WTF did I do to someone?
Anyone have any advice what to do? I have a bad feeling this is another address I will have to scrap and make a new one somewhere else
I want a do-no-email list on top of do-not-call ASAP grrrrr
Moderator: TheMachine


Of course, distributing the spam e-mail itself is the first and most important step. For that, spammers turn to bulk e-mail software like Send-Safe, which allows them to fake the name listed in the “from” line.
A former employee at an e-mail marketing company that claims to engage in only opt-in marketing campaigns revealed just how this works, under condition of anonymity.
When she worked there, people were constantly added to “opt-in” lists whether they opted in or not, she said. Frequently, marketers approached her firm with e-mail lists and spam campaign e-mails. Her company never asked where the e-mail addresses came from; it certainly didn’t require proof that the consumer had “opted in.” When complaints came, they pinned the problem on the partner. And remove requests were completely ignored, she said.
“You implement one new technology hurdle, that slows them down for days or weeks, but they eventually adapt,” said Ray Everett-Church, chief privacy officer for ePrivacy Group.
And now, this latest adaptation. The worlds of computer virus writers and spammers have merged, says Stewart. Trojan horses are being placed on home computers around the Internet, making them willing accomplices to spam campaigns. Hiding behind the IP address of a home computer is nearly the perfect disguise.