Trilithon Software     Software for the Macintosh Millennium . . . 
Company
Trilithon Home Page
Trilithon Explained
Contact Trilithon
Products
Mac OS X Products
Book Products
Services
Mac OS X Developer
Java Developer
PostScript Programming
Web Site Design
Technical Writing and Authoring
Background
Former Clients
Former Employers
Personal
Henry Personal Stuff
Spam Manifesto

. . . or Lobster Thermidor a Crevette with a mornay sauce served in a Provençale manner with shallots and aubergines garnished with truffle pâté, brandy and with a fried egg on top and . . . . SPAM . . .

 

Junk E-Mail—better known as Spam—is a huge problem for Internet users. One large United States Internet company—which claims to have a No Spam “Acceptable Use Policy”—tacitly condones Spam, and is responsible for an estimated thirty billion Spams a year.

Each day, Spam accounts for roughly three thousand terabytes—that is, three thousand trillion bytes—of Internet traffic. This web page and the pages it links to contain thoughts on Spam.

Spammers use a variety of slippery arguments to bolster their case—but deep down, they really know they are breaking rules and trespassing. Before we get into the arguments and rebuttals, you should know the simple rules about Spammers. Then, follow the links below for readings on Spam.

Spammer Rule 1 Spammers Are Thieves
Spammer Rule 2 Spammers Are Stupid
Spammer Rule 3 Spammers Are Liars
Spammer Rule 4 If a Spammer appears to be telling the truth, refer to Rule 3
What To Do and What Not To Do About Spam

What To Do and What Not To Do in Matters of Spam . . .

The First Amendment

The First Amendment—it protects free speech, but not encroachment or trespass . . .

This Spam Is Not Spam

This Spam Is Not Spam—because the Spammer said so . . .

Click Here to Unsubscribe

Click Here to Unsubscribe—and get onto two more Spam lists . . .

Broken Promises of the Internet

Broken Promises of the Internet—or, why women get advertisements for penis enlargement creams . . .

Criminals of the Internet

Criminals of the Internet—or, a behavioural comparison of Spammers with Petty Criminals . . .

Legitimate versus Spam Haus

Legitimate Business versus Spam Hausen—or, the identifying characteristics of legitimate businesses with nothing to hide, compared to Spam Hausen with everything to hide . . .

Postal Junk Mail versus Spam

Ordinary Postal Junk Mail versus Spam—the identifying characteristics of legitimate postal junk mail, compared to Spam Hausen . . .

The Principle of Mediocrity

The Principle of Mediocrity—or, how you detect bogosity by just looking around you . . .

Do Your Sums

Do Your Sums—or, forget products, you can make zillions just selling dealerships . . .

Stop Junk E-Mail Logo

Visit the fine web site of John Rivard at JCR Design for thoughts on the fight against Spam.

Visit Quatloos

Visit the fine Quatloos web site, where you can learn that Six Koos make a Quatloo, and Eight Quatloos make a Mooloo, and learn the real values of Koos and Mooloos. In all seriousness, the Quatloos web site is devoted to exposing Frauds and Scams of all types, including Multi-Level Marketing.

Visit SpamHaus

The Spamhaus Project tracks the Internet's worst Spammers, known Spam Gangs and Spam Support Services, and works with ISPs and Law Enforcement Agencies to identify and remove persistent spammers from the Internet. The Spamhaus Project are associated with The Spamhaus Block List (SBL) and The Registry Of Known Spam Operations (ROKSO).

Visit The Spamhaus Block List

The Spamhaus Block List (SBL) is a free realtime DNS-based database of IP addresses of verified spammers, spam gangs and spam support services. The SBL is used by ISPs and corporate networks worldwide to protect customers and mail servers from persistent spammers and currently protects the mailboxes of an estimated 80 million Internet users.

Visit The Registry Of Known Spam Operations

The Registry Of Known Spam Operations (ROKSO) collates information and evidence on known hard-line spam outfits that have been thrown off Internet Service Providers three times or more.

Copyright © 1994 – 2012 Trilithon Software

Page Updated 2011 December 10