- Pronounced AS'kee, is an acronym that stands for American Standard Code for Information Exchange.
It is an extremely standard system that computers use to index every character that your computer can
display. ASCII indices are useful because they allow you to display characters not found on your
keyboard, like ¢, £, ¤, ¥, §, and °. See our
in decimal and
- The practice of disguising or obfuscating an
e-mail address to prevent it from being automatically collected
and used as a target for spam. It once referred simply to
mangling ofthe letters in an email address.
However, the term "address munging" now includes using ASCII
readable by real people but tougher to read by spam bots.
- On January 18th, 2012, more than 115,000 websites and 3 of the top 10 websites participated in a protes against SOPA. On this day, many of those websites completely blacked out some or all content on their websites.
- An operating system for mobile devices, created by GoogleInc. Unline Apple's iPhone operating systems, Android is open to any device that chooses to use it, and as a result is used in hundreds of different phone types by many different companies.
- An automated e-mail message from a mail system informing the sender about a problem with delivery. The origina message is said to have bounced. A bounce message is also called a Delivery Status Notification (DSN) message.
- CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart".
It is meant to help confirm that a response is not generated by a computer. Our
contact form generator employs a CAPTCHA so that
a contact form you generate for your site using our tool can be as secure against spam as possible.
- The Cyber Intelligence Sharing and Protetion Act. It is a proposed law in the United States which would allow the US government to receive internet traffic information from certain tech and manufacturing companies. The proposed law was universally panned by internet privacy advocates and civil libertarians.
- The Center for Democracy and Technology is a Washington, D.C. based non-profit
advocacy group that works to promote liberal values and constitutional liberties in the digital age.
They did research to determine the source of spam.
They found that posting your e-mail address on your website can get you spam,
but that obfuscating your e-mail address is
highly effective. They also suggest that you never respond to or unsubscribe from spam e-mail,
use multiple e-mail addresses, and not give your e-mail address to companies you do not trust.
- A letter or email asking each recipient to send copies of the letter to other recipients. The
best and most annoying example are those suggesting that for every person you send the letter to, some
amount of money will be donated to a children's hospital or to some research company. Others include
those promising differing degrees of future happiness directly proportional to the
number of people the letter is forwarded to.
Chain letters have been around for decades,
and they were pretty popular on the internet from the start.
Notice that if everyone obeys a chain letter, a chain letter will spread with a geometric progression. One person sends it to three people. Those three each send it to three... that's nine. Those nine each send it to three... that's 27.
Then 81, 243, 729, and 2187 receive the email. Slick spammers knew this. They eventually either caught on to the
ease and popularity of sending chain e-mails, or perpetuated that popularity themselves.
They would send a chain e-mails expecting to receive multiple copies of them eventually, together with the email addresses
the letters had been sent to previously.
- An online form used to contact people without the use of a displayed e-mail address
or e-mail-sending program or application.
AddressMunger.com has developed a
powerful contact form generator tool
that has the added advantage of protecting your e-mail address from spam bots.
- A cryptographic hash function any well-defined procedure or mathematical
function that converts data into a well-defined, obfuscated
form in such a way that the original data can only be read using some form of
the reverse of the cryptographic hash function. The output of a cryptographic hash function is called a
cryptographic hash, or simply a hash.
In the case of a hashed password, the the purpose of a cryptographic hash function is to
create unique passwords, called hashes, for each site in such a way that, if the hash is forgotten, the user can recover the hashed
password by using your original password and the URL of the website requiring your password.
- Currently the most popular social network. It was coded initially in large part by current CEO Mark Zuckerberg, but credit for its creation is generally given to Mark Zuckerberg, Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes.
- Google Adsense is the most commonly used Pay Per Click (PPC) ad network that online websites use. The program allows publishers to target advertisements on other websites to other users based on website content automatically. As the name implies, Google Adsense is run by Google.com
simplest cross-platform web page scripting language.
In a usual web page, you will see text and links. Those are written in HTML. Pretty much everything
- A list of words that is blocked from being used for a specific purpose, such as sending email or posting in forums. Frequently, keyword blacklists will blacklist strings of letters and numbers, successfully blocking the word "penisenlargement" by adding the string "penis" to the keyword blacklist. See this spam keyword blacklist for a particularly useful example of an email keyword blacklist.
- A husband-and-wife partners who posted the first commercial Usenetspam. This was a significant event in that it brought about the age of mass spam, in the sense that they created the precedent for the current global unapologetic spamming practice.
- To make repeated changes which individually may be reversible,
but which ultimately result in unintentional, irreversible distruction of large
portions of the original item. It is sometimes bacronymed "Mash until no good" or
"Mung until no good". It is one of the first recursive acronyms. Rhymes with "Hung".
See Munge, Address Munging.
- To attempt to create a strong, secure string like an email address or password
through character substitution.
It is sometimes bacronymmed as "Modify Until Not Guessed Easily". Rhymes with "Lunge".
See Mung, Address Munging.
- A portmanteau (combination) of the words "net" and "etiquette". It is a set of informal social conventions on the internet. The majority of them are intuitive but they are evolving over time, especially to include respect for other people's right to privacy in social networks.
- The hiding or concealment of data, making data ambiguous or unreadable except
when using a tool that can read the data. Our address mungingtool obfuscates an e-mail address using both ASCII
A well-written contact form can also be considered an e-mail address obfuscator because it
renders your e-mail address completely invisible. We recommend using our
contact form generator because
it is a much more effective tool for hiding your e-mail address.
- The Personal Information Protection and Electronics Documents Act, a Canadian law which governs how private sector organizations collect, use, and disclose personal information during commercial business.
- Password hashing is the act of using a script to create a new password, called a
hash, from an old one.
The hash should be completely distinct from the original password. A good password hash algorithm
should make extremely different password hash given similar input values.
- The Stop Online Piracy Act, a United States bill intended to increase the ability of law enforcement agencies to fight online piracy and trafficking of copyrighted intellectual content such as movies, music, and electronically scanned materials. The bill was introduced by Rep. Lamar Smith (R-TX). The bill included the ability to stop advertising networks such as Google Adsense from conducting business with websites that break piracy laws, meaning that many websites that contain images not created or purchased by the website owner could be barred from conducting business online. The bill was universally panned, and triggered many large websites to participate in what they called American Censorship Day.
- The practice by some spammers of spreading spam output across many IP addresses in order to dilute reputation metrics and evade filters. The term snowshoe spamming analogizes this practice to snowshoes, which are made to spread a person's weight onto a larger area of snow.
- Spam is defined as unsolicited bulk email. Unsolicited means that the recipient of the email has not granted verifiable permission for the email to be sent. Sometimes also defined as unsolicited commercial e-mail, but this definition, focusing on the commercial aspect of bulk email, fails to take into account the vast majority of spam that appears in your inbox or spam folder. The acronym UBE or UCE are sometimes used.
- A computer program specifically written to scan web pages for e-mail addresses.
Those e-mail addresses are recorded, and spam is sent to them. There are ways to avoid spam bots.
The easiest and most effective way of avoiding spam bots is the us of a contact form
like the one you can generate
here on AddressMunger.com.
- Email activity in which the e-mail sender alters the e-mail address, header, or other content
of an email in order to appear as though the e-mail sent originated from a different, trustworthy source.
- Any software that covertly gathers information about a user while they
surf the internet, and transmits the information to an individual or company that uses
it for illegal marketing or other purposes.
- Intilaly adrdses mugning rfeererd to
the mxiing of lteters or smyblos in an eamil adrdess, as in tihs snetecne. However it now commonly refers to any
hide your e-mail address. Transparent mangling refers to any munging in
which the text, in this case the e-mail address, is perfectly visible to any person viewing the text. For example, this e-mail address
transparently mangled, though you cannot tell by looking at it. The source code actually reads as
- To submit a request to discontinue receiving e-mail or other
contacts from another person. You should never ever unsubscribe from spam e-mail.
After all, you did not subscribe to the spam, and they still have your e-mail address.
- A precursor to internet forums, established in 1980 and still in existence today. Users read articles and posts, collectively called news. Like email but unlike forums, Usenet had no centralized server. Usenet was the first victim to mass commercial spam.
Juan Rodriguez is a part-time web designer and full time math teacher, and is a Math for America Early Career Fellow. You can contact him here or in the comments below. Over the past eight years, Juan has provided anti-spam and web design tools to over 1000 web-based businesses.