Use Verification Programs
If you’ve had it with spam, consider using a program (see Figure 5-19)
that authenticates users. But keep in mind that most of these services
charge a fee. These programs use a verification system to check any
sender who hasn’t been approved. Here’s how this usually works:
➟ The program scans your contact list and automatically
allows everyone listed there to contact you.
➟ When you receive an e-mail from someone who isn’t
in your contact list, the program holds the e-mail in
limbo until two things happen. First, the service sends
an e-mail to the sender and asks that person to verify
that he’s a real person by answering a challenge
response (entering text that he sees onscreen).
Second, only when the sender has successfully
responded to the challenge is the e-mail delivered to
your inbox. Because spam e-mail is sent by auto-
mated malicious programs, there’s no human to
respond to the challenge. Consequently, an auto-
mated sender’s e-mail doesn’t get through. Any e-mail
that doesn’t pass this test doesn’t land in your inbox.
➟ People not on your list have to answer the challenge
only once for each email account they use to be vali-
dated for all future e-mails.
➟ Any e-mail from those who aren’t verified is stored in
a special folder for a week. This gives you the chance
to review the messages in case you want to accept any
of them.
One such program, Spam Arrest (refer to Figure 5-21),
allows you to try its service free for a month before
you purchase a subscription. Go to http://www.spam
arrest.comto sign up.
114
Part II: Using the Internet While Dodging the Risk