Oracle Tips by Burleson
Chapter 13 - Spam, Spam,
An Alternative View of Spammers
The loss of privacy was not part of the deal
for those patrons who were kind enough to take the time to complete
the survey in the first place. To make matters worse, the lack of
response from the restaurant when the problem was brought to their
attention showed a serious lack of concern for their patrons e-mail
security. Despite repeated attempts to resolve the problem, it took
several months of dealing with management before similar e-mails
Learning More about Spam
It may help to know more about the way e-mail
works in order to understand how spammers use it effectively.
Figure 13.6 below is a representation of a popular e-mail scam.
This category of fraudulent spam is known as a phish-scam. It is
designed to convince the recipient that they have been contacted by
a major financial institution with important business to conduct.
The sender of the message does not know
anything about the recipient’s actual financial status or where they
have accounts. The scammer is playing a game based on percentages.
They know from experience that a certain number of people will
accept the message as legitimate and respond to the message
accordingly. This will always have negative results for the
unsuspecting victim, since the goal is to extract actual financial
information from the target recipient.
Once information is released, such as bank
account numbers or credit card information, the scammers will empty
accounts or run up charges to the limit. Users must be vigilant.
This sort of information should never be exchanged via e-mail.
Figure 13.6 - Phishing scams will appear to
come from a legitimate company.
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA