Simple Ways to Get Less Spam in Your Email
We have all been there. Wake up in the morning and find you have a dozen or so spam emails sitting in your inbox, all mixed in with your legitimate emails from family and business. You may have wondered how you can prevent so much spam from hitting your inbox.
The truth is …there really is no “magic formula” when it comes to fighting spam. Some people seem to never get any spam even if they give their email out to everyone they meet. For others, they seem to have been “blessed” with tons of spam, when they have been very careful who they have given their email too.
Here are some ideas that may help you prevent spam from hitting your inbox. Please remember, none of these ideas have any guarantee that you will not receive any spam.
- (As mentioned above) Be careful who you give your email out to. Never just hand over your email to just anyone (e.g., an online “signup” form to potentially win a prize).
- There are several places on the Internet where people collect email addresses to put into lists to sell to spammers. Unfortunately, many of these signup forms look legit and people fall for them, not realizing that they are getting setup to be spammed.
- Many companies that require your email have good intentions, but their systems may get compromised and their customers’ emails get leaked to spammers. In this case, that is not your fault. Life happens.
- In addition, your friends’ and family’s email accounts may become compromised at a certain point in time. This will undoubtedly cause their address books to become leaked. You can guess what the hacker will do with all the emails he collects.
- Use a third-party email spam filter (e.g., SpamAssassin).
- Some examples of third-party spam filters are: SpamAssassin, rspamd, and Gmail.
- SpamAssassin is a self-hosted software program. When your email server receives an email, it sends the email to SpamAssassin which then tries to determine if the email is legit. However, SpamAssassin also has quite the learning curve. So, unless you have time to learn how to set it up properly, I would opt to using a commercial third-party spam filter.
- SpamAssassin can be trained what emails are spam and what emails are not spam.
- rspamd is another self-hosted software program for filtering email. While not as popular as SpamAssassin, there is no reason to disregard the program, if you want an alternative to using SpamAssassin or another email filter.
- Gmail has an excellent spam filter. There are people (mainly businesses) who purposely forward all mail to a Gmail account they setup to have Gmail’s system filter out the illegitimate emails. They can do this even if they own their own domain name, and are not using a Gmail email address for their business.
- Since Gmail is not self-hosted, all your email ultimately gets seen by a third-party. Some individuals and businesses may not be comfortable with this idea.
- SpamAssassin is a self-hosted software program. When your email server receives an email, it sends the email to SpamAssassin which then tries to determine if the email is legit. However, SpamAssassin also has quite the learning curve. So, unless you have time to learn how to set it up properly, I would opt to using a commercial third-party spam filter.
- Some examples of third-party spam filters are: SpamAssassin, rspamd, and Gmail.
- Use a “catch-all” anti-spam system.
- What a “catch-all” system does is redirect all your email to a “bin” of sorts and lets you – later – review all the email you wish to forward to your email.
- An example of a program that does this is “Tagged Message Delivery Agent (TMDA)”.
- You can do a Google search to learn more about it.
- The only downside to this type of anti-spam is you now effectively have two emails to manage instead of one. You must watch and manage the “anti-spam bin” and you still must monitor your real email. For many people, this would not be acceptable or practical.
- Use an email alias instead of giving out your real email.
- This is when you have multiple email addresses that all forward to your real (main) email address.
- This is like having a forwarding address at the US Post Office.
- For example, you have your personal email: alfred@example.com. Now you want to sign up for a new online service, but you do not want to give out your personal email. You setup an alias ad130@example.com and give that email to the online service instead of your actual email. Now anytime the service emails you, the email is forwarded from ad130@example.com to alfred@example.com.
- In the event the service gets compromised and you start getting spam to ad130@example.com, you can create another one ad250@example.com and continue using the service while stopping the spam that started coming to the other email alias.
- Unfortunately, there are a couple of problems with this idea.
- 1. With several email aliases, you must now keep up with all these virtual email accounts, instead of just one (your main email).
- 2. Unless you are self-hosting your email, in which case you can set as many email aliases as you need, some free email services may not allow you to create 20+ emails for the purpose of forwarding to another email address. It would depend upon the email service’s “Terms of Service” …what they allow and do not allow.
Posted in Computers, Internet and Servers, Software, Tips & Tutorials
List of Free and Public DNS Resolvers
Here is a list I compiled of free and public DNS resolvers you can use. Hopefully this will save you some time looking for an alternative DNS resolver.
Last Updated: August 2022
Name | IP Address & Notes |
Cloudflare |
1.1.1.1 1.0.0.1 No DNS filtering; everything allowed |
Cloudflare |
1.1.1.2 Filters malware domains; useful if you have a public Internet service (e.g., library, coffee shop) |
Cloudflare |
1.1.1.3 Filters malware & adult content |
8.8.8.8 8.8.4.4
|
|
Quad9 |
9.9.9.9 149.112.112.112 2620:fe::fe [IPv6] 2620:fe::9 [IPv6] Filters malware domains & DNSSEC validation |
Quad9 |
9.9.9.11 149.112.112.11 2620:fe::11 [IPv6] 2620:fe::fe:11 [IPv6] Filters malware domains & DNSSEC validation + ECS enabled |
Quad9 |
9.9.9.10 149.112.112.10 2620:fe::10 [IPv6] 2620:fe::fe:10 [IPv6] No malware domain filtering, no DNSSEC validation |
OpenDNS |
208.67.222.222 208.67.220.220 Without an OpenDNS account, supposedly it blocks some malware and phishing domains; with an account, you can have much more control over what it blocks and does not block |
Posted in Computers, Internet and Servers, Software, Tips & Tutorials
How to Tell if Someone is Lying Online or in a Text Message
We have all been there. Someone saying something online that sounds incredible and everyone (including ourselves) want to believe it is true. However, how can we be sure that someone is telling the truth online, especially about their own experiences (e.g., an anecdote)?
Technically the proper etiquette for online conversations is to believe whatever someone says, until you have a reasonable doubt about their honesty. Unfortunately, experience has taught me it is always best to take everything someone says into question, and verify everything you are told.
You do not know how many times I have failed to verify something, then later discover the information I believed was wrong all along. That is both embarrassing and aggravating, since I may have spent years believing misinformation that “everyone said was true”, instead of doing my own research on the matter. As the saying goes: “A lie can travel halfway around the world before truth can put its shoes on.”
Before I continue, let me say this: There is no 100% reliable way of knowing if someone online is telling the truth or a lie when they give a “personal testimony” about a particular topic, but we can come close by using some critical thinking.
With that, here are a few things to watch out for when someone gives an anecdote online.
- Lack of personal pronouns
- When someone is lying, they tend to distance themselves from their story (unconsciously). They achieve this by omitting personal pronouns (e.g., “I”, “me”, “myself”) from their story. While this is not 100% proof someone is lying, it is still a good sign.
- Think about it. Why would someone who is supposedly giving their own “personal story” omit themselves from the story? That does not make sense, hence why it makes the story look made up.
- Stories that sound generic / bland / too convenient
- Usually when someone is making something up, they give basic information …not detailed information. This is because the human brain is “busy” thinking up a story to tell, not about what words should be used to convey the story realistically. This makes the story come across as fake – which it is – and people who pay attention will be suspicious.
- Ask the poster for more details. If they take too long to respond, or fail to give a response, that is a sign the story is made up (or at least exaggerated).
- I notice this frequently when listening to supposedly real-life scary stories on YouTube. There are a few stories that I believe are real, but several stories sound made-up under the guise of being genuine. Some YouTube channels have even started to claim the stories are “based on real-life events”, which means not all the facts are legit to begin with.
- Stories that contain an advertisement
- This is when someone gives their “experience” about something. However, in the middle (or towards the end) of their message, they advertise a product they are selling.
- There is a very high chance they are making up their (potentially) interesting story to get you interested in what they have for sale.
- I saw something similar to this on the Q&A website Quora. Someone asked a question and a guy responded. He gave an interesting “personal” story that even got my attention at first. However, he put a link to a product he was selling that supposedly went with his “personal” story.
- What is even more interesting (and funny), is that someone else on Quora also had the exact same story and ad the original guy posted, answering the same question.
- Obviously this was some product multiple people were trying to resell and were just copy & pasting the same ad template multiple times to several different websites (with their affiliate link), hoping to get a few buyers.
- This is when someone gives their “experience” about something. However, in the middle (or towards the end) of their message, they advertise a product they are selling.
- Does the poster make extraordinary claims in their story?
- There is a saying: “Extraordinary claims require extraordinary evidence.”
- Anytime someone makes extraordinary claims, they need to provide extraordinary evidence (detailed evidence) to back up the story. Anyone can make anything up online (e.g., “I won big in the stock market, and now I own a million-dollar mansion.”), but without detailed evidence, I would be careful blindly believing such a story.
- You must be careful of various media given as evidence for someone’s anecdote. This is not to say that no media can be trusted, but today you must be careful what you choose to believe.
- Audio files can easily be manipulated with little to no evidence of any tampering.
- Usually the audio’s waveform is analyzed to detect tampering.
- The problem is a lot of audio is compressed (e.g. mp3 files). This can cause the waveform to change, making it virtually impossible to know for certain that someone purposely modified an audio file, since anything that appears “abnormal” in the waveform could just be due to the audio compression, not someone tampering with it.
- It is difficult (sometimes impossible) to prove what you are hearing in an audio file is authentic and not manufactured to sound real.
- For example, someone may have “recorded” a conversation of someone plotting to steal a large sum of money. However, the person in the audio is an imposter – someone who sounds just like the person that is being framed. If you were to go based upon what the audio file appears to prove, you would be going after the wrong person the whole time.
- Photos can easily be changed to “fit the narrative” via Photoshop. I have personally used Photoshop for over 10 years and know this powerful software can be used to make things appear different than what really happened.
- Video is harder to fake, but possible thanks to deep faking technology. However, a video does not need to be “deep faked” to be false (or at least misrepresented).
- For example, someone could show video clips from an old World War II documentary, and claim the footage was taken from a joint operation of American and British spies, recording a German base experimenting with space-alien technology.
- What does the video really show when researched? Just some German outpost on the lookout for Allied aircraft.
- See what I mean? People can give you real video footage, with real people in it, but the footage itself is misrepresented to show something other than what was really going on. For most viewers, they may be completely unaware they are being lied to.
- In addition, a video’s title may be inaccurate causing someone to think the video is showing or proving something when that is not the case.
- This is known as “clickbait”. Clickbait is just someone lying about their content, hoping you will click on it for them to get money via ads that are shown to you.
- Some clickbait lies are obvious (e.g., nothing in the video matches the thumbnail; this happens a lot on YouTube), and other lies are not so obvious and require attention to detail to be discovered.
- For example, someone could show video clips from an old World War II documentary, and claim the footage was taken from a joint operation of American and British spies, recording a German base experimenting with space-alien technology.
- Audio files can easily be manipulated with little to no evidence of any tampering.
- Multiple inconsistencies
- Whenever someone gives a story, and there are one or more inconsistencies in the story, this is a good sign the story is not accurate. If something really happened to someone, they would not keep changing the details of the story.
- It is best to ask the person about the inconsistencies and see what they say. If they get angry, argue, or avoid the question, then you have your answer.
- I once knew a guy that would tell “epic” stories of himself, but when asked for proof, he would quickly change the subject. Obviously he was making stuff up to get an ego boost.
- The “I did that too” bandwagon effect
- This is when someone makes an extraordinary claim, and everyone else suddenly makes the same (or similar) claim too. It is like an “epidemic” of extraordinary claims!
- I saw this happen once on a health forum. Someone made a huge claim, and then several other people started making similar claims (all on the same forum thread).
- After about a page or two of people making claims, someone finally posted saying he thought everyone was lying and that what they were doing – if true – would have hurt themselves. Like clockwork, virtually everyone stopped making claims after his post.
- He called their bluff, especially since I do not recall anyone challenging his accusation. I too believe people were looking to boost their egos, and were willing to lie to strangers online to get that ego boost.
- I saw this happen once on a health forum. Someone made a huge claim, and then several other people started making similar claims (all on the same forum thread).
- This is when someone makes an extraordinary claim, and everyone else suddenly makes the same (or similar) claim too. It is like an “epidemic” of extraordinary claims!
Something to keep in mind. People are not talking face to face when using web forums, instant messaging, posting a comment, etc. That fact tends to make people feel more comfortable exaggerating information – or just plain making up information – about themselves or others in their anecdotes. No one is around to verify their information, much less “punish” them for lying.
This happens a whole lot more on the Internet than people realize, especially if the anecdote someone gives strokes their own ego.
Posted in Computers, General, Internet and Servers, Society