Here are several ways to minimize the spam you receive, though it may not be possible to avoid it completely.
You’ll need at least two:
Make sure that each of your email addresses is a completely different combination of letters and numbers, with no obvious connection to any of your other addresses.
Many spam messages will ask you to mark a checkbox or click on a particular link if you don’t want to receive any more messages. However, if you do so, you won’t really be opting out. Instead, the spammer will know that your email address is active, and you’ll get even more spam, not less. On the other hand, if you want to be removed from a legitimate email list, especially one that you intentionally subscribed to, it should be safe to follow the removal instructions.
Ask your ISP about their filtering services. NC State filters email for spam and viruses.
A disposable email address is one that will forward all mail to your real address. A number of websites provide these, along with various services. Here’s how you would use one.
If you want to know the origin of spam you receive, you must use a different disposable address for each party to which you give your email address. Also, you can steer legitimate correspondents away from your posted disposable email address so that they won’t be inconvenienced when you have to change it. To do this, assign each person a disposable email address and ask that they use it instead of the posted one.
Read each item on a form carefully, especially the ones in fine print. Make sure that checkboxes and radio buttons are marked the way you want them to be. The default markings will often result in spam.
You can insert arbitrary extra characters in your email address to foil the special programs (robots) that search websites and postings for email addresses to harvest. This technique can be useful in newsgroups, forums and chat. For example, if your address is
myaddress@domain.com
then you could post it, camouflaged with extra text, as
my_remove-this-text_address@domain.com
Or you might substitute words or another symbol for the @ sign, since that is what the robots search for. For example, johndoe@your_isp.com could become johndoe_AT_your_isp.com. Be sure to tell human readers how to modify your camouflaged address before they use it.
Several email address encoders are available. Most are designed for use on websites, and some can be used on forums or web-based Usenet.
If you own a domain, you can use a feature that is probably already on its mail server and works like this:
When the server receives a message that is addressed to your domain but not to one of your existing email addresses, it will forward the message by default to your main email account. Here’s how you would make use of this feature to combat spam:
If you visit chat rooms, use a screen name that’s not associated with your email address.
If you forward virus warnings, chain letters, petitions, and similar emails, you may be vulnerable to more spam. If something is important enough to send to others, create a new email and copy the relevant information into it.
Use a firewall to prevent spammers from installing programs that would turn your computer into a spam-mailing machine. (What is a firewall?)
You can report spam to several authorities:
The Federal Trade Commission – See How to Get Less Spam in Your Email for an introduction to this service.
Your own internet service provider
The abuse services at the spammer’s internet service provider, which may have been disguised
Spammers make money even if only a small percentage of their recipients buy their products, so don’t purchase anything offered in a spam email. That way, you’ll be taking an anti-spam position as well as saving yourself from a possible scam artist.
If you receive a spam message that tries to sell you a recognized name brand product, file a complaint with the company that owns that brand. Send them a copy of the spam message, including complete headers.