CERN Accelerating science

This website is no longer maintained. Its content may be obsolete. Please visit http://home.cern/ for current CERN information.

CERN home pageCERN home pageDocuments by ReferenceDocuments by ReferenceCNLsCNLsYear 2002Year 2002Help, Info about this page

Contents
Index

Editorial Information
Editorial
If you need help
Announcements Physics Computing Desktop Computing Internet Services and Network Scientific Applications and Software Engineering The Learning Zone User Documentation
Previous:A New Infrastructure for the CERN Electronic Messaging Service
Next:Batch Nodes on Non-Routable Network
 (If you want to print this article)



Receiving Unwanted Email?

Denise Heagerty , CERN Computer Security Officer


Abstract

This article gives advice on recognising SPAM (unsolicited email) and viruses so you can delete them quickly.


Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the mail looks suspicious, do not even read it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open unexpected attachments (if you are unsure check with the sender first). SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them:

  • faked email addresses: mails can appear to be from people you know or even from yourself. Your own email address can appear in mails which you did not send, resulting in non-delivery messages or unexpected replies.

  • enticing subjects: the mail subject uses words to make you curious, believe the email is important, or specific to you, so that you will read it.

    Opening an attachment could infect your computer with a virus.
  • asking you to forward email to people you know: this is probably a viruses or false information - do not forward such email.

  • join a petition or support a cause: the petition or cause rarely exists, it is more likely that your email address will be collected and used for further SPAM mails (as sender or receiver). References to recent of topical events are common techniques to make the false information look more realistic.

  • click on a web site: if you click you could be downloading a virus. Click "cancel" (instead of "ok") or close unexpected dialogue boxes when using the web. This can also be a technique to validate your email address and increase your chances of receiving more unwanted emails.

  • money scams: one of many examples of false information - do not believe them just delete them.

  • response to your request: the mail may pretend that you made a request so that you will take it more seriously.

  • remove from a list: asking you take action to remove yourself from a list you did not join can be used to validate your address for (ab)use in the same way as petitions and causes.

CERN's email gateways filter more than 45,000 SPAM emails every day, but still such email can reach you as distinguishing SPAM from intended email is not easy. Further advice and details of CERN's anti-SPAM techniques are at URL:

http://cern.ch/MailServices/docs/problems/spam/spam.html

CERN's computer security recommendations also provide useful guidance:

http://cern.ch/security/recommendations



For matters related to this article please contact the author.
Cnl.Editor@cern.ch


CERN-CNL-2002-003
Vol. XXXVII, issue no 3


Last Updated on Tue Dec 10 13:41:47 CET 2002.
Copyright © CERN 2002 -- European Organization for Nuclear Research