Hostetter, David
October 2003
Hospitality Upgrade;Fall2003, p30
Trade Publication
Discusses some ways on how electronic mail users can avoid receiving unsolicited electronic mail messages (spam mails) from direct advertisers. Types of spam mails and online advertisements; Selection of an e-mail provider with anti-spam solutions; Use of personal or business spam prevention software. INSET: Hoteliers BEWARE..


Related Articles

  • Spam I am.  // Consumer Reports;Jul2002, Vol. 67 Issue 7, p10 

    Discusses how many companies are disguising junk electronic mail (e-mail) so that consumers still receive it. Way that mail will state that one has requested the information; Description of unsubscribe options related to e-mail; Ways that consumers can avoid getting junk mail.

  • What generates e-junk? Wollenburg, Yvonne Chilik // Medical Economics;1/24/2003, Vol. 80 Issue 2, p13 

    Investigates the electronic mail addresses that attract spam messages. Addresses posted in chat rooms; Addresses posted at news groups and web pages.

  • Spam Blight Prompts a Counterattack. Roberts, Paul // InfoWorld;7/5/2004, Vol. 26 Issue 27, p16 

    Companies from across the technology sector have come forward with proposals to end the blight of unwanted electronic mail (e-mail) messages. Announcements including an agreement on industrywide best practices for e-mail providers, promise new anti-spam tools and technology from Microsoft...

  • SP2 confounds the world. Gibbs, Mark // Network World;9/13/2004, Vol. 21 Issue 37, p62 

    This article focuses on the experience of the author upon firing up his desktop machine and Microsoft's mega update, Service Pack 2. It busted one utility that he particularly like called Infotriever from Infotriever Inc. He first stumbled across this tool when he booked the flights for his...

  • Barred at the door.  // Multichannel Merchant (Penton Media, Inc.);Jun2009, Vol. 5 Issue 6, p25 

    The article considers the issue of blocked e-mail messages to intended recipients. Explanation is offered on the right of inbox providers to block messages from senders, with author alleging that compliance with the U.S. Can Spam Act is not a sufficient guarantee for e-mail delivery. It...

  • Splog Infestation. Cone, Edward // CIO Insight;Oct2005, Issue 58, p24 

    This article reports on the occurrence of spam in the advertising world. Weblogs are inexpensive to produce, and show up well on the big search engines. Thus the inevitable birth of the spam blog, also known as splog, an automated Web site that mimics the appearance of a weblog in order to lure...

  • Prevent Spam Filters from Blocking Legitimate E-mail. Goldsborough, Reid // Black Issues in Higher Education;9/23/2004, Vol. 21 Issue 16, p36 

    Considers factors to prevent spam filters that affect legitimate electronic mail messages. Problems experienced by product development manager Jim Butt in emailing; Role of Comcast in protecting subscribers from spam; Ways to avoid electronic mails from being blocked by spam-filtering programs.

  • When time travelers send spam.  // Network World;10/27/2003, Vol. 20 Issue 43, p6 

    Presents a case concerning unsolicited electronic mail message in Massachusetts.

  • Jupiter Assesses Cost of Blocked E-mail.  // Direct;Mar2004, Vol. 16 Issue 3, p53 

    Presents information on the results of a report from Jupiter Research, on blocked e-mail, released as of March 2004. Cost of erroneously blocked e-mail by 2008; Percentage drop in improperly blocked messages from 2003-2008; Reported increase in unsolicited e-mail; Growth rate for permission e-mail.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics