READING DRILL #4
Solutions to Spam
> Although it seems like the proliferation of spam—junk E-mails sent unsolicited to millions of people
each day—is a recent problem, spam has been around as long as the Internet has. In fact, the
first documented case of spam occurred in 1978, when a computer company sent out 400 E-mails
via the Arpanet, the precursor to the modern Internet. Now, spam E-mails account for more than
two-thirds of all the E-mail sent over the Internet, and for some unlucky users, spam makes up 80
percent of the messages they receive. And, despite technological innovations such as spam filters
and even new legislation designed to combat spam, the problem will not go away easily.
The reason spammers (the people who and businesses that spread spam) are difficult to stop is
that spam is so cost effective. It costs a spammer roughly one-hundredth of a cent to send spam,
which means that a spammer can still make a profit even with an abysmally low response rate, as
low as one sale per 100,000 E-mails sent. This low rate gives spammers a tremendous incentive to
continue sending out millions and millions of E-mails, even if the average person never purchases
anything from them. With so much at stake, spammers have gone to great lengths to avoid or defeat
spam blockers and filters.
Most spam filters rely on a fairly primitive “fingerprinting” system. In this system, a program analyzes
several typical spam messages and identities common features in them. Any arriving E-mails that
match these features are deleted. But the fingerprinting defense proves quite easy for spammers to
defeat. To confuse the program, a spammer simply has to include a series of random characters or
numbers. These additions to the spam message change its “fingerprint” and thus allow the spam to
escape detection. And when programmers modity the fingerprint software to look for random strings
of letters, spammers respond by including nonrandom content, such as sports scores or stock
prices, which again defeats the system.
>A second possible solution takes advantage of a computers limited learning abilities. So-called
“smart filters" use complex algorithms, which allow them to recognize new versions of spam
messages. These filters may be initially fooled by random characters or bogus content, but they
soon learn to identify these features. Unfortunately, spammers have learned how to avoid these
smart filters as well. The smart filter functions by looking for words and phrases that are normally
used in a spam message, but spammers have learned to hide words and phrases by using numbers
or other characters to stand in for letters. For example, the word "money" might appear with a zero
replacing the letter *o." Alternatively, spammers send their messages in the form of a picture or
graphic, which cannot be scanned in the same way a message can.
Another spam stopper uses a proof system. With this system, a user must first verify that he or
she is a person before the E-mail is sent by solving a simple puzzle or answering a question. This
system prevents automated spam systems from sending out mass E-mails since computers are
often unable to pass the verification tests. With a proof system in place, spam no longer becomes
cost effective because each E-mail would have to be individually verified by a person before it
could be sent. So far, spammers have been unable to defeat proof systems, but most E-mail users
are reluctant to adopt these systems because they make sending E-mails inconvenient. @A similar
problem prevents another effective spam blocker from widespread use. ll This system involves
charging a minimal fee for each E-mail sent. mThe fee, set at one penny, would appear as an
electronic check included with the E-mail. ll Users can choose to waive the fee if the E-mail is from
a legitimate source; however, users can collect the fee from a spammer. A fee system would most
likely eliminate a great deal of spam, but unfortunately many users find such a system too intrusive
and inconvenient.
236 | racking the TOEFL iBT>In some ways, the battles being fought over intrusive E-mails are very much an arms race.
Computer engineers will continue to devise new and more sophisticated ways of blocking spam,
while spammers will respond with innovations of their own. It is unfortunate that the casualties in this
technological war will be average E-mail users.
1. The word proliferation most nearly means
(A) addition
(8) spread
(C)diminishment
(0) enlargement
2. In paragraph 1, the author describes spam as
(A) a recent problem that affects millions of users
(8) totaling more than 80 percent of E-mails sent via
the Internet
(C)_ a technological innovation
{D) unwanted messages sent to a mass audience
Paragraph 1 is marked with an arrow [>]
3. In the passage, the word abysmally is closest in meaning to
(A) unknowingly
(8) disastrously
(C) disappointingly
(D) extremely
4, The phrase the program refers to
(A) spam messages
(8) random characters and numbers
(C)_atype of spam filter
(0) common features
5. According to paragraph 4, smart filters are superior to
fingerprinting systems because smart filters
(A) are eventually able to recognize new versions of
spam messages
(8) are able to learn from their mistakes.
(C) do not need to find common features to detect spam
(D) are not fooled by random characters or content
Paragraph 4 is marked with an arrow [>]
Reading Practice Drs | 2376. Which of the choices below best expresses the meaning of the
highlighted sentence in the passage? /ncorrect answer choices
change the meaning in important ways or leave out
essential information.
(A) Once spammers figured out how smart filters functioned, they were able
to defeat them by changing words in
the message.
(B) Spammers can avoid smart filters by replacing certain letters in words or
phrases with other characters.
(C)_ Smart filters function by looking for words that have certain letters
replaced by numbers.
{D) A smartfilter is easily defeated by spammers who are able to disguise
words and phrases with numbers
and characters.
7. The word automated as used in the passage most nearly means
(4) computerized
(B) automatic
(C) costly
(D) illegal
8. The passage mentions all of the following as hindrances to
adopting verification systems EXCEPT
(A) user reluctance
(8) inconvenience
(C)_ ineffectiveness
(0) violation of privacy
9. The author describes the fight over spam as an arms race
because
(A) computer engineers and spammers are constantly reacting to each
other's strategies
(8) some of the techniques used by spammers may cause harm to E-mail
users
{C) there is no peaceful solution to the problem of spam
{D) computer engineers will never be able to completely protect against
spam E-mails
238 | Cracking the TOEFL iGT10. In paragraph 6, the author implies that
MW.
(A)
(8)
{C)
{D)
most spam E-mails will eventually be blocked
E-mail users suffer the greatest costs from the fight
over spam
there is no way to stop new and more sophisticated
spam E-mails
the battle over spam E-mails will never end
Paragraph 6 is marked with an arrow [>]
There are four black squares [ml] in the passage, indicating where
the following sentence could
be added.
Although a fee to send an E-mail seems an extreme solution,
the fee is more of a verification device than an actual payment.
Click on a square [ml] to add the sentence to the passage.
Reading Practice Drills240
12. Directions: Select the appropriate phrases from the answer
choices and match them to the type of strategy to which they
relate. TWO of the answer choices will NOT be used. This
question is worth 4 points.
Answer Choices
Take advantage of computer learning
abilities
Require a verification test to send
E-mails
Insert random characters and numbers
into messages
Develop a “fingerprint” of E-mail
messages
Benefit from the low cost of sending
E-mail messages
Require users to include a small
payment with each E-mail
Rely on the convenience of E-mail
Use automated systems
Do not want to be inconvenienced
when sending E-mails
Cracking the TOEFL iBT
Spammers
‘Spam Blockers