How E-mail Whitelists Work
- Date: 2006-12-01 - Word Count: 523
Share This!
E-mail whitelists are the ultimate in spam protection, and go beyond the safeguards used by spam filters and spam blockers to almost completely eliminate the possibility of receiving spam. Whitelists work like fortresses to completely protect the user against invasion.
Before e-mail from a new address can be allowed into the inbox, the user must answer questions or type in a partially obscured code that is recognizable on normal computers, but cannot be detected by the kind of software spammers often use.
The result is a combination of computer technology and a user's own judgement to decide which users will be allowed to send e-mail to the account or not. Once the potential sender is approved, he or she can send e-mail to the account without having to re-register.
Many people prefer whitelists to spam filters and spam blockers. Spam filters are often free with any e-mail provider, and use probability formulas to calculate the likelihood that e-mails containing certain keywords will be spam.
The problem with this approach is that many spammers can get around these filters by using words not associated with spam and by intentionally misspelling keywords to fool the filter. Although filters are effective, there is usually a 10% to 20% failure rate. This may be acceptable to some, but for business owners who receive hundreds of e-mails a day, this means that at least 100 spam e-mails a day end up in the inbox.
Spam blockers offer a higher degree of protection, but also have their drawbacks. Spam blockers must be downloaded and require registration to send e-mails. All unfamiliar e-mails are sent to another file for the user to approve. Spam blockers, unlike filters, are entirely user driven, but have the disadvantage that sometime the user can be fooled concerning what is spam. Spammers often spoof e-mails that are familiar to the user to encourage the user to accept the e-mails.
Whitelists combine the best of technological ability and user judgement. The user approves a message, but the person registering is required to type in a code that would not be recognizable to those with spamming software. Blocking is not merely left to the judgement of the user or to the computer's ability to find spammers, but the combination of the two make whitelists the most effective choice for spam blocking.
Some may find whitelists to be a bit strict and inconvenient, and fear that some legitimate senders might be put off by the registration process. Others would rather take this risk than to accept spam. Once a person is registered, his or her e-mail is accepted on the site, so there is no more red tape. Another objection is that sometimes the code is difficult to read even for legitimate senders. However, a sender can always try to register again unless he or she has been blacklisted.
Although some believe that whitelists threaten to take some of the spontaneity out of e-mail, others believe that this spontaneity is not worth all of the spam. Business owners use whitelist to ensure that no valuable time is wasted sorting through hundreds of spam messages a day, and this also saves money in the long run.
Before e-mail from a new address can be allowed into the inbox, the user must answer questions or type in a partially obscured code that is recognizable on normal computers, but cannot be detected by the kind of software spammers often use.
The result is a combination of computer technology and a user's own judgement to decide which users will be allowed to send e-mail to the account or not. Once the potential sender is approved, he or she can send e-mail to the account without having to re-register.
Many people prefer whitelists to spam filters and spam blockers. Spam filters are often free with any e-mail provider, and use probability formulas to calculate the likelihood that e-mails containing certain keywords will be spam.
The problem with this approach is that many spammers can get around these filters by using words not associated with spam and by intentionally misspelling keywords to fool the filter. Although filters are effective, there is usually a 10% to 20% failure rate. This may be acceptable to some, but for business owners who receive hundreds of e-mails a day, this means that at least 100 spam e-mails a day end up in the inbox.
Spam blockers offer a higher degree of protection, but also have their drawbacks. Spam blockers must be downloaded and require registration to send e-mails. All unfamiliar e-mails are sent to another file for the user to approve. Spam blockers, unlike filters, are entirely user driven, but have the disadvantage that sometime the user can be fooled concerning what is spam. Spammers often spoof e-mails that are familiar to the user to encourage the user to accept the e-mails.
Whitelists combine the best of technological ability and user judgement. The user approves a message, but the person registering is required to type in a code that would not be recognizable to those with spamming software. Blocking is not merely left to the judgement of the user or to the computer's ability to find spammers, but the combination of the two make whitelists the most effective choice for spam blocking.
Some may find whitelists to be a bit strict and inconvenient, and fear that some legitimate senders might be put off by the registration process. Others would rather take this risk than to accept spam. Once a person is registered, his or her e-mail is accepted on the site, so there is no more red tape. Another objection is that sometimes the code is difficult to read even for legitimate senders. However, a sender can always try to register again unless he or she has been blacklisted.
Although some believe that whitelists threaten to take some of the spontaneity out of e-mail, others believe that this spontaneity is not worth all of the spam. Business owners use whitelist to ensure that no valuable time is wasted sorting through hundreds of spam messages a day, and this also saves money in the long run.
Related Tags: spam, junk mail, emails, spam filters, spam blockers, email whitelists
© 2006 www.Free-Spam-Blockers.Com
Author - Matt Garrett
Recent articles in this category:
- Chip Resetter
Some printer manufacturers, such as Canon, HP, Epson and Lexmark, put a chip into their inkjet or to - Services, Benefits And Selection Of Conference Call Provider
If you are seriously seeking for a conference call provider then be very careful in selecting the mo - Making The Most Out Of Your Chosen Business Phone Service Provider
In the United States, many cheap business phone services are available, as well as the services of i - Essential Buyers Guide For The Iphone 4
Released in the UK on the 24th June 2010, the iPhone 4 is considered by many to be the latest must-h - Various Business Phone Service Provider Choices
Communicate with your trading partners and a customer with the most productive way that does not eve - Conference Calling Companies - What Should You Really Look For In Conference Calling Companies.
First, let us first determine exactly what a conference call is.A conference call is really a phone - Sim Free Mobile Phone- Freedom From Any Kind Of Sim Free Phones.
SIM free mobile phone is the most popular mobile phones as it is with various offers and plan like t - Professional Yet Cheap Cell Phone Service Through Internet
Today, the demand and needs of commercial business has changed drastically. Now, the business patron - New Cellphones - High Tech Mobile Phones With Wonderful Features
New cellphones have become the essential widgets for communication and enjoyment. Gone are the days - Using Your Smartphone As Wi-fi
Using your cell phone to provide Wi-Fi to your laptop or iPad has now become an everyday occurrence.
Most viewed articles in this category:
- LG U830: Flavor of Chocolate, Power of 3G
Taking cues from the award winning design of the LG Chocolate, the latest offering, the LG U830 is - T-mobile: Bringing World 'simply Closer'
A proud member of one of the world's largest mobile companies, T-mobile is the UK network of T-mobil - Dishnetwork Is Better Than Other Television Service Providers
With over 12 million subscribers and a ranking of number one in customer satisfaction from JD Power - Sony Ericsson W850i: Complete Musical Package
To remain competitive in the market and to add novelty in its Walkman series Sony Ericsson has broug - Se K800i: an Excellent Camera Phone
Sony Ericsson's K800i is the first handset that comes with Cyber-shot brand and gives a true picture - Dish Network Offers A Variety Of Programming Packages
Dish Network offers a variety of programming packages for everyone's wants, needs, and budgets. Even - The Power of Influence
Years ago, the Carnegie Institute of Technology analyzed the records of ten thousand people and conc - Choosing A Web Hosting Provider By Their Customer Service
When choosing a web-hosting provider, there will be tons of questions you need answered before settl - Shield your Family With Reverse Cell Phone Number Search
Free reverse cell phone number searches is a great method that can help you in making certain that y - Sony Ericsson K610i: a Delight for Shutterbugs
Over the years camera phones have evolved. From being an add-on into the mobile phone, it has now be