Spam Document

Posted in : Computer Systems, Email, internet, Security on by : HeadGeek Comments: 0

Click HERE for shareable PDF

Spam Document…

Purpose: It is my hope with this document that it will help you recognize spam emails and know how to avoid the traps that are set in them.  Remember a spam email is only annoying, until you click a link or open the attachment.   When you do click or open anything with this spam email, it can have catastrophic results.


Following are examples of emails that I have received…

The Invoice:


This is a common email.  Sometimes it includes an attachment with a file that will infect your pc, or a link that will direct you to a fake website for payment.  It might sometimes even include a familiar email address of someone you know.



The Website Notice:


Again, since I host my own websites, I know immediately this is fake.  However, its official looking status has fooled many into paying for or allowing others control of their websites.

The Long lost relative:


I have even received these from those trying to fake messages from relatives.  Sometimes they contain messages of an inheritance, but the premise is still the same.  Get me to click links to either infect my computer or get my money.

Online site Purchasing:


This one is one of the most effective as it looks official.  How would they know you use amazon to purchase?  They don’t but the odds are high when they send millions of emails that someone would be an amazon customer.  Notice the link in the center by number one.  It shows, however if you clicked that link the box above shows you that it would not take you to the amazon website.  It would take you to a site that is tricking you into revealing your amazon account so they can purchase items using your account.

Currently as of 11am this morning, I have received 375 spam emails with different variations of the ones above.  However, with the filtering in my email server, for the most part most of these emails are filtered out.  If they were not filtered, any legitimate emails would be lost in all the noise.  Most email servers deploy some type of spam detection system.  These systems must be maintained and upgraded as the spammers change their methods for sending this spam.  This is an ongoing issue that will continue until everyone uses a secure email system.

Protecting yourself from spam:

  1. Make sure that the person sending the email is legit. It can be easily done by looking at the from address…
    FROM: []
    – even though it shows a valid email at the beginning, the actual email is contained in the square brackets.
  2. Never ever, reply to, forward these emails
    – if you do, your account will be flagged for sending spam. Since you sent the spam email…
    – if you need to confirm the email, send the email as an attachment to the actual email address to confirm
  3. Never ever, click any links contained in the emails
    – if you click a link you confirm to the spammer that there is someone at the end of this email address
    – you could infect your pc with any files that are downloaded to your pc
  4. When you get these emails and they are spam, right click on them and mark them as spam. Or better yet, delete them immediately!
  5. If you believe you have opened an infected attachment, turn off your computer immediately and contact tech support. This will prevent a network wide infection and prevent the virus from damaging your files.

What can be done to eliminate spam?

Nothing!  Microsoft has been working on a way to eliminate spam for 20 years with no success.  However we can minimize the amount of spam we receive by being careful with the emails we receive.

Why do the spammers Spam?

  • Money – plain and simple
  • They sell our email addresses in the dark web for about a penny each for unconfirmed
  • When we click a link in these fake emails, the email addresses become confirmed and are worth 5 cents each. It does not seem like a lot.  However when dealing with millions of email addresses, its adds up.
  • They will hijack our systems, steal our data, and hold hostage our files, again for money!


Please feel free to contact the writer of this document if you need help or advise on limiting spam.  I have been using emails from a time before they were even called emails.


Prepared by: Stanley Komarniski Headgeek
General know-it-all on Computers & technology



Leave a Reply

Your email address will not be published. Required fields are marked *