Email Harvester � Extract Emails from Files and Folders on your PC

Even if you don’t have a business and have no interest in Internet marketing (maybe you don’t even know what that is), if you have email, you’ve experienced the uglier side of email marketing. You’ve probably even seen the ads for email address lists that offer thousands-or even millions-of email addresses for pocket change. Did you ever wonder how anyone could come up with so many addresses?

You can be sure of one thing: if the price is cheap, these are not opt-in lists. Instead, these huge lists are loaded with “harvested” email addresses. They are equivalent to a list of street addresses taken from the phone book. For target marketing purposes, they are pretty much useless-on a par with sales fliers addressed to “occupant.”

There is no phone book for email addresses, so where do these cheapo lists come from? Mostly, the addresses are harvested from web logs, membership or student lists, newsgroups, message boards, forums, and other places where folks gather to innocently swap information. They don’t know their addresses are being gathered up and sold on the open market. They didn’t ask to be added to a mass email list. And they certainly didn’t ask to have their inboxes polluted with spam.


Harvesting email addresses is not illegal. But it is widely considered unethical. You won’t go to jail or pay a fine. But you could hurt your business, perhaps irreparably. The possible consequences for violating the unwritten rule about no email harvesting range from losing your ISP to having your business blacklisted to losing your domain.

Spammers can get notified about opening of an email even without the recipient replying to the email. They embed links in email spam, usually attached to a picture that has a unique name. When the email gets opened the email program tries to load the picture from their server, telling them that the file was accessed. And this way, your email address is traced

It is always better to have different email addresses for different needs with one of those addresses being sacrificial. The email address that you sacrifice is the one you give to acquaintances, enter in prizes and draws, and make public in online communities. You can use other addresses to keep in touch with family, friends and for work, isolating it from the world of spam. However, this would not be a successful technique if people close to you are not aware about it. Make sure you inform them about your private email id as well as the public one and which they should use to contact you.

At email spider , employees must be educated about spammy activities. They should be told to be careful while filling any personal information from company computers on risky websites. This could be dangerous. Corporates must have strict guidelines towards the usage of company computers on external sites and educate employees about the importance of cyber-security. Employees must be instructed to keep their firewalls, virus scanners and removers updated. They should be told not promote any email spam within the company network. Companies should employ firewalls, malware removal utilities and spam filters on their network so that email spam and viruses are removed at the mail server itself.

Governments must draft and enforce strong laws and harsh penalties for spamming. The Ban on Deceptive Unsolicited Bulk Electronic Mail Act of 2003 allows the prosecution of spammers (bulk mailers) under RICO (Racketeering Influenced and Corrupt Organizations) laws which were created in the US in the year 1970 to eradicate the Mob (Mafia). RICO laws allow the confiscation of all illegally derived assets from an individual or organization.

About the Author