year 2007 about 3.6 million adults lost money to phishing attacks. Phishing
02:48attacks are these e-mails that you get that look like they are from a bank or
02:51look like they are from PayPal and want you to log in for some nefarious
02:54purpose and people, the first time they see one of these, they are surprised.
02:58They log in and they find that their information has been stolen. The total
03:02cost of this in the year 2007 according to the study by Gartner Research was
03:05$3.2 billion. That's money that regular Joes like you and me lost because of
03:11these phishing attacks.
03:13These are real costs to the user, to the recipient of the e-mail, to the person
03:17who is just trying to keep in touch with grandma or their boss or their clients.
03:22These are real costs and these are reasons that we need to be
03:25concerned about the problem of spam.
Collapse this transcript
The impact of spam on ISPs
00:00Spam has a significant impact on the ISP and e-mail providers as well. This is
00:06something that's a little bit hard to believe but it's true. The majority of
00:09the bandwidth on the internet is spam. It's not web traffic, it's not video,
00:15it's not file sharing, it's e-mail. And the majority of e-mail that's sent over
00:2190% by most estimates is spam. The ISP of course has to pay for their bandwidth
00:28and the fees that we pay to our providers, our hosting providers, our ISP that
00:34puts the DSL into our house or our business, we have to pay their costs and the
00:40reason that the prices are where they are is mostly due to spam.
00:45The majority of e-mail labor is devoted to spam and in a lot of places
00:49especially a company like AOL or like Yahoo where such a significant amount of
00:55what they do is e-mail related, this is going to be the majority of their
00:58technical labor is devoted to dealing with spam. These are the people who
01:03maintain the spam filters, they maintain the equipment, they maintain the routers.
01:07All of these things have huge impact from the amount of volume of spam
01:12and a lot of this effort goes to reducing the amount of spam that ends up in
01:17your mailbox.
01:18If all of these efforts were to go away, you would probably be receiving a 100
01:22times as much spam as you do or more. These companies constantly have to invest
01:29in new technology for managing spam. This is what I call the Whack-A-Mole effect.
01:33 If you have ever been to an arcade and you have seen this little game
01:36where the little moles pop up out of the holes and you hit the little plastic
01:39mole with a hammer and it pops up out of another hole,
01:42this is how the spam problem looks to the technology professional because we
01:47might come up with some clever-- I say 'we' because I have been involved in this.
01:51We might come up with some clever way to detect that the message is spam,
01:55I mean that it's not real mail or vice versa.
01:58So these spammers, they of course learn about this technique and they adjust
02:02what they are doing so that it is no longer susceptible to that technique.
02:07This is why you see things like Viagra spelled with a 1 instead of an I. It's a very
02:11simple example of that or why you see these spam messages that will have a
02:15paragraph of nonsense at the top or at the bottom. They are trying to get
02:19around the filters, they are trying to make it look like regular mail and so
02:23the ISP has to constantly be investing in new technology, coming up with new
02:27technology and purchasing new technology so that they can manage this problem.
02:32So spam is actually a huge cost center, often the largest cost center in an
02:37internet provider or a service provider or an ISP.
Collapse this transcript
The impact of spam on the internet
00:00Largely because of the impact that has on us personally and the impact that has
00:04on the providers, spam has a large footprint. A large impact on the internet as
00:10a whole. Of course, there is the increased cost for everyone and this is
00:13because of the cost bandwidth, because of the cost that we talked about in the
00:17impact of spam on the ISP. We all end up paying for that.
00:22There is also impact on the complexity of e-mail systems in general. The e-mail
00:27system as we know it and the protocols behind it were designed to be incredibly
00:31simple, in fact the protocol that we use to exchange e-mail on the internet is
00:36called SMTP, which stands for Simple Mail Transfer Protocol. It was designed to
00:41be a simple.
00:42Most of the complexity that has grown and been added to this protocol and the
00:48other protocols involved over the course of time have been because of spam,
00:52because of what the designers of these protocols call e-mail abuse. Because of
00:57these protocols have been used in various ways that they were not designed to be,
01:01 new features and new barriers had to be designed into them to combat this
01:07problem and so they become more complex and as result of this increased
01:11complexity they have become less reliable and a lot more expensive to run.
01:15Additionally, another impact on the Internet as whole, we often find there is
01:20delays in doing the things that we want to be doing or need to be doing on the
01:24Internet. These bandwidth bottlenecks as they are called are often caused by spam.
01:30 By the sheer volume of it, by the incredible complexity of the networks
01:34required to move that much information and also by what's called Denial of
01:39Service or DOS attacks; DOS, Denial of Service.
01:42Denial of Service attacks are sometimes intentional, sometimes they are not
01:46intentional. But the way that they often happen is someone will decide to send
01:50a huge amount of spam to one particular machine or to a series of addresses
01:55like what happens at AOL, where all of these multitude of addresses have to go
02:00through one set of machines or one part of the network and these bandwidth
02:04bottlenecks will often shut things down entirely.
02:07Another way that this happens is if someone sends out a lot of spam, say 10's
02:11of millions or 100's of millions of messages with a particular return address on it,
02:15 which is of course forged, and all of the bounce messages and all of the
02:18complaints about that mail will get returned to that one address and that will
02:23often times shut down services, sometimes for an entire company, sometimes for
02:28whole segment of the Internet, sometimes for a whole city or a whole part of a country.
02:33All because there is so much volume of traffic going to a one particular place.
02:37These are called Denial of Service attacks. They are a real problem. There is
02:40something that the providers on the internet have to deal with and they impact
02:44all of us because the things that we want to get to all of a sudden become
02:47unavailable because of these bottlenecks. So for those of us who receive spam
02:52for service providers like ISPs and hosting companies and for everyone who has
02:55any kind of an online presence, spam is something that you just have to pay
02:58attention to. You just have to give it some energy now and then and this makes
03:03it more than just a nuisance. This makes it a cost center for all of us.
03:06This makes spam a real problem.
Collapse this transcript
Why does spam happen?
00:00So why does spam happen? Spam happens basically because it can. There are
00:05people who believe that because something is free or appears to be free or is
00:10in their perception, that that gives them the right to exploit it to their own
00:13advantage and so there is the number of ways in which these people do this.
00:18The obvious one is people in businesses who are trying to sell something. They
00:21see the internet as a giant low cost advertising opportunity and they believe
00:26they are entitled to exploit it for that purpose and so they send out these
00:29millions of messages trying to sell you whatever it is that they have to sell,
00:32which were usually the sorts of things that you are not going to find in the
00:35reputable shops anyway. Or they are opportunist looking for money. They have get
00:39rich quick schemes, they have various stocks scams like the the pump-and-dump stock
00:43scams where they will send out an e-mail with a particular stock and get lots
00:47of people to buy them and pump up the price and then dump theirs.
00:50There is the 419 scams, the advance fee fraud scams where they will try and get
00:54you to send them some money for the various fees that they are going to get $30 million
00:58out of a bank for you, pyramid schemes. A lot of these things are
01:01things that we used to see in the postal mail, before the internet was open to
01:05the public and we have got these pyramid letters and the 419 scam and all of
01:10these various things used to happen in the postal mail. That used to cost
01:13postage. To send out a few 100 of them cost a quite of bit of money and now
01:17they can send out a few million for a little or no money. So these things are
01:21proliferated and we don't see them in our postal mailboxes anymore. We only see
01:24them in our e-mail boxes now. Or they are the botnets, which are the way that
01:28the spam is sent these days. They are these automated networks of compromised
01:33computers that have been compromised with a virus.
01:35The purpose of the virus is to install the software on your computer, which
01:39will then make your computer part of the network of machines that send out the
01:43spam by remote control. These are called botnets. The botnets themselves, they
01:47expand their own networks, they get more computers infected by sending out spam
01:53that entices you to click on a link that installs the various virus software
01:56and Trojan horse software into your computer to make your computer part of the botnet.
01:59This is another common reason for spam.
02:02Identity thieves looking for personal information. These are called phishing
02:05attacks and we will talk about that later in great detail. But these are forged
02:10messages that look like they are from your bank or they look like they are from
02:13PayPal or eBay or something and then they entice you to go to a counterfeit
02:17web site and then typing your password or your credit card number or your
02:20social security number and they steal your identity and start draining your
02:24bank account.
02:25These spammers themselves looking to expand their list, so often times, you
02:29will get messages that may seem empty or have no obvious reason for existing
02:34and the whole reason was to see whether not the message would bounce, so that
02:37they can expand their list of targets.
02:40So the things that all these reasons for spam have in common, is that there is
02:44a free or apparently free or close to free way to send out a lot of e-mail and
02:49that this can be exploited to the advantage of the spammer. Some of these are
02:54extremely illegal, some of these are obviously illegal, some of these are more
02:58on the border or may appear to be illegal. They are just selling you
03:01something that may or may not be on the fringe.
03:03But what all these things have in common is that their opportunities to exploit
03:08the meaning of the internet for the personal advantage and as long as that
03:12opportunity exists, as long as that reason exists and there are people out
03:15there who feel that they are entitled to take advantage of it,
03:18spam will continue to exist.
03:20So any solution to the spam problem is going to have to address this, which I
03:24called the sociological side of the problem as well as the technological side
03:28of the problem and we will talk some more at other time about the technological
03:31side of the problem.
Collapse this transcript
2. Examples of Spam
Identifying commercial spam
00:00In this chapter, we are going to look at some actual examples of spam. We are
00:05going to look at different categories of spam, some different types of spam and
00:09reinforce the admonition not to respond to spam because responding to spam
00:13encourages more spam, which is bad. So we are going to start out here by
00:17looking at some commercial spam, this is one of the more common forms of spam
00:23and here we have a folder with a few examples in it, this one here is for fake watches.
00:29In this spam, we will notice a few things. First of all, its objective is to
00:33entice you to go over to their web site and buy some fake watches. This link
00:37here to some unpronounceable domain name, if one were to click on it, which of
00:42course you are not going to do because that would be bad. Their browser would
00:45automatically be redirected through a circuitous route to get ultimately to
00:49whatever web site it is that they want you to get to where you would buy some
00:53replica watches or they would try to sell you some replica watches. The reason
00:56that it's this unpronounceable domain is so that when that domain gets shut down,
01:01which inevitably it will and probably has already by the time I am recording this,
01:05then their main web site can still go on and they can send out bazillions more
01:09spam messages with another fake web site and it would get redirected through
01:12a circuitous route to their main web site. So their main web site is somewhat
01:16isolated and will not get shut down because of course they know what they are
01:20doing is frowned upon and it's against the terms of the service of whatever
01:23service providers they are using for these various web sites.
01:27Also we will notice in the addressing that this address and this address and
01:31this address don't exist. These are a couple of specific purposed addresses
01:35that are used to use which I can't really use very much anymore because they are
01:39mostly flooded with spam. But the point here is they are phishing for new
01:44addresses to send spam for. This is called a Dictionary Attack where they just
01:47make up words or they make up names and they just send out the spam in the
01:51hopes that you know some very itty- bitty, small fraction of them will get
01:55through and ultimately they hope to find out which ones got through to get a
02:00record of it. Of course, they will get bounce messages for the ones that fail hard.
02:03I have a few of my domain names opened up to allow this so that I can get
02:07examples of it in my anti-spam work. Also we will notice in the Subject line
02:14that the way that it's spelled this 'O' for the word 'over' is actually a zero and
02:183-O-O for three hundred, those zeros are actually letter O's. The 'S' is a dollar sign
02:27and the 'W' is very cleverly disguised as a pair of slashes. The purpose
02:31of this is so that you can get past the spam filters. Obviously some of the
02:35more rudimentary spam filters, they look for specific words and hopefully for
02:41the spammer, they won't find those specific words if they are spelled with
02:44symbols that may visually look like the same thing, are similar enough that your
02:48eye will be able to read it.
02:51But from the perspective of the spam filter they are not precisely those
02:55characters in the character sets and would be able to get past some of those
02:59spam filters. So this is one example of commercial e-mail. This is an ad for
03:05replica watches or fake watches. This one here is an ad for fake degrees where
03:12you can get a genuine university degree in 4-6 weeks, which of course if that
03:16were possible the university degrees wouldn't be worth anything anymore.
03:21This one does not have you responding by e-mail at all, doesn't have you
03:24following a link to a web site but rather uses a phone number and it's not even
03:28an 800 number, its a local number for somewhere. Somebody told me what area code
03:32that is but it's just a local phone number and again they don't need a lot of
03:36responses. They are sending out bazillions of these, if they get only get some
03:39very small fraction of a percent of response then it's going to be worth their while.
03:43So again, don't call the phone number. That would be bad. And finally this one
03:49here is fake meds or something like that and this is interesting for some other
03:54reasons. Notice, again we have the weird unpronounceable domain name which will
03:58get redirected some place. Notice that the message itself is very brief.
04:04"Save! Save! Save! Top Selling Medications." And then there is this long bit of
04:09gobbledygook gibberish that doesn't actually mean anything. But it's a bunch of
04:12words that you might find in a business communication. Representation,
04:17transmit, entropy, multiplied.
04:19The purpose of this is to get past a very specific type of spam filter that's
04:24becoming the most common type of spam filter. It's called a Bayesian spam filter.
04:28We are going to talk about that a little bit more in a later lesson but in a
04:31nutshell, a Bayesian filter uses a method of looking at the message and deciding
04:36if it has enough words and phrases and patterns that you would find in a common
04:42not-spam message or enough of words or phrases and patterns you would find in a
04:45common spam message and it will sort them out that way to decide if i's spam or
04:50if it's not spam. So by loading this message up with a lot of gibberish that
04:55might look to a Bayesian filter like a standard business communication,
04:59the sender of this particular example of spam hopes to get past those Bayesian
05:05filters and to end up in the Inbox instead of the spam box. So again these are
05:08the kinds of things that you see in these messages and one final note, notice
05:12that this one has what we call a Remove link or an Unsubscribe link.
05:16Don't click on that either. What happens when you click on that link is that you will
05:20get to a page and it will say that you are unsubscribed and thank you for
05:23whatever. But in actuality, you have told them that you looked at the message
05:28and your e-mail address has now become more valuable to them.
05:32By opening up the message and actually looking at it enough to find the
05:36remove link or the unsubscribe link, you have told them that you are paying
05:39attention and that's all they really want. They know that if you look at it
05:43that much, that if they were to keep sending you a hundreds and hundreds and
05:47hundreds and hundreds more messages they may finally, eventually get some
05:50message that makes you want to buy something. Again, only it has to happen once
05:54out of hundreds or thousands of messages for it to be worthwhile to
05:57them because it doesn't cost them any more to send 20 million messages than it
06:01does for them to send 1 million messages.
06:04As a result they don't need much of a response rate and so by clicking on this
06:08remove link your e-mail address becomes more valuablee. They can sell it at a
06:11premium and you will in fact end up getting more spam, not less spam. So these
06:16are some examples of some commercial spam and in the other videos in this
06:21chapter we are going to look at some other categories of spam as well.
Collapse this transcript
Identifying 419 spam
00:00I have also got another category of spam, which is called 419 spam. It's also
00:05called Nigerian scam spam or Nigerian spam. It's also called advance fee fraud.
00:11It's named 419, because that's the section of the Nigerian criminal code that
00:15makes this all illegal in the Nigeria, and the reason that's relevant is that
00:19for many, many years, the vast majority of these scams came out of Nigeria.
00:24It was invented there. It was run for many dozens of years by postal mail before
00:28there was email. Even though it's been heavily outlawed there, it's still to
00:33this day is one of the highest sources of revenue that the country of Nigeria has.
00:38So most of these come from Nigeria. I think this one claims to be from Bulgaria
00:43or something, but you know notice those addresses in here, is this a Brazil
00:46This is a Japan address. They tend to try to obscure their
00:50location until they get somebody on the hook. The way this scam works is,
00:55somebody writes you a very flowery letter. They all tend to have very flowery
00:59language in them, and that's some how traditional for these. I am not sure
01:03why otherwise. What they are telling you is that there is some money stuck in
01:08some bank somewhere and they need your help to get it out, and that you will
01:12get usually the majority of that money. And you just have to promise to, you know,
01:17use it for the good of the mankind or something like that. In this case,
01:21it's a 30 million US dollars, with a financial institution. And usually there is somebody
01:26who has died in a motor accident or been assassinated, or he is a government
01:30official or some thing like that. The details change.
01:33But the idea here is that you are going to get piles and piles of millions of
01:37dollars, and all you have to do is to respond to this email address. Once you
01:40respond to the email address, then they will ask for some advance fee to pay a
01:44bribe, or to pay a bank fee, or to you know get some documents, and then they
01:49will ask for another fee. And if somebody follows along, eventually they end up
01:52going to Nigeria to pick something up, or to deliver some piece of paper,
01:56to sign some piece of paper, and then even worst bad things happen to them if they
01:59end up there.
02:00But bottom line is they never see any of the money. They end up spending
02:04usually thousands of dollars in fees, and that's why it's called advance fee fraud.
02:08So this is an example of it. You will see these. I get lots of them,
02:12dozens of them a day. Some people get more, some people get less. I don't think
02:16there is any reason or pattern for that, besides just the overall amount of
02:19spam you get. This is a very common form of spam, and it's just something to
02:23watch out for. If you happen to think you would like to have $30 million, just
02:27know that this is not where it's going to come from, and then only bad things
02:30will happen to you if you happen to respond to it. So this is advance fee
02:33fraud, or 419 spam, and that's an example of it there.
Collapse this transcript
Identifying malware spam
00:00Now let's look at another kind of spam that you will see now and then. Sometimes I
00:04call this 'stupid theme spam,' because the subjects tend to be a little bit odd.
00:10And in this other folder here I have got some outrageous examples of it.
00:14'UFO Sighting in Downtown New York,' 'Sarah Jessica Parker Arrested For Gross Negligee.'
00:20The point of these messages are just to be outrageous enough to
00:23get you to want to look at the video, or to follow the link, which is going to
00:28take you some place where you are going to think you are going to look at a
00:31video and it's going to ask you to download a codec, or some kind of a
00:35something, an update to Flash or something like that. And in fact, if you go
00:39through all of these hoops, your computer will become a member of this
00:43community of infected computers that will help to send out the spam.
00:48They are called botnets or zombies, and we are going to talk about that in more
00:51detail in a later lesson. But that's the point of these messages is to get you
00:56to infect your computer with the software that helps you become part of the
01:00network that sends out vast majority of spam these days. So in a nutshell when
01:04you see something like this and you say to yourself, what's the point of that?
01:08Why did somebody go through the bother to send that to me? Well, the point
01:13of it is to get you to click on the link and to follow the bouncing ball
01:18wherever it leads and to ultimately download a program without your knowledge
01:23on to your computer, that will infect your computer with a root kit, or a
01:27virus or a worm or whatever you want to call it, that will put your computer
01:31into this network of computers that would be under their command and control.
01:35Of course, it will still feel like your computer. Well, it will be a little
01:37slower, and your network connection will be a little slower, but you won't have
01:41any other way of knowing that this is going on.
01:43So this is also a good reason for you to keep an antivirus software up to date,
01:46and always be running antivirus software on your computer, just in case you get
01:50enticed and haven't listened to the admonitions enough to never click on a link
01:54in spam, and end up getting your computer infected with one of these things.
Collapse this transcript
Identifying phishing spam
00:00Now we are going to look at one of the more insidious forms of spam,
00:03it's called a phishing attack. That's phishing with a 'ph' where the 'f' would
00:07normally be, and the purpose of a phishing attack is to steal your personal
00:11information for the purpose of identity theft, and ultimately to spend your
00:16money, and to clean out your bank account, and to steal your resources from
00:21you, by having your personal information, by stealing your credit card numbers,
00:24your passwords, your pin numbers, your social security number, getting these
00:29credentials from you, so they can take over your financial life, and your
00:33financial persona to their own gain. There is a very big problem today, and
00:37there has been a lot of hubbub about it.
00:40In one study I saw recently, there was over $3 billion lost in one recent year
00:45by some millions of people, through identity theft, and particular through
00:49phishing attacks. So let's look at one example of the phishing message here, so
00:53you can see what it is, what it looks like, how it works, and later on there is
00:57going to be an entire chapter devoted to the subject of protect yourself
01:02against phishing attacks. But in this context we just want to take a look at
01:05the message, see what it looks like, so that you can learn to recognize them.
01:08This is a typical phishing attack message. It's not one of the better ones. But
01:13this is what they typically look like. You know the subject says, Account
01:16Security Measures, and it appears to be from Bank of America, the Security
01:21Department of Bank of America. It says this is being sent out due to a number
01:25of fraudulent transactions and the implications there is, of course, that they
01:29may have happened in your account.
01:31Notice that it is addressed to valued Bank of America member, instead of being
01:35addressed to somebody's personal name. This is a big tip off, actual message
01:40from an actual bank or financial institution or Pay Power, you bear any of
01:44these targets of one of these phishing attacks, would have the personal name of
01:49the Account Holder. That the fact that it says, valued Bank of America member
01:53has some generic greeting, it's a tip off that it's a fake. Because the
01:57phisher, the spammer, does not have your personal information. They are looking
02:01for your personal information. So they don't know your name, and the can't put
02:05it in the message, but the actual financial institutions, especially these days
02:09are always going to use your personal message, and that's one of the ways that
02:11you can tell, but it's not the communication from them. Then obviously if you
02:15read the message you will notice that it's got some grammatical problems, and
02:18spelling might not be good, it's got all little spaces here and there, and
02:21that's just typical of these messages. When you see the phishing attacks, they
02:25are very rarely written in a style that you would expect from the actual
02:29financial institution. But they work, because often times people reading, well,
02:32they don't bother to read them very carefully, or perhaps their English isn't
02:36their first language in the first place, but people do fall for these and
02:39that's why they happen.
02:41So when you see a message like this, when you see a message that purports to be
02:45from your bank, but looks a little bit off. Don't ever click on the links
02:47inside of the message. You notice when you roll your mouse over this link
02:51without clicking on it, up comes a little tool tip that says where it's going to.
02:55 That's a server in Germany. That is not actual Bank of America, you notice it
02:58says bankofamerica.com at the end, but the part of it is in the part of the URL
03:03where the host name goes, actually is a server in Germany. So that's one of the
03:08things you want to look out for. We will go into a lot more detail about the
03:11technical aspects of this in the chapter devoted to phishing. But for the purposes
03:15right now, just know that when you see something like this, don't click on the link.
03:19Not like you would in any spam, but this one is really trying to fool you.
03:22So be careful when you see something like this, and don't click on the links,
03:25 and be careful that when you do give out your personal information on
03:28the website, check and make sure it's actually the website that you think it is.
Collapse this transcript
Identifying pump & dump stock spam
00:00Another common form of spam is what I call pump-and-dump or stock scam spam.
00:05The purpose of these spam messages is to get you to invest your hard earned
00:08dollars in a particular stock that's held by the spammers, by the people who
00:13are perpetrating this fraud, and to get a whole bunch of people to buy some of
00:18this stock within a short span of a day or two, to pump the price up, and then
00:24they will dump their holdings in the stock. The value will crash, you will lose
00:28your money, and they will get your money, and that's the point of the scam.
00:32So we have a couple of examples of it. Both of these messages are I believe for
00:38the same pump-and-dump, UCSO, yeah. So the purpose of these messages, like I
00:45said, is to get you to buy the stock, and so often times they try to look like
00:49they are from a trading company or they'll be purport to be some sort of a low
00:53cap newsletter and they have got some hot tip. They will say things. Why this
00:58stock is about to go up, that they have got a deal with Wal-Mart, and they are
01:03expecting this stock which is now $0.10 to be selling at a premium of $1.75,
01:08and these guys are saying within a month it's going to go up 4000%.
01:13So who wouldn't want to buy something like that? Put a few thousand dollars into it,
01:19and end up getting few hundred thousand dollars back.
01:22The point is this that that's not going to happen. Usually a very little
01:26happens with them, but like with so many email related scams, they only need it
01:30to work occasionally. They don't need it to work all of the time, and so when it
01:34does work, a handful of people will buy a whole bunch of stock in this
01:38particular small cap, which is an actual company,which is actually traded, and
01:42is actually controlled, or a lot of the stock is owned by the scammers, and
01:47then the price jumps for a short period of time and then they dump their stock
01:51at the higher price. It's important to also note that there are some websites
01:56which you can find if you search on the Internet, which will purport to have
02:01tools that specifically watch the pump- and-dump stocks and look for when they
02:06are high, so that you can do what the spammer is doing.
02:09You can buy in low and sell high. Don't do it. Even if they work,
02:15it's contributing to the problem and there is a tremendous risk that the timing
02:19will be a little bit off. You'll end up losing a bunch of your money anyway.
02:22Participating even at that end of the scam is just contributing to the problem,
02:27not helping. This is another form of spam you will see a lot. Watch out for it,
02:31don't do it. You only encourage them at best, and at worst you're going to lose
02:36a whole lot of money.
Collapse this transcript
3. How Spam Is Sent
How spam is sent
00:00So how is spam sent? One way the spam is sent is through something called open relays
00:05and this used to be very, very common. It's a little bit less common today,
00:08and we will see why. Open relays happen because of one of the properties of the
00:12SMTP protocol. SMTP is the protocol that's used to send and relay email across
00:17the Internet. It stands for Simple Mail Transfer Protocol, and one of the
00:22properties of SMTP in the original specification is that an SMTP server must
00:28receive mail from any one, and send mail to any one.
00:32So let's take a look at how this works normally. In a normal e-mail situation,
00:36your computer connects to the SMTP server of your ISP. That SMTP server, which
00:42is the one that you are authorized to use, the one that you are supposed to use,
00:45 turns around and sends your e-mail out to the Internet and to the receiving
00:49SMTP server. The SMTP server of the recipient's ISP. Then the recipient logs in
00:54with their computer and connects to the SMTP server of their ISP, and receives their e-mail.
00:59This is when you check your e-mail, you download your e-mail. It comes from the
01:03SMTP server. SMTP sends and receives. So that's why it's called a transfer
01:07protocol. So overtime spammers who had been sending their mail through their
01:11SMTP server of their ISPs, they got booted off of their ISPs or ISPs shut them
01:16down and they needed to find a different way to do this. So they discovered
01:21this little loophole in the SMTP protocol, and instead of sending spam to their
01:25ISP's SMTP server, they would just merrily send it to some third party SMTP server,
01:30which would then relay the mail and send out spam, spam, spam, spam.
01:35This is what's called an open relay. Well, once the mail operators, the
01:39operators of the SMTP servers around the Internet, figured out that this wasn't
01:43working, they simply shutdown their servers. They configured their servers so
01:47they would only receive mail from authorized users on their own networks.
01:52And eventually, they even changed the specification, SMTP, so that it would allow
01:56different types of authentication to ensure that the person who is sending mail
01:59through the server is actually authorized to do so.
02:02So this mostly went away. Not entirely. There are still some open relays, and
02:06certainly they are relaying a lot of spam. If you open up a relay today on the
02:10Internet, within an hour it will be sending out a lot of spam. But this is no
02:14longer the primary method of sending spam on the Internet. The primary method
02:19of sending spam today is something called botnets. What botnets are is
02:23they're networks of compromised computers; individually they are called
02:27zombies. The owners of these computers rarely know that they are infected.
02:31These computers are running software that has been distributed and installed by
02:34virus or a Trojan horse. It has been specifically designed to create a network
02:39of zombie spam machines. Some of these botnets are as large as 400,000
02:44computers or more. Here is how it works. Somebody writes a virus, and that
02:49virus is then transmitted out to a number of computers, which are then
02:53infected and turned around and continue to spread the virus, until it gets to
02:57be a whole lot of infected compromised computers.
03:00Those infected and compromised computers turn around and contact a command and
03:05control computer, and the instructions for how to contact that computer are
03:09built into software that's been installed on them by the nefarious virus.
03:13The virus writer who is now the botnet owner, he controls the command and
03:18control computer, and therefore he controls these hundreds of thousands of
03:22infected botnet computers, and that all together is called a botnet. Then a
03:28spammer comes along and he pays the botnet operator to send out his spam.
03:33So in effect, the spammer is renting the botnet.
03:36And he now controls the command and control computer, and he controls the
03:39botnet through the command and control computer. He tells all of the bots
03:43through the command and control computer to go out and send their spam, spam,
03:46spam, spam, spam, and they do. So this is how the botnet works. Typically the botnets have
03:52the capability built in to spread themselves. They will attack known
03:56vulnerabilities and machines adjacent on the same network. Also reach out to
04:00the rest of the Internet to spread, sending copies of themselves through
04:04various payloads of viruses, which are some times even updated through the
04:09command and control computer, to keep them fresh and to keep them alive.
04:12Some of these botnets can last for years. So botnets are now the most common
04:17way for spam to get sent. Most of the spam that you receive is especially the
04:21really seedy looking spam comes through the botnets, but it's not the only way.
04:25Another common way for spam to be sent is through unconfirmed mailing lists.
04:29Sometimes you will get mail from very reputable companies, from companies that
04:33you have heard of, companies that are publically traded, companies with big
04:36major presence on the Internet, companies that you may respect, and yet you
04:41never asked for this mail.
04:42Why is it that these companies are sending mail to people who don't want mail
04:46from them? Well, this is what the unconfirmed mailing lists are. Often times
04:50it's quite innocent, and often times it's not, but what happens is, if somebody
04:55goes to a website and buys something or signs up for a mailing list, and for
04:59whatever reason, either by mistake or intentionally, they give a wrong email
05:03address. The company who runs the website, they just go ahead and send out
05:07their mail to whatever these email addresses are. They don't necessarily care,
05:11and in fact, it's to their advantage, they send out more mail than less mail.
05:15So they probably don't have any motivation to keep their mailing lists clean.
05:19So a lot of people who do not want that email end up receiving it. Normally the
05:25way this is supposed to work is that when you sign up for an email list, when
05:29you sign up to be updated with the newsletter or marketing materials from a
05:33company, that company's email list program should send out a confirmation
05:37message, and all of the major software packages for doing this are capable of
05:41sending out confirmation messages, most of them default, to sending out
05:45confirmation messages.
05:46The way these confirmation messages work, is you receive an email message to
05:50confirm that you want to receive mail from this mailing list, and you either
05:53have to reply to the message, or click on a link in the message, and that
05:57confirms that your email address was signed up with your permission, that you
06:01have actively confirmed that you are the owner of this email, and that you
06:06actually want to receive this mail. That's necessary today, because there's so
06:10much unwanted mail, there's so much spam, that for a company to remain
06:15reputable, to remain in good standing, they need to make sure that they are not
06:18part of the problem.
06:19So that's why mailing list software has this capability built into it, and
06:24that's why all of us should be using it. Another common way the spam is sent is
06:29what I call corporate spam. These are usually not the really big companies, but
06:34sometimes they are. In the postal mail world, it's always been common to be
06:38able to buy or rent a mailing list for sending out your marketing materials,
06:41and in the email world, this is round apart, this is not the way that it is
06:46normally done.
06:47But some people who are from the postal mail world, or who have always done
06:50things that way, they just don't understand, that they can't just go out and
06:54buy a rental mailing list, and so they do. They go out and they buy a rental
06:57mail list. And typically the people who are selling and renting these mailing
07:00lists are not doing this in a reputable way. So they are selling what's called
07:04the million CDs or these databases with millions of email addresses on them,
07:09and they claim that they all are confirmed, and that there are people who want
07:12to receive these marketing. They even sometimes call them targeted lists.
07:15When in fact they are just every email address they have been able to scrape
07:18off the Internet. So the marketing manager in this large corporation, or this
07:23medium or small size corporation, he doesn't know the difference. He rents this
07:27mailing list, and he sends out his campaign, and he gets a flood of spam
07:30complaints and he learns the hard way. Well, this another way that spam is
07:33often sent, and unfortunately sometimes it's even done this way intentionally.
07:37The effect of corporate spam, the effect of unconfirmed mailing lists is really
07:41the same as the effect of botnets, without the nefarious pirate who writes a
07:46virus and infects your computer, but the effect of this spamming is the same.
07:51People who don't want your mail are getting your mail, and they are going to
07:54complain and they are going to be quit out by it, and it becomes part of the
07:58problem instead of the part of the solution. If you are working for a large
08:00corporation and you have marketing materials that you need to send out,
08:04do it the right way, get a mailing list manager, and send out the confirmation messages,
08:08and be part of the solution, and not part of the problem.
Collapse this transcript
4. Defending Against Spam
Spam filters
00:00One of the most important tools is in your toolbox, the toolbox of the average
00:04user, is your spam filter. This is a primary tool for keeping spam out of your
00:10Inbox, making your email a usable and productive part of your life.
00:15Most filters today are what's called Bayesian filters. This is named after
00:19Thomas Bayes, an 18th century mathematician, who was a pioneer in probability
00:23theory and his Bayesian Theorem is what's used with Bayesian filters to make
00:28them work well. Before Bayesian filters, spam filters basically looked for
00:32certain words and certain patterns, and when the spammers found out about those
00:36words and patterns, they would start spelling things a little bit differently,
00:40or using a 1 instead of an I for certain words, and getting past the spam
00:44filters. And the spam filters would have to be updated, and spammers would
00:46change what they do, and the spam filters would have to be updated. And this
00:49was a very time consuming and very frustrating process, especially for the
00:53average user who wasn't in the loop, and just found that the spam start to get
00:57in through again.
00:58Bayesian filters were created to work better than this, and what Bayesian
01:03filters do is they learn what your legitimate mail looks like. They learn what
01:07your spam mail looks like, and they filter based on that. So they are
01:12constantly learning, and constantly being updated without having to go back to
01:15the manufacturer and get refitted.
01:17So as a result of this, if your mail happens to have words that are otherwise
01:21found in spam, for instance, if you are a marketing manager and mail that
01:25says, "Important sale today" is actually common in your email ecosystem.
01:30The Bayesian filters are smart enough to be able to tell the difference between
01:33that and spam mail that might also have those words in it. But have a
01:37different look and feel to them then the legitimate mail that you might have
01:41that has those words in it.
01:42Bayesian filters need to be trained. This means that as you go through you
01:46Inbox everyday, you need to mark the mail as spam, that doesn't belong in your
01:51Inbox and is actually spam. And likewise you need to periodically go through
01:58your spam mailbox and mark the mail which is actually legitimate mail. So that
02:02means you don't just move the mail into the folder that it belongs in, you have
02:05to actually click the button. And on your mail program there is a little button,
02:10that says Mark As Spam, and when it's looking at a spam message, that button
02:13or different button will say, Mark As Not Spam.
02:16These buttons are used to train the filter. When you press one of these
02:21buttons, the message goes through the Bayesian Filter, and helps the filter to
02:25train so it knows the difference between what is spam and what is not spam.
02:29So Bayesian filters are incredibly useful. Spam filters today are miles ahead
02:34of where they were just a few years ago because of this advance. You need to
02:38make sure that you train your filter, that you keep your filter up to date by
02:41using the spam and the not-spam buttons in your mail program.
Collapse this transcript
Defending against phishing attacks
00:00So let us talk about phishing. First of all, what is phishing? Phishing is
00:05e-mail messages that are forged to look like they are from a financial
00:08institution or another web site where somebody can spend your resources or
00:13steal your resources. Web site like PayPal or a bank web site or even some
00:18place like eBay or Amazon, where they could spend your money and have products
00:23or goods or services sent to somebody else so they could resell.
00:26Phishing is a pr. In fact, identity theft has
00:32exploded in the last few years primarily because of phishing attacks. So this
00:37is the primary way that identity thieves are able to steal the information that
00:42they need to be able to use your identity, to be able to use your financial
00:46resources, to be able to steal your money and your reputation. The goal of
00:51these phishing messages is to gain control of your financial resources. So,
00:56let's take a moment and take a look at a phishing message and see what it looks like.
01:00This is one that I have received today. It purports to be from PayPal and it
01:04says that I have got a message from PayPal and that I should click on this link
01:08here in order to log in to PayPal and access my mail section. So what I do with this?
01:14 Let's take a look at how we can defend against phishing attacks. Things to
01:20look for in defending against phishing attacks. First of all, you want to look
01:23at the e-mail and look at it very closely. Every time you get an e-mail from
01:27your financial institution, one of the first things you should look at is,
01:30do they say your name?
01:32If they say your name then, you got a decent chance and you can look at the
01:35rest of the message and see if there is anything fishy about it. If it does not
01:38say your personal name then it is a forgery. All of the major financial
01:42institutions, PayPal, eBay, Amazon, anybody of any significance is using your
01:48personal information. If they have it, they are going to use your personal name
01:51so that you know that this message is from them. If it's a fake they don't have
01:56your name. They are looking for your personal information. They are wanting to
01:58steal your personal information.
02:00So they don't have your name and they are not going to be able to address you
02:03by your full name that the web site has on file. We will look at their e-mail
02:08message in a minute and we will look at some other reasons that we can tell
02:10that it's fake. But the first thing you want to do is to be able to tell if the
02:13e-mail is real or fake. Next before you click on a link, if you are tempted to
02:17click on the link, inspect the link before clicking on it. Hover your mouse
02:20over it, look at the little status bar or at the pop-up that comes up that says
02:24what the link looks like and we will show you how to do that here in a moment as well.
02:27You want to inspect that link before you click on it and then if you do decide
02:31to click on the link, which if you are all suspicious, you want to not click
02:35on the link at all. Instead you want to go to your browser and type in the URL
02:39yourself or better yet use the bookmark that you always use to get to that web
02:43site. In that way you're sure or you are more sure that you are getting to
02:47the web site. It's not impossible for somebody to redirect you and we will look
02:51at the further things that you can do to make sure but using your bookmark or
02:55typing in the URL yourself is a much better way to get there than to clicking
02:58on the link.
02:59Then finally once you get to the web site, you want to inspect the URL bar and
03:04your browser and make sure that you got to where you think you are going to get
03:06to. So now let's look at the message in a little bit more detail. So first of
03:11all we notice that it says "Dear Customer." It does not say, "Dear William
03:15Weinman" or your name. So you know right off the bat that this is very
03:21suspicious and it's probably a forgery. Look at the address that it's
03:24addressed to. This is one of my throw away addresses. This is an address where
03:28I get most of my spam.
03:29So I know that that's not the address that PayPal would send my information to.
03:33Look at the return address, this one happens to be a very bad forgery;
03:37it says it's from Pay.com, it doesn't say it is from PayPal.com. PayPal would
03:41never send a message from Pay.com. The Subject. 'Account Review PayPal, DEBIT.Team'
03:48This is so badly written; this would never come from a self-respecting
03:53American company who's going to have somebody writing their marketing materials
03:57who has a good command of the English language. They even spelled account wrong.
04:00Finally, to best of my knowledge, PayPal does not have an e-mail service;
04:05they send me e-mails by e-mail. So there wouldn't be an inbox there and let's hover
04:09our mouse over the "Click Here" and see what we get. Oh! Notice the web site,
04:13streamsinthewilderness.com. That is an obvious forgery, so we are not going to
04:18click on this and if we look at the rest of the message down here, we see that
04:21PayPal is spelled inconsistently. Up here its PayPal like it normally be
04:25spelled, here its got a hyphen. Blank check is a registered trademark of PayPal.
04:30This is just very obviously not really from PayPal.
04:35If I were tempted to click on the link --and do not try this at home kids!
04:40I am a trained professional. If I were tempted to click on the link, this is what I
04:43would get. Here is the forged web site. It looks very much like PayPal's web
04:48site. Now I also brought up the real PayPal site. I happen to know that the
04:52PayPal web site has had some redesigns since they stole this copy, even though
04:57they sent this message out today, it's from an older version of the PayPal
04:59site. Boy, does it look authentic. A person might very well be tempted to type
05:04in their e-mail address and their PayPal password.
05:07I will notice PayPal is spelled with a space here; it wouldn't be on the real
05:10thing. Also look at the URL bar. Remember we said always inspect the URL bar
05:15before you start logging in to one of these web sites and its a good idea even
05:18when you use your bookmark to always inspect the URL bar before you log in to
05:22the web site because DNS could be hijacked as well. There are other ways that
05:26people can run this scam besides sending you a phishing e-mail message. This is
05:29the most common way but it's not the only way.
05:32So always inspect the URL bar. What do we find? We find this odd domain name
05:37that is not PayPal.com. Also we see that it says http where it should say
05:42https. This is one of the most important telltales, is that this is not a secure
05:48connection. So PayPal would never ask you to log in over an insecure
05:51connection. If we look at the real PayPal site, we notice that it says https.
05:56We notice that it says PayPal.com and then here in Firefox anyway, we can see
06:01that it has a verified valid certificate by clicking here and we see that this
06:06is an encrypted connection and it has a valid certificate.
06:10You can click on the More Information and you get to see the exact certificate
06:14that authenticates that this is the actual real PayPal web site. So this is the
06:19real, this is the fake and these are the things to look for, so be careful. You
06:24get a message like this obviously, this one is a forgery and there aren't too
06:28many really good forgeries any more but they do occasionally come by where it
06:32might look pretty convincing.
06:33So be careful don't click on the link; if you really want to check it out and
06:37find out if its real, just go to your browser and use your bookmark and get to
06:41the real web site and confirm that its real and then you can log in and you can
06:44look and you can see if there is anything actually wrong with your account. But
06:48this is an obvious forgery and you want to make sure that you are careful when
06:52you get this kind of a message so that you don't lose significant amounts of
06:56money and have a whole lot of trouble fighting off identity theft.
Collapse this transcript
Tagged email addresses
00:00Another useful technique for managing the spam that you get is what I called
00:05tagged e-mail addresses. What this is, this is something that you can do--
00:08if your email system supports it, we will talk abut that in a moment-- to manage a
00:12relationship with a new sender. Let's say you go to new store, and you haven't
00:16been there before, and you don't know what their reputation is, and you just
00:19want to make sure that if they don't handle your email address responsibly,
00:25that there is something you are going to be able to do about that.
00:26So what you can do is, you can create a tagged e-mail address, and here is an
00:30example of the tagged e-mail address. Let's say for instance that I am using
00:34Gmail and my address is boothby42@gmail.com. I can create a tagged e-mail address
00:41that starts with boothby42 and it has the plus sign and some word that describes,
00:47that I can use as a tag, that describes the relationship with this new website
00:52that have been to. In this case I call it newstore@gmail.com, and this is a
00:56tagged e-mail address and Gmail happens to support it. We'll show our example in
01:00Gmail. In fact, let's look at that now.
01:03This is a Gmail account for boothby42@gmail.com, and here is a message that came from the new store.
01:10So when I registered a new store, I used that tagged
01:13e-mail address with the +newstore. And if we look at this message and we can
01:18click on Show Details, it shows that the address that we was sent to is
01:23boothby42+newstore@gmail.com, and they sent a message to that address and it
01:30showed up in my boothby42 email box, and here is their little sales pitch.
01:35So now if they were to say, sell the email address, or "share" it, share it with
01:44a partner and I didn't want that to happen, then I have an easy way to deal
01:49with it. I can go into my Filters, and I can create a filter with this address
01:58in it, boothby42+newstore@gmail.com. And we see that because Gmail does this,
02:09it tests the filter for you. Now if I want to, I can just apply a label, I can
02:14create a new label for this, which is Gmail's analogy to putting it in a
02:19folder, or I can just click Delete It, if they have been abusing the address
02:24and I don't want to receive mail from them any more, I can say Delete It. Every
02:28time they send a message to that address, it will get deleted. Of course, you
02:33can say, also apply to the conversation below. So in this case, let's just
02:36create a label because they haven't turned rogue yet and we will just
02:41call it New Store and say OK. And create a filter.
02:46Now we have a label called newstore and it's got that message in it and it's
02:50also stored in the Inbox because that's just how Gmail works. You can tell it
02:54to skip the Inbox or not. And it's got this tag on it, which is actually very,
02:57very useful. So tagged e-mail addresses, they really have a couple of
03:01purposes. You can use them for segregating your email, for creating filters, and
03:05more importantly and what they were created for is the ability to manage a
03:09relationship with a new sender. So that if they where to do something untoward with your
03:14email address then you have some recourse. You have a way of automatically
03:18dealing with that so it doesn't become part of your spam problem.
Collapse this transcript
Block lists
00:00Let's say you get a lot of unwanted mail from a particular sender. You may be
00:03able to block it using a block list. There are basically two kinds of block lists.
00:07There are sender-based block lists, that use a list of email addresses or
00:11domains that you don't want to receive mail from, and there is IP address based
00:16block lists, which we'll talk about in a moment.
00:19The sender-based block list, the email address-based block list, basically work
00:23like this. We are going to talk about this using Microsoft Outlook because
00:28that's what we have in front of us here. But of course, the same concept works
00:31in any email program that you may be using. In this case, you simply select
00:36the message that's got the address, that's from the sender that you don't want
00:40to receive mail from any more. In this case it's Apple. I am not saying that
00:43Apple is nasty about mail, it's just what we are using for example here. You go
00:47to the Actions menu and under Junk Email, you will see right there Add Sender
00:52to Blocked Senders List, and it's that simple.
00:55The sender of these messages has been added to your Blocked Senders List,
00:58the message has been moved to the Junk E-mail folder. If we look over here now at
01:02the Junk-E-mail folder, we'll see there is the message. Let's say that you
01:07don't want them on the blocked email list any more. Let's go up and manage our
01:10blocked email list. You simply open the list using the Junk E-mail options, and
01:16select Blocked Senders. There's your whole list of them, you select the one
01:20that you don't want in there anymore and you say, Remove and OK.
01:25Now they are not on the blocked list anymore. You can move this message out of
01:29the Junk folder, and put it back in your Inbox, there it is. And there is the
01:35message right back where it belongs in the Inbox. So that's basically the
01:39concept of how you use block list, different email programs do it in different
01:43ways, and sometimes they might not have a specific block list functionality,
01:48you can simply just create a rule or filter and list all the email addresses in
01:52there. That works fine in programs that don't have a separate functionality for it.
01:56The other type of block list is called the RBL, Real-Time Block List, and this
02:03work at the server levels, we are not going to be able demonstrate it here. But
02:06I want to describe them, and not because you might be running a server, but
02:10because you probably use a mail server, even though you don't use it directly,
02:14that's how your mail gets delivered to you. Your mail server maybe using RBLs
02:19and you need to be aware of that. Because the way that it works is that it
02:23works based on the IP addresses, and it's usually blocks of IP addresses.
02:28So if mail comes from a particular block of IP addresses that this particular
02:33RBL has decided acts badly, then that mail will never get to you, and it gets
02:37blocked at the server level. Usually the way that that works, is right when the
02:42SMTP conversation begins, the server that doesn't want to receive mail from
02:46that address will simply cut them off, or never accept the connection in the
02:50first place.
02:51These RBLs are managed remotely, and usually automatically, like for instance,
02:56there is RBLs that keep up with the addresses of the botnets, and refuse to
03:01accept mail from any addresses that are known to be botnets, where they are
03:05known to be zombies within the botnets. And these can be very useful and they
03:09can also be a little bit dangerous. Because for example, somebody who is
03:13managing an RBL might decide that anyone from a particular ISP is bad, not
03:19necessarily the users, but that ISP is bad, and block that whole ISP. There
03:23have been occasions where whole ISPs have been unable to receive mail from
03:27whole other ISPs, because of this block list.
03:30It's good to know that they exist and know basically how they work, even though
03:34we are not going to be demonstrating them here and they are a useful tool in
03:37the fight against spam. I know that from my part, if my server didn't have any
03:41RBLs, I would be getting twice as much spam as I do now. So it's good to know
03:45that they are there, and it's good to know how they work, and what they are.
Collapse this transcript
Other ways to defend against spam
00:00So there are some other important things that you can do to help defend against
00:04the spam that onslaughts your Inbox. The first one of course, and we
00:08mentioned this before, but it is worth mentioning it again, is to never
00:11unsubscribe from something unless you subscribed it in the first place.
00:14Obviously, if you subscribe to a mailing list and you wanted to stop receiving
00:18that mailing list that you have already subscribed to, then you go ahead and
00:21you follow the procedure for unsubscribing. If you just get something out of
00:25the blue and it has a very legitimate looking look to it and it has a very legitimate
00:30looking unsubscribe or remove link,
00:32you may be tempted to just click on it to end the problem, but that's not going
00:36to end the problem. Remember the spammers don't really care if you want to
00:40receive the mail from them or not. It costs them virtually nothing to send it
00:44to you. So if you click on the unsubscribe link in that spam message,
00:49all it does is it tells them that you looked at the message and that makes you
00:52more valuable to them. It makes them want to send you more spam and it makes
00:56it more valuable for them to sell your email address to other spammers and you
01:00become a prime target for them.
01:03So never unsubscribe unless you have actually subscribed in the first place.
01:07And a related point is never to click on anything that you find in a spammed
01:12message. If there is a link there, and it looks intriguing, or it looks funny,
01:16or it looks entertaining, or it looks profitable, don't click on it. Don't be
01:20tempted, because when you click on something that you found in your spam
01:23message, you are telling them that you are interested and that you have read
01:27their message and you found it intriguing, but at the very least you are
01:30encourage them to do more.
01:31And at the very worst you are telling them that you are a prime target, and
01:36that you want to receive more stuff like this from them. They will just start
01:39sending you more and more stuff. So on a related note, never buy anything from
01:45a spammer. When you buy things from the people that are sending the spam, and
01:49you are telling them this is a valid marketing technique. This works. And of
01:54course, they are going to want to do more of it if it works because it is
01:56making them money.
01:57So never buy anything from an unsolicited email message that you have received.
02:02And finally, might seem like a little bit of a tangent, but it's one of the
02:06things that you can do to defend against spam, is to have current antivirus
02:10software on your computer and to keep it up-to-date. To run your little update
02:14utility at least every day.
02:17As often as those updates are available. Because this is going to help prevent
02:21your computer from becoming part of a botnet and becoming part of the problem.
02:26When your computer becomes part of a botnet, of course, it will send out
02:30millions of spam messages everyday, and it also uses up your precious
02:34resources. It uses up your bandwidth, it slows down your computer, it uses up
02:38your CPU cycles, and by using the bandwidth of your ISP, it helps to make your
02:44Internet connection more expensive. So keep your antivirus software up-to-date,
02:49keep it turned on, and make sure that you are running good antivirus software
02:54on your computer.
Collapse this transcript
5. Dealing with Spam When It Arrives
Marking your spam
00:00Every time you open your e-mail program, there's a couple of things you are
00:03going to want to make sure that you do to help to keep your Inbox clean and
00:06efficient, and to help to keep your junk mail folders trained. First thing that
00:10you are going to want to do is you are going to want to go through your mail,
00:12and you are going to want to look for the messages that actually are spam, that
00:15have made it into your Inbox, that your spam filter has missed, and you want to
00:19press that Junk Mail button.
00:21This helps to train your spam filter. It helps to keep it up-to-date with the
00:25type of spam that is in the world today. It then moves the messages out of your
00:31Inbox, leaving your Inbox clean and puts them in the junk mail folder where
00:34they belong. So it's important to know that by just selecting those messages,
00:39and dragging them off to the junk mail folder, or deleting them does not train
00:42your spam filter. You need to train your spam filter, because spam changes on a
00:46daily basis, and that's why some of those messages end up in the Inbox, instead
00:51of in the spam mailbox where they belong.
00:53So taking a minute to do this on a daily basis will keep the spam at bay, it
00:59will keep this spam filter trained, so that your Inbox can be cleaner and more efficient.
Collapse this transcript
Checking your spam daily
00:00The next thing you want to do every time you open up your email program is to
00:03go into your junk mail folder and look for the messages that were flagged as
00:07spam and are not actually spam. This will help to train your junk mail filter,
00:13so that it knows what your legitimate mail looks like, just like you train it
00:17to know what your junk mail looks like. So let's go over here and we see in
00:21here, we have got three messages that were marked as spam, that are not spam,
00:26this three here.
00:27So we want to select them and press the Not Junk button. This will help to
00:32train the spam filter to know that these types of messages, messages with this
00:37sort of content are not junk, that these are legitimate mail, and this is just
00:41as important as training it to know what the junk mail looks like. Once we have
00:45marked these messages as Not Junk, we are going to need to drag them back into
00:48the Inbox, because the Not Junk button will not do that for you most of the time,
00:53and then we might want to mark them as Not Read.
00:59Now the messages are back in the Inbox where they belong. The junk mail filter
01:03has been trained to know that messages that look like that are not junk and
01:07they will in the future end up in our Inbox, instead of in the junk mail folder.
Collapse this transcript
Using filters for common senders
00:00Another important tool in managing the spam on your system is the mail filter.
00:04A lot of times we think of the mail filter is a tool for organizing our mail,
00:09and it certainly is that. But by organizing our mail, by having the mail for
00:13specific important or common senders go to a different place, then we know
00:18where that mail is, and it's not going to get lost in the clutter of the spam,
00:22and the clutter of the Inbox. So let's go ahead and create a filter here and
00:27watch that in action.
00:27Now here I have selected a message that is from a different sender, this is
00:31from webbie@webmonster.net. I am going to go ahead and select create filter
00:36from message here on this drop down menu. Now this is how it works in
00:39Thunderbird, it may work differently in your mail program, and lynda.com has a
00:43lot of the popular mail programs covered in their video training library at
00:48lynda.com. So go ahead and create a filter, and this is how it works in most of
00:54the programs. The dialog box looks something like this. where From is webbie@webmonster.net.
01:00You can add multiple rules if you want to, you can have it match any or all of
01:05the different rules. I am going to have the mail from webbie go to the webmonster
01:11folder, and go ahead and select OK. Now we will see here that the filter we
01:16just created is listed in the Message Filters dialog box, and we can run it now
01:20on the Inbox, and goes ahead and drops those two messages into the webmonster
01:26folder that has the messages that are from that address. Now we will go ahead
01:30and we will check our mail, happen to know that there are a couple of messages
01:33in there from that sender, and indeed there are.
01:37Now there are four messages in there, instead of just the two, and we see that
01:43the two additional messages that came in are also from that sender. So this way
01:49we know that the messages like this, the messages from that sender is going to
01:53be in a separate mailbox, they are not going to be amongst the clutter of the
01:55Inbox that may have spam and other things, and we can avoid the possibility of
02:00accidentally marking something as spam that's from an important sender, because
02:03we have got it off in a different place, which is not going to be amongst that clutter.
Collapse this transcript
Using your address book
00:00Your Address Book can also be an important tool in managing the spam on your
00:04system. Most mail programs have a setting, where addresses that are in the
00:08Address Book, by pass the junk filters altogether. Here is the setting in
00:13Thunderbird. Under the Account Settings, for the Junk Settings, select this
00:19checkbox, 'Do not mark as junk if the sender is in the Personal Address Book.'
00:23There is a selection here also for Collected Addresses, but that happens
00:26automatically.
00:26And the Personal Address Book is more intentional, so I like to use that one.
00:30So press OK there, and then we'll take one of these messages that's addressed
00:35from WebMonster and we'll bring down this dropdown menu, and we'll go ahead and
00:39add that to the Address Book. Now when we look at our Address Book, there is
00:43that address in there, and mail coming in from that sender will no longer go
00:49through the spam filter at all. It will go directly in to the Inbox and go
00:53through the filters, and end up in the mailbox that you have selected for that sender.
Collapse this transcript
Using different email addresses
00:00If you get a lot of email and if you get a lot of spam, it might be useful to
00:03create separate email addresses for different roles and different purposes in
00:07your life. For example, you might want a separate email address for your
00:11business, or your personal mail, an address for your role in a particular
00:15project, or just an address for your smart phone. You can have mail from
00:19separate addresses forwarded to the same mailbox or not, and if you do,
00:23you can create filters based on the To address, and put the mail for their
00:27different roles in different mailboxes, or as I have shown here, you can just
00:31set up a whole separate account in your email program.
00:33I have done that for this billew@bw.org, and I set this up for personal mail.
00:40So when I go ahead and check the mail, I see there is a personal message from
00:44my friend Frederick Boothby, says "How you're doing?" So this is a personal
00:49account, and I would only give this address out to some of my close personal friends,
00:53and not give it out to everybody. Therefore, it won't get a lot of spam,
00:58at least not for a while, and it's a very useful way to keep your e-mail
01:02life from getting too complicated, help to keep it simple, and help to keep it
01:06streamlined. So there is a useful tool that you can use.
01:09Most of the free email services, by the way, will allow you to have multiple
01:12accounts. Most of your ISPs, your dial up services, or your DSL services, or
01:18cable services will allow you to have multiple mailboxes. So it's a fairly easy
01:22thing to do, and it's a useful tool in keeping your e-mail life streamlined, and clean, and simple.
Collapse this transcript
6. Being a Good Email Citizen
How to be a good email citizen
00:00So let's say you have a good reason to send out a message to a lot of people.
00:04You have something to say, and that's good thing, but people these days are
00:08very sensitive to spam, and you probably don't want to get their feathers up.
00:11Luckily, there are ways to do what you need to do without looking like a
00:16spammer. First thing to keep in mind is that you don't want to just Cc your
00:22entire address book. There can be a tendency, that you have got something
00:25important to say, and everybody in the world needs to hear this right now,
00:28to just grab all the addresses in your address book, and plop them into the Cc
00:32field in the message, and hit the Send button, and you want to avoid that urge.
00:37When you send out a message like that without warning, and people aren't
00:42expecting it, a lot of the people who receive it, instead of seeing your
00:46message, instead of hearing the thing that is that you want them to hear,
00:50they are going to say, "You spammed me!" and you probably want to avoid that impression.
00:55At the same time, and on the other side of the coin, when you receive a message
00:59like that, you want to remember that it's probably well intentioned, and to
01:03have a little bit of tolerance of it, and try to get past that initial urge to
01:07complain about the spam, and perhaps think about what the person is trying to say,
01:10 because it's not necessarily a bad thing. It's just that in this culture,
01:15in this climate that we are at right now, that's the first thing that's going
01:19to come up when people receive something like that.
01:21So you don't want them to think that. You don't want them to have that
01:24reaction, you want them to see your message. So how can you accomplish that?
01:27The first principle that you want to keep in mind is that you want permission.
01:31You want to ask their permission to invade their mailbox, because that's how
01:36it's perceived. It's an invasion of their Inbox. So you want to ask permission,
01:39and there are number of ways that you can do this. Of course, you can just ask them,
01:42 you can have a sign up sheet in your shop, or you can have a place to
01:47sign up on your website.
01:48But you want to make sure when you send out anything in bulk, that you get the
01:53permission of each of the recipients before you include them in the list.
01:58In this way they will receive your message in a good way, or there is a better chance of
02:02it anyway. When you get their permission, of course, you are going to want to
02:05maintain a list of the e-mail addresses of people who have given their
02:08permission, and if you've got just a few of them, you can keep it in a list in
02:11a text file, or you can keep it in a list in the Excel Spreadsheet, or
02:14something like that, and just copy and paste into your em-ail program whenever
02:17it is that you want to send a message.
02:19But if it gets to be more than a few, you might want to think about using a
02:23mailing list provider. Using a mailing list provider is going to give you a
02:27number of advantages over manually maintaining of this list. One of the most
02:32important of those advantages is that people can sign up themselves and they
02:36can unsubscribe themselves, and they can change their email addresses on their
02:41own as well. This is an important distinction because this again gives people
02:46the feeling that they have power over their own Inbox and of course,
02:51the amount of spam that we all receive, we know that that's a fallacy.
02:53We don't actually have power of our own email box, but it gives people the
02:57feeling that they have the power, and that you are being polite about it, that
03:01you are doing this entirely with their permission and that they are entirely
03:04at free will to add, change, and delete their own addresses from the list
03:08without bothering you about it. So using a mailing list provider is an
03:13incredibly valuable thing, and fortunately it doesn't even need to cost you any money.
03:17 Yahoo Groups is one very prominent, free mailing list company and
03:22in fact, in addition to the free mailing list, your Yahoo group also has a group
03:27calendar, has a place where people can post pictures and files.
03:31It's a very full-featured and free service, one worth keeping in mind for these
03:37purposes. Google Groups is another one that's free, and may works entirely
03:42differently, it's a different sort of a service, but it's worth looking at. And
03:46in the non-free category, there is a very popular ConstantContact. A lot of
03:51people are using it. It costs about $15 a month or so, for their smallest service.
03:55So it might be more of a commercial thing, than something you want to
03:58use just for keeping in touch with your friends, or the soccer group at school,
04:03or something like that, but it's something worth knowing that it exists.
04:08It's useful to know that these services are available, and it's a very good
04:12thing to think about using a service like this instead of just Ccing your entire
04:17address group. Your message will be well received this way, and you will get a
04:21lot fewer complaints and you will be considered a better citizen of the e-mail universe.
Collapse this transcript
7. Getting Involved
Getting involved
00:00We've spoken at some length about to reduce the amount of spam that you
00:03receive, how to manage the spam that you do receive, and how to maintain your
00:07own e-mail ecosystem, and that's all good and useful stuff. And it may even be
00:12the extent of your interest in the subject. On the other hand, if you are
00:16interested in going further with the subject, if you are interested in keeping
00:19up with the latest developments, or even helping with the effort to improve the
00:23global e-mail ecosystem, then there is some resources that you should know about.
00:27I keep a more complete resource list on my website at bw.org/ube, and you may
00:33want to check there now and then and feel free to use the contact form to keep
00:36in touch with me. I would like to hear from you.
00:38The Coalition Against Unsolicited Commercial E-mail, CAUCE, and keep in mind that is a C there in the
00:44fourth position, and not an S. It's one of the oldest organizations involved in
00:49the subject. They are primarily a lobbying organization and they have been
00:52involved in getting a lot of the laws passed about the spam problem.
00:56They are also involved in the legal process in helping to prosecute spammers,
01:01and they have a number of very powerful lawyers on their staff, and they have a
01:04legal fund that you can contribute to that helps with this process. Abuse.net
01:09is more technical website. It has a number links to useful resources for
01:14reducing spam and keeping ahead of the technological battle against spam, and
01:19it's run by some good folks as well.
01:21I have my own project called AMTP, Authenticated Mail Transfer Protocol.
01:26AMTP is designed as a replacement for SMTP, and it's the only solution that I know of
01:31 that addresses the problem from both the technological and the sociological
01:34sides. Provides a clear, succinct set of definitions of email sending
01:40behaviors, provides mechanisms for extending those definitions, and strong
01:44mechanisms for defining and enforcing the rules related to sending and
01:47receiving email and you can learn more about AMTP at the AMTP website at
01:52AMTP.bw.org.
Collapse this transcript
Goodbye
00:00I find spam to be a fascinating subject, and while it can be annoying to
00:03receive a lot of spam, I hope this course has been useful and perhaps even
00:07enjoyable for you. I have certainly had fun preparing and presenting it.
00:10You've learned a lot about what spam is, where it comes from, how it's sent, and what
00:15to do with it once it shows up in your mailbox. You are now well equipped to
00:18manage the spam in your life, and to prevent it from doing too much damage in
00:21your e-mail world.
00:22E-mail is an amazingly useful tool. It gives us the power to communicate
00:27effectively and efficiently, without the interruptions of a telephone, or the
00:30expense and inconvenience of postal mail. By giving you the tools to manage
00:34your spam, I hope I have helped you to get more power and enjoyment from your
00:38e-mail experience. I am Bill Weinman. Thanks for watching.
Collapse this transcript


Are you sure you want to delete this bookmark?

cancel

Bookmark this Tutorial

Name

Description

{0} characters left

Tags

Separate tags with a space. Use quotes around multi-word tags. Suggested Tags:
loading
cancel

bookmark this course

{0} characters left Separate tags with a space. Use quotes around multi-word tags. Suggested Tags:
loading

Error:

go to playlists »

Create new playlist

name:
description:
save cancel

You must be a lynda.com member to watch this video.

Every course in the lynda.com library contains free videos that let you assess the quality of our tutorials before you subscribe—just click on the blue links to watch them. Become a member to access all 104,141 instructional videos.

get started learn more

If you are already an active lynda.com member, please log in to access the lynda.com library.

Get access to all lynda.com videos

You are currently signed into your admin account, which doesn't let you view lynda.com videos. For full access to the lynda.com library, log in through iplogin.lynda.com, or sign in through your organization's portal. You may also request a user account by calling 1 1 (888) 335-9632 or emailing us at cs@lynda.com.

Get access to all lynda.com videos

You are currently signed into your admin account, which doesn't let you view lynda.com videos. For full access to the lynda.com library, log in through iplogin.lynda.com, or sign in through your organization's portal. You may also request a user account by calling 1 1 (888) 335-9632 or emailing us at cs@lynda.com.

Access to lynda.com videos

Your organization has a limited access membership to the lynda.com library that allows access to only a specific, limited selection of courses.

You don't have access to this video.

You're logged in as an account administrator, but your membership is not active.

Contact a Training Solutions Advisor at 1 (888) 335-9632.

How to access this video.

If this course is one of your five classes, then your class currently isn't in session.

If you want to watch this video and it is not part of your class, upgrade your membership for unlimited access to the full library of 2,025 courses anytime, anywhere.

learn more upgrade

You can always watch the free content included in every course.

Questions? Call Customer Service at 1 1 (888) 335-9632 or email cs@lynda.com.

You don't have access to this video.

You're logged in as an account administrator, but your membership is no longer active. You can still access reports and account information.

To reactivate your account, contact a Training Solutions Advisor at 1 1 (888) 335-9632.

Need help accessing this video?

You can't access this video from your master administrator account.

Call Customer Service at 1 1 (888) 335-9632 or email cs@lynda.com for help accessing this video.

preview image of new course page

Try our new course pages

Explore our redesigned course pages, and tell us about your experience.

If you want to switch back to the old view, change your site preferences from the my account menu.

Try the new pages No, thanks

site feedback

Thanks for signing up.

We’ll send you a confirmation email shortly.


By signing up, you’ll receive about four emails per month, including

We’ll only use your email address to send you these mailings.

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

By signing up, you’ll receive about four emails per month, including

We’ll only use your email address to send you these mailings.

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked