This article delves into the murky depths of the internet, exposing one of its most insidious threats. If you're brave enough to confront this menace, you could significantly reduce the amount of spam you receive. Prepare yourself for a journey into the world of unscrupulous spammers, their tactics for stealing your email address, and the steps you can take to protect yourself.
If you have access to your website's log files, you might be surprised to discover that your site is visited far more frequently than you realize. More alarmingly, your HTML files could be used against you. These log files may contain traces of the tools used by unscrupulous spammers to pilfer your email addresses.
Let's take a step back and explain a few things. Every time you visit a website, a record is kept of every page, graphic, sound file, video, or any other element you access. This record is known as a log file. Each line within the log file represents one "hit", which could be an image, an HTML page, a video, a sound file, or anything else.
One crucial piece of information recorded in these log files is the "user agent", which typically contains the browser name or the name of a spider (a tool used by search engines to crawl the web). For example, "googlebot" is the spider for the Google search engine.
Upon examining these user agent fields, you'll discover that your site is visited by a variety of entities with peculiar names:
Most of these are benign bots, used by major search engines to keep their indexes up-to-date. They play a crucial role in maintaining your site's visibility and driving traffic. However, buried within your log files, you may also find names like EmailSiphon and Cherry Picker. These are malignant bots used by spammers to harvest email addresses.
Email harvesters scan every single page on your website, looking for email addresses, particularly "mailto:" type links. They are commonly found on websites as they provide a convenient way for visitors to send emails.
Email addresses are also often left in guestbooks, message boards, and other online communities, making them a goldmine for spam harvesters. They can quickly and easily gather dozens, hundreds, or even thousands of valid and usable email addresses.
So, what can you do to protect yourself against these email harvesters? Here are a few strategies:
By understanding the threat of email harvesting and taking steps to protect yourself, you can fight back against this internet menace.
The In's and Out's of Pre-Owned Domain Names
Discover the complexities of acquiring pre-owned domain names, including potential advantages like inherited SEO benefits and pitfalls such as inheriting spam or legal issues. Learn how to navigate this tricky terrain effectively.Why use multiple domain names?
It's quite common for a site to be ... by more than one domain name. In fact, most sites are ... by at least two: a www version and a non-www version. These are usually set up to referenGoogle And Duplicate Content
I've been ... the ... about Google and mirrored ... for some time. It is "common ... that Google ... page rank when it ... that content is ... ...