ALERT

[WEBINAR] Building a Business-Driven Data Architecture

Email Harvesting

Definition - What does Email Harvesting mean?

Email harvesting is the process of obtaining a large number of email addresses through various methods. The purpose of harvesting email addresses is for use in bulk emailing or for spamming.

The most common method of email harvesting is by using specialized harvesting software known as harvesting bots, or harvesters.

Techopedia explains Email Harvesting

Spammers harvests email addresses through various techniques, including:

  • Posts into UseNet with email addresses
  • From mailing lists
  • From Web pages
  • From various paper and Web forms
  • Through the Ident daemon
  • From a Web browser
  • From Internet relay chat and chat rooms
  • From finger daemons
  • From domain contact points
  • Using the method of guessing and cleaning
  • From white and yellow pages
  • By accessing the same computer used by valid users
  • From the previous owner of an email address
  • Through social engineering
  • By buying lists from other spammers
  • By accessing the emails and address books in another user's computer
  • By hacking websites

The above techniques enable spammers to harvest email addresses and use them with electronic messaging systems to send unsolicited bulk messages. The following techniques can be used to prevent email harvesting:

  • Email address munging by changing the "@" sign into "at" and the "." into "dot"
  • Turning an email address into an image
  • Using an email contact form
  • Using JavaScript email obfuscation. In the source code seen by the harvesters, the email address appears to be scrambled, encoded or obfuscated.
  • Using email address obfuscation through HTML. For example, one can insert hidden elements within the address to make them appear out of order and use cascading style sheets to restore the correct order.
  • Prompting users to enter a correct CAPTCHA before divulging the email address
  • Using a CAN-SPAM notice enabling prosecution of spammers under the CAN-SPAM Act of 2003. The website administrator must post a notice that "the site or service will not give, sell, or otherwise transfer addresses maintained by such website or online service to any other party for the purposes of initiating, or enabling others to initiate, electronic mail messages."
  • Monitoring the mail server. This method can be implemented at the recipient email server. It rejects all email addresses as invalid from any sender specifying more than one invalid recipient address.
  • Using a spider trap. This is a part of a website built to combat email harvesting spiders.

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
Free Whitepaper: The Path to Hybrid Cloud
Free Whitepaper: The Path to Hybrid Cloud:
The Path to Hybrid Cloud: Intelligent Bursting To Amazon Web Services & Microsoft Azure
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.