Recommended IT Practices
Spam and Spoofing
Spam is generally defined to be unsolicited commercial email (UCE). However, some people regard any unwanted messages as spam, including:
- Fraudulent email that attempts to scam the recipient,
- Chain letters or urban legends that circulate unsubstantiated stories alleged to be true,
- Unwanted professional email from organizations or colleagues,
- Spoofed email, which is email with a false return email address, and
- Windows pop-ups, which can contain unsolicited advertisements.
Although unsolicited bulk email has existed for years, over the past several months, it has become more pervasive, more offensive, and more expensive to deal with.
There a few things you can do to help reduce the amount of unwanted email you receive:
- Never respond directly to junk mail, unless you know your unwanted messages are coming from a reputable source, and you are certain your request to be removed from the mailing list will be honored.
- Use email filters that allow you to reroute suspect email into a trash or spam folder that you can check before deleting its contents.
- Avoid indiscriminate publication of your email address.
These suggestions are presented in more detail, along with more information regarding spam and what to do about it, at www.uh.edu/infotech/spam.

Topics
- Appropriate Use and Responsibility
- Buying Additional RAM (Memory)
- Choosing a Computer
- Choosing a Printer
- Computer Placement
- Data Backup and Recovery
- Data Security
- Data Storage Management
- IP Addresses
- Old Computing Equipment
- Password Use and Computer Account Security
- Physical Security
- Printer Management
- Software Installation and Upgrades
- Spam and Spoofing
- Viruses
- Wireless Computing