Spam is not something that you should just accept. Spam is something that you prevent.
by Frank Durda IV

[Copyright 2002,2003,2004 Frank Durda IV, All Rights Reserved.
Mirroring of any material on this site in any form is expressly prohibited.
The official web site for this material is:  http://nemesis.lonestar.org
Contact this address for use clearances: clearance at nemesis.lonestar.org
Comments and queries to this address: web_software_2011 at nemesis.lonestar.org]
This is a living document, and it is updated from time to time. 
This document was last updated December 6th, 2004.


Spam and other Internet abuse is created by a relatively small number of individuals. However, spam and other abuse is allowed (or at least passively accepted) to be generated or relayed by the vast majority of Internet Providers, and the senders of spam are frequently encouraged (or at least the spam is passively accepted) by the vast majority of Internet Customers. These two factors are the main reasons why the volume of spam keeps growing.

If Internet Providers took action to deny the technical ability of their customers to spam and to prevent spammers located elsewhere from exploiting the Internet Providers network, and if both Internet Providers and Internet Customers made an effort to reduce or eliminate the financial gain of sending spam, these actions would do far more to eliminate spam from the Internet than anything else.

The following pages provide general and specific technical recommendations that will prevent spam and other forms of abuse. For Internet Providers, details on how to configure servers and networks to prevent spam and abuse are provided, along with suggestions on what corporate processes and policies are needed by all Internet Providers in order to maintain control of their own networks, something that they can easily lose through legal injunction.

For Internet Customers, there are specific suggestions on how to prevent spam, to negate the value of spamming, and to prevent your own computers from being exploited by spammers and hackers.


The Anti-Spam Creed

If you don't have time to read anything else, read and follow the creed appropriate to who you are. By following these rules, you will immediately do your part to prevent spam and abuse. Post these rules where they will be seen and followed.

Section 1: The Internet Customer Anti-Spam Creed (HTML)
Words for the Internet Customer to live by.

Section 2: The Internet Providers Anti-Spam Creed (HTML)
Words for the Internet Provider to live by.


Internet Customer Anti-Spam Responsibilities

Section 3: Internet Customer Anti-Spam Responsibilities (HTML)
Detailed information for customers (big and small) of Internet services on: Section 4: Internet Customer Anti-Spam Firewall and Router Configuration (NOT YET AVAILABLE)
If you have a dedicated Internet connection such as a T1, DSL, or cable modem, you may have a router, or the operating system on your computer may have some good firewall capabilities. Use the firewall or router to protect your computer(s) from being used by hackers or spammers.


Internet Providers Anti-Spam Responsibilities

Section 5: Internet Provider Anti-Spam Responsibilities (HTML)
Detailed information for Internet Providers (big and small) on: Section 6: Internet Provider Anti-Spam Network and Router Configuration (HTML)
Examples of router and network configuration that will make your network unsuitable to spam from or to relay spam through.

Section 7: Internet Provider Anti-Spam Mail Server Configuration (NOT YET AVAILABLE)
For the spam that gets past your fortified network (the recommendations made in Section 6) and some spam still reaches your mail servers, improved checking and filtering on your mail servers can keep most spam from reaching any mailboxes.



This information is provided by the author and contributors "AS IS" and any express or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the author or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods of services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this information even if advised of the possibility of such damage.

There is no obligation to provide any form of support, updates or assistance, and such queries may not receive any acknowledgment.

[Copyright 2002,2003,2004 Frank Durda IV, All Rights Reserved.
Mirroring of any material on this site in any form is expressly prohibited.
The official web site for this material is:  http://nemesis.lonestar.org
Contact this address for use clearances: clearance at nemesis.lonestar.org
Comments and queries to this address: web_software_2011 at nemesis.lonestar.org]

Visit the nemesis.lonestar.org home page and index

Valid HTML 4.01!