Japan's NTT DoCoMo has unveiled new weapons in its war against junk e-mail
Published:
10 November 2001 y., Saturday
Japan's NTT DoCoMo has unveiled new weapons in its war against junk e-mail, or spam, on its popular wireless Internet service I-mode.
The largest wireless Internet service of its kind with over 28 million subscribers, I-mode has been plagued by spam since it managed to sign up enough subscribers to attract unscrupulous marketers.
The problem has enraged users who end up paying for the unwanted data downloaded in the junk marketing e-mail. Over the past year, DoCoMo has made efforts to curb the spam. The action has not been enough to satisfy its I-mode subscribers or deter spammers.
On Tuesday, DoCoMo delved into its arsenal once more in an effort to put a stop to the nuisance.
First, DoCoMo said it would attempt to block any e-mail that enters the I-mode system destined for a large number of "invalid" e-mail addresses.
Large numbers of invalid e-mail addresses almost always mean the e-mail is being sent to a large range of possible e-mail addresses generated by the spammer via a simple software program. A genuine mail-out to people who requested the information would not contain such a large number of incorrect addresses.
DoCoMo had to apply to Japan's Ministry of Public Management, Home Affairs, Posts and Telecommunications to have the measure approved.
Blocking such e-mail also will prevent spammers from building genuine lists of I-mode e-mail addresses from the "user unknown" replies from invalid addresses.
Šaltinis:
newsbytes.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »