Monday, April 27, 2009

Mudahnya Cek E-mail Baru di Gmail



ARTIKEL TERKAIT:
Fitur Baru Gmail: Suggest More Recipients
Salah Kirim E-mail? Tak Masalah!
Gmail Sediakan Moda Offline
PDF Viewer di dalam Gmail

Senin, 27 April 2009 | 16:55 WIB
Aplikasi ini sebenarnya sederhana saja, tapi cukup berguna bagi Anda yang sering malas membuka aplikasi e-mail di browser atau sedang menantikan datangnya suatu e-mail yang penting. Menurut pihak Google, Anda bisa memanfaatkan Gmail Notifier untuk mengecek e-mail baru secara otomatis setiap dua menit, memantau isi singkat hingga 30 e-mail, memilih suara notifikasi ketika menerima e-mail baru, dan memanfaatkan Gmail sebagai aplikasi e-mail default Anda.

Setelah mengunduh aplikasi ini, akan hadir ikon amplop di system tray Anda yang kemudian bisa dipakai untuk menunjukkan informasi mengenai e-mail baru apa saja yang belum Anda cek. Caranya? Ikuti saja langkah-langkah berikut.

1. Unduh Gmail Notifier yang berukuran 292KB di http://toolbar.google.com/gmail-helper/notifier_windows.html dengan mengklik tombol . Selain pengguna Windows (2000 atau XP), aplikasi ini juga bisa digunakan oleh pengguna Mac OS 10.4+.

2. Instal Gmail Notifier sampai nongol jendela yang meminta Anda memasukkan user name dan password. Isikan keduanya seperti layaknya Anda sedang log in ke Gmail. Centangi boks jika Anda tidak ingin memasukkan informasi tersebut berulang kali.

3. Selamat! Kini Anda sudah siap memanfaatkan Gmail Notifier. Silakan cari ikon amplop di system tray Anda (bagian bawah kanan layar). Arahkan kursor ke sana, dan Anda akan mendapati informasi mengenai kondisi inbox Gmail Anda. Misalnya, jika tak ada e-mail baru yang masuk, akan muncul keterangan “No unread mail”. Sedangkan jika ada, akan diberitahu berapa jumlah surat elektronik yang ada di sana (contoh pada gambar: “21 unread conversations”).

4. Silakan klik kanan di ikon amplop tersebut. Untuk membuka aplikasi Gmail secara otomatis di browser, pilih menu . Sedangkan jika ingin mengecek e-mail baru tanpa membuka browser, klik .

5. Setelah mengklik , akan muncul informasi singkat perihal setiap e-mail baru sesuai urutannya di inbox seperti nama pengirim, judul e-mail, dan isi e-mail sepanjang dua baris teks. Jika ada 21 e-mail baru di inbox Gmail Anda, berarti akan muncul pula 21 info singkat dari masing-masing e-mail secara bergantian di sisi paling kanan bawah layar. Tapi meski Anda tidak mengklik opsi ini, info singkat tersebut tetap akan muncul secara real time setiap kali ada e-mail baru masuk ke inbox atau memberitahu e-mail apa saja yang belum Anda buka ketika Anda menyalakan komputer.

sumber: PCplus

Monday, April 6, 2009

Cara Mudah Mem-back-up E-mail

Cara Mudah Mem-back-up E-mail
ARTIKEL TERKAIT:
Cegah Penggunaan Identitas Akun E-mail
Browsing dan E-mail Tanpa Akses Harddisk
Kirim E-mail tanpa Server SMTP

Senin, 6 April 2009 | 11:36 WIB
KOMPAS.com — Karena berbagai sebab, Anda perlu melakukan back-up e-mail. Salah satu alasan mem-back-up e-mail adalah ketika Anda ingin meng-install ulang Windows atau mengantisipasi komputer yang tiba-tiba mogok bekerja.

Untuk melakukan tindakan preventif, ikuti langkah berikut:
1. Buka Microsoft Outlook.
2. Klik menu [File], lalu klik [Import and Export...].
3. Pada kotak dialog Import and Export Wizard pilih [Export to a file] lalu klik [Next].
4. Pilih [Personal Folder File (.pst)], lalu klik [Next].
5. Pilih folder yang ingin Anda back-up. Jika Anda ingin mem-back-up semua folder, pilih Personal Folder dan tandai checkbox Include Subfolders, lalu klik [Next].
6. Tentukan nama file dan folder tempat hasil back-up akan disimpan, lalu klik [Finish].
7. Jika Anda ingin agar file hasil back-up Anda aman atau e-mail yang akan Anda back-up merupakan e-mail penting, berikanlah password pada file tersebut. Jangan lupa untuk memilih opsi [Compressibe Encryption], lalu klik [OK].

Nah, jika suatu hari nanti Anda membutuhkan kembali e-mail-e-mail yang telah di-back-up ke Microsoft Outlook, Anda dapat mencoba langkah berikut:
1 Masuklah Microsoft Outlook.
2 Klik menu [File], lalu klik [Import and Export...].
3 Pada kotak dialog Import and Export Wizard pilih [Import from another program or file] lalu klik [Next].
4 Pilih [Personal Folder File (.pst)], lalu klik [Next].
5 Tentukan nama file dan folder tempat file back-up Anda disimpan, lalu klik [Next].
6 Tentukan di folder mana Anda akan meletakkan file hasil impor tersebut, lalu klik [Finish].

Sumber: PCplus

Wednesday, December 10, 2008

Types of Spam


Types of Spam

Today spam is a household word, since 70-80% of all email traffic is spam. Although spam written in English is the most common, it comes in all languages including Chinese, Korean and other Asian languages. In most cases spam is advertising, and experience shows that spammers have targeted specific goods and services to promote. Some goods are chosen because a computer user is likely to be interested, but most are grey or black market goods. In other words, spam is usually illegal not only because of the means used to advertise the goods, but also because the goods and services being offered are illegal in themselves.

Other mass mailings are outright fraud, such as the notorious 419 messages which offer the recipients a share of funds which allegedly cannot be accessed by the sender for political reasons, in return for the recipient's help in legalizing these funds. The recipient is asked to provide bank account details; of course, if the recipient provides these details, the bank account will be emptied without their consent. This type of spam is usually called a 'scam'.
The commonest types of spam

Spam worldwide tends to advertise a certain range of goods and services irrespective of language and geography. Additionally, spam reflects seasonal changes, with advertisements for Christmas items and car heaters being replaced by air conditioner advertising in summer.

However, when averaged out over the course of the year, 50% of spam falls into the following categories:

* Adult content
* Health
* IT
* Personal finance
* Education/training

Adult content

This category of spam includes offers for products designed to increase or exhance sexual potency, links to porn sites or advertisments for pornorgraphy etc. Examples (we include basic texts but no graphics for ethical reasons):

Subject: very cheap erection tool :-)

Good day!

We would like to offer cheapest Viagra in the world!

You can get it at:
{LINK}

Sincerely,
Liza Stokes

Subject: i think you're gonna like watching me get off :-)

Hi...im Brooke..and I just got a webcam...lets have a little chat.. while you watch me get dirty .. haha;-)
{LINK}

Health and Medicine

This category includes advertisements for weight loss, skin care, posture improvement, cures for baldness, dietary supplements, non-traditional medication etc. which can all be bought on-line.

Examples:

Subject: Lose up to 19% weight. A new weightloss is here.

Hello, I have a special offer for you...

WANT TO LOSE WEIGHT?

The most powerful weightloss is now available
without prescription. All natural Adipren720
100% Money Back Guarantée!

- Lose up to 19% Total Body Weight.
- Up to 300% more Weight Loss while dieting.
- Loss of 20-35% abdominal Fat.
- Reduction of 40-70% overall Fat under skin.
- Increase metabolic rate by 76.9% without Exercise.
- Burns calorized fat.
- Suppresses appetite for sugar.
- Boost your Confidence level and Self Esteem.

Get the facts about all-natural Adipren720: {LINK}

Subject: Legal Low prices for Valium (Diazepam) (Caffeine FREE)

Rx Shopping Service Brings You our Newest Product:

Your personal shopping service that legally provides
Over the Counter (OTC) approved drugs from Canada and
around the world.

Order Valium (Diazepam) and it will be
guaranteed Delivery within 7 DAYS!

Do not miss out *Limited Quantity!

Visit Here: {LINK}

IT

This category includes offers for low-priced hardware and software as well as services for web site owners such as hosting, domain registration, web site optimization and so forth.

Examples:

Subject: Huge savings on OEM Software. All brand names available now stewardess

Looking for not expensive high-quality software?
We might have just what you need.

Windows XP Professional 2002 ............. $50
Adobe Photoshop 7.0 ...................... $60
Microsoft Office XP Professional 2002 .... $60
Corel Draw Graphics Suite 11 ............. $60

and lots more...

Personal finance

Spam which falls into this category offers insurance, debt reduction services, loans with low interest rates etc.

Examples:

Subject: Lenders Compete--You Win

Reduce your mortgage payments

Interest Rates are Going Up!
Give Your Family The Financial Freedom They Deserve

Refinance Today & SAVE
*Quick & EASY
*CONFIDENTIAL
*100's Of Lenders
*100% FREE
*Get The Lowest Rate

Apply Today! {LINK}

All credit will be accepted

To clear your name from our database please {LINK}or use one of the optins below.
Thank You

Call 1-800-279-7310
Or please mail us at:
1700 E. Elliot Rd. STE3-C4
Tempe, AZ. 85283

Education

This category includes offers for seminars, training, and on-line degrees.

Examples:

Subject: get a degree from home, Mas#ters, Bachelors or PHD

Call {Phone Num.} to inquire about our degree programs.

Whether you are seeking a Bachelors, Masters, Ph.D. or MBA

We can provide you with the fully verifiable credentials to get your career BACK ON TRACK!

No testing or coursework required Call: {Phone Num.}

we are sorry if you did not want to receive this mail.

To be removed from our list please call {Phone Num.}

Some new trends in spam content

Spammers are constantly seeking to enter new markets and develop new techniques. Some areas are evolving rapidly and should be monitored closely.
Political spam

This category includes mudslinging or political threats from extremists and possible terrorists. Though these are merely nuisance messages to end users, security and law enforcement officials need to be aware of such mailings, since they can provide clues to genuine potential threats, or be actual communication between terrorists.
Antispam solutions

Spammers advertise supposed antispam solutions in an effort to cash in on the negative publicity generated by spam itself. However, such offers often lead the user to sites where a Trojan will be downloaded to the victim machine, which will then be used for future mass mailings.

Example:

Subject: Join the thousands who are now sp@m-free

FORGET SPAM BLOCKERS!

Get SMART Spam Control That Always Delivers The Email You Want!

Finally, we discovered the ultimate solution that is guaranteed to stop all spam
without losing any of your important email! This revolutionary advanced technology
also protects you 100% against ALL email-borne viruses - both known and unknown.

We didn't believe it either until we actually tried it. So you be the judge and see for yourself.

{LINK}

Spam, viruses and junk email

Today, most people class all unsolicited email as spam, including automatic replies, emails containing viruses and unsolicited, but legitimate business propositions. Classifying all such emails as spam is broadly correct, but it must be highlighted that some categories of spam are more dangerous than others.

In particular, the alliance developing between virus writers and spammers is worrisome. The first half of 2004 brought several virus epidemics where viruses were circulated using spammer techniques. These outbreaks were classic examples of how botnets can be created by virus writers, and then sold to spammers for use in future mass mailings.

The Evolution of Spam


The Evolution of Spam
In the beginning

Spam (unsolicited bulk advertising via email) made its first appearance in the mid 1990s, i.e. as soon as enough people were using email to make this a cost-effective form of advertising. By 1997, spam was regarded as being a problem, and the first Real-Time Black List (RBL) appeared in the same year.

Spammer techniques have evolved in response to the appearance of more and better filters. As soon as security firms develop effective filters, spammers change their tactics to avoid the new spam blockers. And this leads to a vicious circle, with spammers re-investing profits into developing new techniques to evade new spam filters. The situation is spiralling out of control.
The development of spammer techniques
Direct mailing

Initially, spam was sent directly to users. In fact, spammers didn't even need to disguise the sender information. This early spam was easy enough to block: if you black listed specific sender or IP addresses, you were safe. In response, spammers began spoofing sender addresses and forging other technical information.
Open Relay

In the mid-1990s all email servers were open relay - any sender could send an email to any recipient. Spam and other security issues led administrators to start reconfiguring mail servers worldwide. However, the process was relatively slow, and not all mail server owners and administrators were willing to cooperate. Once the process was well underway, security analysts began scanning for the remaining open relay mail servers. These DNS RBLs were made available, making it possible for,security conscious administrators to block incoming mail from listed servers. However, open relay servers are still used for mass mailing.
Modem Pool

As soon as sending spam via open relay became less efficient, spammers began to use dial up connections. They exploited the way in which ISP providers structured dial up services and utilized weaknesses in the system:

* As a rule, ISP mail servers forward incoming mail from clients.
* Dial-up connections are supported by dynamic IP addresses. Spammers can therefore use a new IP address for every mailing session.

In answer to spammer exploitation, ISP providers began to limit the number of emails a user could send in any one session. Lists of suspect dial-up addresses and filters which blocked mail from these addresses appeared on the Internet.
Proxy servers

The new century saw spammers switching to high-speed Internet connections and exploiting hardware vulnerabilities. Cable and ADSL connections allowed spammers to send mass mailing cheaply and quickly. In addition, spammers rapidly discovered that many ADSL modems had built-in socks servers or http proxy servers. Both are simply utilites that divide an Internet channel between multiple computers. The important feature was that anybody from anywhere in the world could access these servers since they had no protection at all. In other words, malicious users could use other people's ADSL connections to do whatever they pleased, including, naturally, sending spam. Moreover, the spam would look as if it had been sent from the victim's IP address. Since millions of people worldwide had these connections, spammers had a field day until hardware manufacturers began securing their equipment.
Zombie or bot networks

In 2003 and 2004 spammers sent the majority of mailing from machines belonging to unsuspecting users. Spammers use malware to install Trojans on users' machines, leaving them open to remote use. Methods used to penetrate victim machines include:

* Trojan droppers and downloaders injected into pirate software which is distributed via file sharing P2P networks (Kazaa, eDonkey etc.).
* Exploiting vulnerabilities in MS Windows and popular applications such as IE & Outlook.
* Email worms

Anyone who has the client part of a program which controls the Trojan that has infected a victim machine controls the machine or network of victim machines. The resulting networks are called bot networks, and are sold and traded among spammers.

Analysts estimate that Trojans are installed on millions of machines worldwide. Modern Trojans are sophisticated enough to download new versions of themselves, download and execute commands from specified websites or IRC channels, send out spam, conduct DDoS attack and much more.
The development of spam content
Content Analysis

Many spam filters work by analysing the content of a message: the message subject, body, and attachments. Spammers today expend significant resources on developing content which will evade content filters.
Simple text and HTML

Originally, spam was simple: identical messages were sent to everyone on a mailing list. These emails were laughably easy to filter out due to the quantity of identical texts.
Personalised mail

Spammers then began to include a greeting based on the recipient's address. Since every message now contained a personalised greeting, filters which blocked identical messages did not detect this type of spam. Security experts developed filters that identified unchanging lines, which would then be added to filtration rules. They also developed fuzzy signature matching, which would detect text which only had minor changes, and statistic based self-modifying filtration technologies such as Bayesian filters.
Random text strings and invisible text

Spammers now often place either text strings from legitimate business emails, or random text strings at the beginning or end of emails in order to evade content filters. Another method used to evade filters is to include invisible text in HTML-format emails: the text is either too tiny to see or the font color matches the background.

Both methods are fairly successful against content and statistical filters. Analysts responded by developing search engines that scanned emails for such typical texts, which also conducted detailed HTML analysis and sophisticated content analysis. Many antispam solutions were able to detect such tricks without even analysing the content of individual emails in detail.
Graphics

Sending spam in graphics format makes it very hard to detect. Analysts are developing methods for extracting and analyzing text contained in graphics files.
Paraphrasing texts

A single advertisement can be endlessly rephrased, making each individual message appear to be a legitimate email. As a result, antispam filters have to be configured using a large number of samples before such messages can be detected as spam.
Summary

Currently, spammers usually use the last three methods in a variety of combinations. Many antispam solutions are incapable of detecting all three. As long as spamming remains profitable, users with poor-quality antispam software will continue to find their mailboxes clogged with advertising.

Contemporary Spammer Technologies


Spammers use dedicated programs and technologies to generate and transmit the billions of spam emails which are sent every day. This requires significant investment of both time and money.

Spammer activity can be broken down into the following steps:

1. Collecting and verifying recipient addresses; sorting the addresses into target groups
2. Creating platforms for mass mailing (servers and/or individual computers)
3. Writing mass mailing programs
4. Marketing spammer services
5. Developing texts for specific campaigns
6. Sending spam

Each step in the process is carried out independently of the others.
Creating address databases
Collecting and verifying addresses; creating address lists

The first step in running a spammer business is creating an email database. Entries do not only consist of email addresses; each entry may contain additional information such as geographical location, sphere of activity (for corporate entries) or interests (for personal entries). A database may contain addresses from specific mail providers, such as Yandex, Hotmail, AOL etc. or from on-line services such as PayPal or eBay.

There are a number of methods spammers typically use to collecting addresses:

* Spoofing addresses using common combinations of words and numbers - john@, destroyer@, alex-2@
* Spoofing addresses by analogy - if there is a verified joe.user@yahoo.com , then it's reasonable to search for a joe.user@hotmail.com, @aol.com etc.
* Scanning public resources including web sites, forums, chat rooms, Whois databases, Usenet News and so forth for word combinations (i.e. word1@word2.word.3, with word3 being a top-level domain such as .com or .info)
* Stealing databases from web services, ISPs etc.
* Stealing users' personal data using Trojans

Topical databases are usually created using the third method, since public resources often contain information about user preferences along with personal information such as gender, age etc. Stolen databases from web services and ISPs may also include such information, enabling spammers to further personalize and target their mailings.

Stealing personal data such as mail client address books is a recent innovation, but is proving to be highly effective, as the majority of addresses will be active. Unfortunately, recent virus epidemics have demonstrated that there are still a great many systems without adequate antivirus protection; this method will continue to be successfully used until the vast majority of systems have been adequately secured.
Address verification

Once email databases have been created, the addresses need to be verified before they can be sold or used for mass mailing. Spammers send a variety of trial messages to check that addresses are active and that email messages are being read.

1. Initial test mailing. A test message with a random text which is designed to evade spam filters is sent to the entire address list. The mail server logs are analysed for active and defunct addresses and the database is cleaned accordingly.
2. Once addresses have been verified, a second message is often sent to check whether recipients are reading messages. For instance, the message may contain a link to a picture on a designated web server. Once the message is opened, the picture is downloaded automatically and the web site will log the address as active. Most email clients no longer download pictures automatically, so this method is on the wane.
3. A more successful method of verifying if an address is active is a social engineering technique. Most end users know that they have the right to unsubscribe from unsolicited and/or unwanted mailings. Spammers take advantage of this by sending messages with an 'unsubscribe' button. Users click on the unsubscribe link and a message purportedly unsubscribing the user is sent. Instead, the spammer receives confirmation that the address in question is not only valid but that the user is active.

However, none of these methods are foolproof and any spammer database will always contain a large number of inactive addresses.
Creating platforms for mass mailing

Today's spammers use one of these three mass mailing methods:

1. Direct mailing from rented servers
2. Using open relays and open proxies - servers which have been poorly configured, and are therefore freely accessible
3. Bot networks - networks of zombie machines infected with malware, usually a Trojan, which allow spammers to use the infected machines as platforms for mass mailings without the knowledge or consent of the owner..

Renting servers is problematic, since antispam organizations monitor mass mailings and are quick to add servers to black lists. Most ISPs and antispam solutions use black lists as one method to identify spam: this means that once a server has been blacklisted, it can no longer be used by spammers.

Using open relay and open proxy servers is also time consuming and costly. First spammers need to write and maintain robots that search the Internet for vulnerable servers. Then the servers need to be penetrated. However, very often, after a few successful mailings, these servers will also be detected and blacklisted.

As a result, today most spammers prefer to create or purchase bot networks. Professional virus writers use a variety of methods to create and maintain these networks:

1. Exploiting vulnerabilities in Internet browsers, primarily MS Internet Explorer. There are number of browser vulnerabilities in browsers which make it possible to penetrate a computer from a site being viewed by the machine's user. Virus writers exploit such holes and write Trojans and other malware to penetrate victim machines, giving malware owners full access to, and control over, these infected machines.
For instance, porn sites and other frequently visited semi-legal sites are often infested with such malicious programs. In 2004 a large number of sites running under MS IIS were penetrated and infected with Trojans. These Trojans then attacked the machines of users who believed that these sites were safe.
2. Using email worms and exploiting vulnerabilities in MS Windows services to distribute and install Trojans:
1. Most recent virus outbreaks have been caused by blended threats, which included installation of a backdoor on infected machines. In fact, nearly all email worms have a Trojan payload.
2. MS Windows systems are inherently vulnerable, and hackers and virus writers are always ready to exploit this. Independent tests have demonstrated that a Windows XP system without either a firewall and antivirus software attacked within approximately 20 minutes of being connected to the Internet.
3. Pirate software is also a favorite vehicle for spreading malicious code. Since these programs are often spread via file-sharing networks, such as Kazaa, eDonkey and others, the networks themselves are penetrated and even users who do not use pirate software will be at risk.

Spammer Software

An average mass mailing contains about a million messages. The objective is to send the maximum number of messages in the minimum possible time: there is a limited window of opportunity before antispam vendors update signature databases to deflect the latest types of spam.

Sending a large number of messages within a limited timeframe requires appropriate technology. There are a number of resources developed and used by professional spammers available. These programs need to be able to:

1. Send mail via a variety of channels including open relays and individual infected machines.
2. Create dynamic texts.
3. Spoof legitimate message headers
4. Track the validity of an email address database.
5. Detect whether individual messages are delivered or not and to resend them from alternate platforms if the original platform has been blacklisted.

These spammer applications are available as subscription services or as a stand alone application for a one-off fee.
Creating the message body

Today, antispam filters are sophisticated enough to instantly detect and block a large number of identical messages. Spammers therefore now make sure that mass mailings contain emails with almost identical content, with the texts being very slightly altered. They have developed a range of methods to mask the similiarity between messages in each mailing:

* Inclusion of random text strings, words or invisible text. This may be as simple as including a random string of words and/or characters or a real text from a real source at either the beginning or the end of the message body. An HTML message may contain invisible text - tiny fonts or text which is colored to match the background.
All of these tricks interfere with the fuzzy matching and Bayesian filtering methods used by antispam solutions. However, antispam developers have responded by developing quotation scanners, detailed analysis of HTML encoding and other techniques. In many cases spam filters simply detect that such tricks have been used in a message and automatically flag it as spam.
* Graphical spam. Sending text in graphics format hindered automatic text analysis for a period of time, though today a good antispam solution is able to detect and analyze incoming graphics
* Dynamic graphics. Spammers are now utilizing complicated graphics with extra information to evade antispam filters.
* Dynamic texts. The same text is rewritten in numerous ways so that it is necessary to compare a large number of samples before it will be possible to identify a group of messages as spam. This means that antispam filters can only be updated once most of the mailing has already reached its target.

A good spammer application will utilize all of the above methods, since different potential victims use different antispam filters. Using a variety of techniques ensures that a commercially viable number of messages will escape filtration and reach the intended recipients.
Marketing spammer services

Strangely enough, spammers advertise their services using spam. In fact, the advertising which spammers use to promote their services are a separate category of spam. Spammer-related spam also includes advertisements for spammer applications, bot networks and email address databases.
The structure of a spammer business

The steps listed above require a team of different specialists or outsourcing certain tasks. The spammers themselves, i.e. the people who run the business and collect money from clients, usually purchase or rent the applications and services they need to conduct mass mailings.

Spammers are divided into professional programmers and virus writers who develop and implement the software needed to send spam, and amateurs who may not be programmers or IT people, but simply want to make some easy money.
Future Trends

The spam market today is valued at approximately several hundred million dollars annually. How is this figure reached? Divide the number of messages detected every day by the number of messages in a standard mailing. Multiply the result by the average cost of a standard mailing: 30 billion (messages) divided by 1 million (messages) multiplied US $100 multiplied by 365 (days) gives us an estimated annual turnover of $1095 million.

Such a lucrative market encourages full-scale companies which run the entire business cycle in-house in a professional and cost-effective manner. There are also legal issues: collecting personal data and sending unsolicited correspondence is currently illegal in most countries of the world. However, the money is good enough to attract the interest of people who willing to take risks and potentially make a fat profit.

The spam industry is therefore likely to follow in the footsteps of other illegal activities: go underground and engage in a prolonged cyclic battle with law enforcement agencies.

Spam - What exactly is it?


Spam - What exactly is it?

In order to combat spam effectively it is necessary to define exactly what spam is.

Most people believe that spam is unsolicitied email. However, this definition is not entirely correct and confuses some types of legitimate business correspondence with true spam.

Spam is anonymous, unsolicited bulk email.

This is the description that is being used today in the USA and Europe as a basis for the creation of anti-spam legislation. Let's take a closer look at each component of the definition:

* Anonymous: real spam is sent with spoofed or harvested sender addresses to conceal the actual sender.
* Mass mailing: real spam is sent in mass quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective, the initial mails have to be high-volume.
* Unsolicited: mailing lists, newsletters and other advertising materials that end users have opted to receive may resemble spam but are actually legitimate mail. In other words, the same piece of mail can be classed as both spam and legitimate mail depending on whether or not the user elected to receive it.

It should be highlighted that the words 'advertising' and 'commercial' are not used to define spam.

Many spam messages are neither advertising nor any type of commercial proposition. In additon to offering goods and services, spam mailings can fall into the following categories:

* Political messages
* Quasi-charity appeals
* Financial scams
* Chain letters
* Fake spam being used to spread malware

Unsoliticited but legitimate messages

A legitimate commercial proposition, a charity appeal, an invitation addressed personally to an existing recipient or a newsletter can certainly be defined as unsolicited mail, but not as spam. Legitimate messages may also include delivery failure messages, misdirected messages, messages from system administrators or even messages from old friends who have previously not corresponded with the recipient by email. Unsolicited - yes. Unwanted - not necessarily.
How to deal with spam

Because unsolicited correspondence may be of interest to the recipient, a quality antispam solution should be able to distinguish between true spam (unsolicited, bulk mailing) and unsolicited correspondence. This kind of mail should be flagged as 'possible spam' so it can be reviewed or deleted at the recipient's convenience.

Companies should have a spam policy, with system administrators assessing the needs of different departments. Access to different unsolicited mail folders should be given to different user groups based on this assessment. For instance, the travel manager may well want to read travel ads, whereas the HR department may wish to see all invitations to seminars and training sessions.

Wednesday, December 3, 2008

Menghadapi Tuntutan Teknologi "Generasi Y"

Menghadapi Tuntutan Teknologi "Generasi Y"

CITRIX
Yaj Malik, Area Vice President, Citrix Systems, ASEAN

Kamis, 27 November 2008 | 06:03 WIB
Oleh Yaj Malik,
Area Vice President, Citrix Systems, ASEAN

DAPAT dipastikan semua orang pernah membaca tentang Generasi Y (Gen Y). Bisa dikatakan mereka seakan mendominasi hampir semua jenis lapangan pekerjaan yang ada di dunia dan mereka dikenal sebagai generasi yang mampu membuat para pemimpin bisnis dan eksekutif tercengang akan semangat dan kemampuan berkreasi mereka miliki.

Akibat dari segala bentuk kreatifitas baru, cara perfikir yang berbeda, bakat tinggi serta tingkah laku mereka yang sudah demikian maju dan berani, Gen Y otomatis membutuhkan cara-cara melakukan bisnis dan pekerjaan yang juga berbeda dari cara tradisional.

Namun, sebelum saya menguraikan lebih jauh mengenai kebutuhan Gen Y di tempat kerja, lebih dulu saya ingin menjelaskan siapa saja yang termasuk Gen Y, atau yang juga dikenal sebagai Generasi Digital, ‘Echo Boomers’ atau Generasi Millennium.

Kelompok Gen Y adalah mereka yang berusia antara 13 hingga 29 tahun atau biasa disebut anak-anak yang lahir di jaman 'digital'. Mereka tidak mengenal yang namanya telepon putar dan bagi mereka tidak terbayangkan bagaimana orang berkomunikasi sebelum ada yang namanya pesan instan, SMS, e-mail atau Facebook.

Saat ini tercatat sebanyak 66 persen Generasi Millennium secara rutin mengakses Facebook atau MySpace, dan hampir 75 persen dari generasi ini melakukan sendiri berbagai kebutuhan Teknologi Informasi (TI) mereka, mulai dari men-down-load hingga meng-instal sendiri berbagai software yang diinginkan untuk komputer mereka.

Gen Y cenderung bersikap mandiri, sangat visual dan tidak sabaran terhadap hal-hal yang tidak sesuai dengan selera dan kepribadian mereka yang unik. Misalnya saja jika mereka tidak suka dengan aplikasi yang disediakan oleh tempat kerja mereka, mereka akan mencari sendiri aplikasi lain yang mereka inginkan dari website. Jika tidak puas dengan komputer (PC) yang disediakan kantor, mereka akan membawa laptop kepunyaan mereka sendiri untuk bekerja tanpa peduli dengan aturan dan kebijakan keamanan data yang diterapkan di kantor mereka. Ini adalah hal yang oleh orang-orang departemen TI sangat ditakutkan dari generasi ini, meskipun sebenarnya ketakutan tersebut tidak beralasan.

Terdapat 72 juta atau sekitar 30 persen dari populasi Gen Y yang kini telah memasuki dunia kerja. Penggunaan teknologi canggih secara pribadi, serta tendensi alami yang mengaburkan batasan antara kebutuhan TI di lingkungan kerja dan kebutuhan pribadi akan menjadi tantangan sendiri bagi orang-orang TI di perusahaan, karena Gen Y dapat mengancam cara-cara lama yang telah digunakan mereka.

Banyak departemen TI perusahaan yang telah mengimplementasikan kebijakan tradisional dan standar aplikasi serta OS dengan variasi yang kurang beragam karena dua alasan utama yaitu, menjaga keamanan data serta kontrol biaya. Di lain pihak, Gen Y akan melakukan berbagai perubahan TI di kantor demi memenuhi kesenangan dan kenyamanan mereka. Menurut Gartner, sekarang makin banyak karyawan yang lebih memilih menggunakan laptop pribadi mereka di tempat kerja, atau dikenal dengan istilah "BYOPC" (Build Your Own PC).

Menurut hemat saya, sebenarnya ini adalah sesuatu yang sangat alami, karena anak-anak Gen Y menggunakan teknologi untuk hampir semua aktifitas dan komunikasi mereka sehari-hari. Mereka jadi lebih memilih cara mereka sendiri, dan tuntutan agar mereka tetap menggunakan standar tradisional akan berimbas buruk pada kinerja dan produktivitas mereka.

Untuk mengakomodasi kebutuhan karyawan yang berasal dari kelompok Gen Y, saya melihat adanya kebutuhan untuk melakukan perubahan dari kebijakan TI perusahaan yang kaku ke sistem yang lebih fleksibel dan dapat disesuaikan dengan kebutuhan setiap karyawan. Untuk itu dibutuhkan teknologi dan strategi 'pintar' yang mendukung kedua kepentingan yaitu aplikasi data untuk perusahaan dan kebutuhan pribadi.

Jadi, konsep utamanya adalah 'ketersediaan' karena Generasi Millennium menuntut semua aplikasi tersedia sesegera mungkin, aman dan berkinerja tinggi. Jika perusahaan melakukan strategi pintar tersebut, maka departemen TI dapat melakukan keseimbangan antara keamanan data perusahaan sekaligus memuaskan kebutuhan para Generasi Millennium.

Citrix misalnya telah mengeluarkan seperangkat produk dengan formasi 'Citrix Delivery Centre' yang memungkin fleksibilitas sebagaimana yang diinginkan Generasi Millennium. Dengan strategi penyediaan yang pintar, teknologi ini mampu menjaga keamanan data dan aplikasi yang digunakan untuk perangkat komputer pribadi seperti laptop melalui pemisahan antara perangkat lunak dan keras; kebutuhan desktop dapat disediakan dengan aman; tingkat keamanan yang lebih tinggi untuk berbagai aplikasi Web dan Windows; instalasi yang dapat dilakukan dengan cepat; dan yang terpenting adalah kemampuannya dalam menjaga data-data penting perusahaan yang sensitif melalui pertahanan kuat yang sudah tersedia (built-in) untuk menghadapi berbagai ancaman keamanan.

Intinya, demi menjaga kepuasan semua karyawan dalam perusahaan yang dating dari generasi yang berbeda-beda, perusahaan bersama departemen TI perlu melakukan fleksibilitas dalam menyediakan kebutuhan teknologi mereka; namun karena dibutuhkan biaya yang besar akan menyulitkan perusahaan untuk memenuhi setiap kebutuhan. Untuk itu sangat penting untuk membuka mata dalam mencari solusi dan strategi pintar menghadapi serbuan Gen Y.


Share on Facebook A A A