What is spam and how to deal with spammers on the Internet. How to protect email from spam? How to protect yourself from Internet spam

The following technologies are used to protect mail servers:

There are two main methods of spam protection: protection against spam when the mail is received by the server, and separating spam from the rest of the mail after it is received.

Blacklists. Blacklists include IP addresses from which spam is sent.

Greylisting or greylisting. The principle of operation of gray lists is based on the tactics of sending spam. As a rule, spam is sent in a very short time in large quantities from any server. The job of the greylist is to deliberately delay the receipt of emails for some time. The address and forwarding time are entered into the greylist database. If the remote computer is a real mail server, then it must keep the letter in the queue and repeat the forwarding within five days. Spam bots, as a rule, do not keep messages in the queue, so after a short time they stop trying to forward the letter. When resending a letter from the same address, if the required amount of time has passed since the first attempt, the letter is accepted and the address is added to the local white list for a sufficiently long period.

DNSBL (DNS blacklist)– lists of hosts stored using the DNS system. The mail server accesses the DNSBL and checks it for the presence of the IP address from which it receives the message. If the address is in this list, then it is not accepted by the server, and the corresponding message is sent to the sender

Message limit. Set a limit on the number of messages.

Program Spamassassin(SA) allows you to analyze the content of an already delivered message. SpamAssassin comes with a large set of rules that determine which emails are spam and which are not. Most of the rules are based on regular expressions that match the message body or header, but SpamAssassin uses other techniques as well. The SpamAssassin documentation refers to these rules as "tests".

Each test has some "cost". If the message passes the test, this "cost" is added to the total score. The cost can be positive or negative, positive values ​​are called spam, negative values ​​are called ham. The message goes through all the tests, the total score is calculated. The higher the score, the more likely the message is spam.

SpamAssassin has a configurable threshold above which the email will be classified as spam. Usually the threshold is such that the email must meet several criteria; triggering just one test is not enough to exceed the threshold.

The following technologies are used to protect websites from spam:

1. Image captcha. Those. the user is shown arbitrary text that the user must enter in order to perform any action.

2. Text captchas– the subscriber must enter the answer to the proposed question to confirm his actions.

3. Interactive captcha- a little common, but very useful form of protection. For example, to confirm actions, the user will be asked to solve an easy jigsaw puzzle - for example, to assemble a picture from three or four parts.

Protection of mail from spam on the page. Anti-spam encoder E-mail from spam robots.

Tired of the flood of spam emails? Don't know how to protect your Email from spam bots! Use our online email encoding service and forget about spam once and for all.

Often, users are surprised to wonder why there is so much spam, how do spammers find out their email addresses?

In fact, users themselves give the opportunity to spam them by leaving their Email on various pages in the public domain, commenting on some article or blog, participating in the discussion of some forum, etc. and so on... That's actually where the spam database and replenished with your contact information.

I think everyone knows that leaving your email address in plain text on various sites: forums, blogs, etc., you thereby allow various scanners, grabbers and spam bots to find your address for further use in spam mailings. And after a while, your mailbox just clogged becomes spam to the eyeballs.

Our service allows you to protect your mailbox from this kind of spam by encoding your Email. The way to mask an email address is by converting a postal address or any other text into a Unicode character code.

This method is perfectly supported by all browsers, and for an ordinary ordinary person it will not create any difficulties, but bots scanning the source code of the site simply will not see your E-mail address, since it is simply not in the source code, or rather, it is in encoded form.

Of course, this method does not guarantee you 100% protection against spam, since there are already spam bots that have learned to decode and decrypt this encryption method, but still there are not many of them, and this is not profitable for many, because all spammers put pressure on them, so to speak, and it makes no sense for them to waste their time setting up programs for decryption.

After you have generated and encoded the text using the form above, you can copy the result of the received string.

You can use this string with encrypted Email on any site, forum, blog, guestbook, or on your site without fear that your email address will be included in the spam database of spammers.

Nowadays, spam is a very big headache for all users of the World Wide Web. Every day, thousands though probably millions of spam bots surf the internet looking for sites with public email addresses and pull them out of the site pages. And only the spammers themselves will benefit from this, since they are happy that they received a new database of addresses on which they earned money, and the average user is afraid to leave and show his mailbox so as not to become their victim.

Site administrators, of course, also do not sit idle and do their best to stop this flow of spam. Accordingly, our service also provides you with the opportunity to independently protect your Email from an evil spammer and specify it in such a way that the spam bot cannot parse it, but so that it is understandable to living people.

After all, it is not for nothing that such an expression appeared on the network "Who did not hide, the spammer is not to blame!" in general, as they say, be careful and God saves.


The Internet is a very useful and convenient invention of mankind. But it is fraught with many hidden dangers. The main ones are SPAM and viruses.
  • SPAM is dangerous because you are daily exposed to mass mailings of an advertising nature (they offer to buy, sell something, earn "one hundred thousand million" without doing anything, etc.)
  • Viruses, on the other hand, usually lead to much more disastrous consequences. First, your computer can be used for mass mailings. Secondly, you can lose all your passwords from wallets and Internet payment systems, ICQ number, credit card numbers, in general, everything that can be lost. In addition, this virus can be sent to all your friends via ICQ and e-mail.

But all this can be avoided if you follow a number of not very complicated rules.

Be careful with files sent to you by mail.

If you receive a letter without warning that contains the name of your friend in the "sender" line, do not rush to open it. First, try to contact the person from whose address this letter was sent (you can contact by phone, ICQ or e-mail), and check if he really sent it? If it turns out that he did not send, advise him to urgently check his computer for viruses. And be sure to delete this letter (and from the trash too).

If the sender is unavailable, and you urgently need to find out what was sent to you, then it is better to contact a specialist, but you can also try to handle it yourself. To do this, you first need to save the attached file on your computer in a separate folder, but in no case open it. Next, you need to check the extension. There are so-called dangerous extensions (for example: exe, com, pif, vbs, vsh, lnk, bat, cmd) that can harm you when opened. If the file has just such an extension, it is better not to open it until the circumstances are clarified.

Do not respond to promotional emails

If you receive a promotional email, do not reply to it. If you respond to it, you will show that your mailbox is still "alive" and always ready to receive new SPAM. In addition, if you are asked to unsubscribe by clicking on the link below, do not do so. And in general, you can not open links contained in promotional emails. By clicking on this link, you can again confirm that your mailbox is "alive".

No need to choose a simple name for your mailbox

When registering on a mail server, you, as a rule, try to choose a simpler name for yourself (for example: vasia, katia, sasha and others). It is understandable: such a name is easier to remember, and it looks beautiful! But the fact is that SPAMer, when compiling his base for mailing lists, uses the simplest and most popular names. And your name can easily be on this list too. Therefore, it is recommended to choose a more difficult name for yourself (“not a dictionary one”).

Do not use simple passwords

Your password must not:

  • Match with login;
  • be too short;
  • Consist of one number;
  • Consist of characters that are on the keyboard on the same row;
  • Be the word "password".
It is a common practice to type Russian words in the English layout. The option is not bad, but the word should not be chosen as a dictionary one, besides, you may have problems typing such a password in the absence of a Russian keyboard. Try to store passwords carefully (do not write down the password on a piece of paper or in draft SMS messages on your phone).

Don't leave your email address anywhere

Very often, when registering, you are asked to provide an e-mail. But before you do this, think carefully. If you are confident in the reliability of this server (for example, it may be an old trusted forum or a large Internet service), and the list of registered users will not fall into the hands of SPAMers, then you can leave your real address.

There are cases when it is necessary to register, but you do not want to leave the address. In this case, it is advisable to get yourself an additional mailbox, especially for such registrations, or use the mailinater.com service (when registering on a suspicious site, you indicate the mailing address [email protected], register, then go to the mailinater.com website, enter the login that you have chosen (a password is not needed) and you can view the letter sent to you during registration there). Plus, make sure that on all the forums that you visit, the "do not show my e-mail" box to other users is checked in the account settings.

Do not click OK on unfamiliar sites in dialog boxes

Before you click something on an unfamiliar site, you need to carefully read what you are offered to do. If they offer to install any program or update, do not agree. If you receive a message from your browser stating that the content on the page is not safe, then choose the option that will ensure your safety. Do not ignore such warnings.

Do not install software of unknown origin

By surfing the Web and downloading various "mini-programs", you run the risk of downloading some kind of virus along with the program. Many "mini-programs" and "fun programs" are created precisely for this.

Install updates in a timely manner

Many programs are able to download updates (do not confuse updates with new versions of programs). And this is very important. Suppose (and, most likely, it is), you have some kind of anti-virus program installed. And every day more and more new viruses appear on the Web, and she knows nothing about them, therefore she cannot fight successfully, and for this she needs updates to the virus definition database. Such updates are usually performed automatically, or the program offers to check after a certain period of time. It is very important to update your antivirus, operating system (update options: Windows XP - Start / Settings / Control Panel / System / Automatic Updates). Do not forget that the most important thing when using the Internet is attention (especially to small things) and common sense.

Hello, dear readers of the blog site. Surely you have already encountered spam, even if you did not know exactly what this disgrace is called. And this is not even necessary. Spam pours with enviable regularity into a regular mailbox - these are the same countless advertising booklets that are slipped to you in the hope that you will order or buy something.

So here it is spam is just there is an annoying, climbing from all sides advertising(but not only advertising - it can be worse). You didn’t order it, you don’t need it, but it rushes and rushes from all cracks. In this heap, the information you need can easily be lost and you have to spend a lot of time sifting it out.

In our computer age, the main source of spam is . Besides advertising spam mailings can also be dangerous both for your wallet (phishing, social engineering, wires) and for your computer (viruses, worms, trojans).

What does the word Spam mean, what it is and how you can fight it, you will learn by looking at this short note. I hope it will be interesting (well, certainly useful - I promise you).

Spam - what is it

What does SPAM mean?

Samo spam word comes from the name of canned meat, which was vehemently advertised after the end of the Second World War (obviously, it was necessary to urgently sell the soldiers' meat rations).

Advertising was so aggressive, all-encompassing and ubiquitous that this word (and the “sediment” associated with it) was remembered, but already about the intrusive advertising that appeared along with it in conferences (then still in the fidonet, if anyone remembers).

The word has taken root, especially since intrusive advertising has not become less, but rather the opposite. When e-mail gained popularity, then unauthorized mass advertising and malicious mailings of letters became commonplace. Such mailings were beneficial for spammers, because the necessary information was brought to a large number of people without any special costs.

But Email is not limited. They spam in the personal of social networks, on forums, in instant messengers, on bulletin boards, in comments on blogs, it is open for editing and adding text by everyone. They also spam on your phone, for example, by advertising calls or by sending promotional SMS messages.

Where can you find it on the internet?

  1. Email- it's just a Klondike for spammers. With the help of mass mailings, you can sell anything, you can cheat and rob, you can infect computers and send worms. Bases for mass mailings are collected independently (with the help of programs), or bought from those who do this professionally.
  2. Forums, comments blogs, wikis, and message boards - basically everyone is allowed to post here, and it's hard for spammers to stop spamming. This is not always advertising - often in this way webmasters try to get a free link to their site so that it ranks higher in Yandex or Google search results for various queries. This brings them traffic and money.
  3. Social media and dating sites - spam is very common among incoming personal messages. It is also available in the comments to the posts.
  4. Messengers (like ) are also subject to this scourge.
  5. SMS- messages from unknown people of an advertising nature. Probably everyone is familiar.
  6. Search spam- a rather specific thing, but familiar to everyone. Did you have such that you enter a query into Yandex (Google), and in the answers there are entirely sites with some kind of gibberish that have nothing to do with the matter. These are the so-called doorways (sites with automatically generated useless texts). They spam the results of search engines, but they earn on visits to them by visitors (in various ways).

Those. all letters in your mailbox (or messages on the forum, comments on the blog, messages in a personal message) of an advertising or other nature from an unknown sender - this is spam. True, the mailing lists to which you subscribed can also be annoying, but you can still unsubscribe from them (refuse to receive them further).

By itself, spam is annoying and disturbing, because it litters where it appears. Most often this is your mailbox, and it can be quite difficult to separate the wheat from the chaff when there are too many unwanted messages. But spam can also be a real danger to both you and your computer. Let's deal with all this.

We understand the varieties of spam (harmless and dangerous)

From now on, I will mainly talk about spam email messages, because it is this channel that is considered especially susceptible to this phenomenon. Everything else is not so neglected and not so actively used by spammers, and this does not apply to all network users. And here is the problem of their protection from unwanted messages is acute.

Varieties of harmless spam

  1. Advertising of legal goods and services- in this case, the business owner simply chose spam mailings as one of the channels to attract customers and customers, because it is not expensive, fast and brings results. Naturally, he does not really think about the moral (or rather immoral) side of this matter.
  2. Prohibited advertising- there are goods and services that are prohibited by law from advertising, and for them spam mailings can be the main channel for attracting customers. By the way, spammers also advertise their services with the help of mass mailings, because this activity is prohibited by law. This also includes advertising discrediting competitors, because this is also prohibited by law (praise yourself, but do not scold others).
  3. Impact on public opinion- very often spam becomes a good choice for those who are trying to manipulate public opinion in the right direction. It can be politics, as well as. Letters in general can be sent ostensibly from some person in order to compromise him, change his opinion about him or use his authority for profit. But personally, this does not pose a danger to you.
  4. Letters that ask to be forwarded to others- these can be varieties of so-called "letters of happiness" (send it to 10 friends and you will be happy), or asking to send information to friends for some other reason. Often such emails are used by spammers to collect or replenish an existing email database for subsequent mass mailings.

High-risk spam - what it can be

If regular (harmless) spam can only slightly affect your peace of mind and mental health, then the examples below can be quite dangerous for your wallet or computer. And this is not a joke.

I myself (the one who teaches and teaches everyone) a couple of years ago "bought" a letter of this kind (phishing) and parted with several thousand rubles (read ""). I just wrapped myself up and did everything “on the machine”, just to fall behind, well, and when I realized it, it was too late.

  1. - a very effective method of deceiving not only gullible, but also just busy or inattentive people (there is a hook for anyone). They send you a letter supposedly from your bank, electronic money service or from somewhere else. In this letter, you are sure to be taken aback by something (unsettled) and asked to log in to the site to solve the problem. You log in, but the site will be fake (although it looks like a real one as two drops) and the data you provided is immediately used to steal all your money.
  2. Nigerian letters- you will find out that you can get a large amount of money (the pretexts are different - from an unexpected inheritance to helping a prince in exile). You do not believe for a long time, but you are convinced. When you believe it, you will be asked to transfer some money for "related expenses." You transfer and no one will bother you anymore.
  3. Viruses, worms, trojans- the letter may contain an attached file with a malicious program (or a link leading to a site with a virus). She can immediately cause problems with the computer or sit quietly in a corner and carefully record all the passwords you enter, logins and other things useful in the household. Worms, among other things, also know how to send themselves to your friends at the addresses found in the Email contacts (as they will then be ...).

Spam Protection

Where do spammers get email databases from?

  1. Spammers (those who produce mass mailings) collect email addresses from all available sources. These can be forums, guest books, chat rooms, social networks and other sites where email addresses can be publicly available.
  2. Hackers manage to get to some databases of addresses stored on websites.
  3. The collection of emails is carried out in most cases by a program method (with the help of search bots - harvesters) and this does not require much effort (only time is not very much). Moreover, such email spam databases you don’t have to collect, but buy them from those who specialize in this business ().
  4. Billions of postal addresses are registered all over the world, and therefore you can simply try to generate emails using special programs using the appropriate dictionaries. With a high degree of probability, many of them will actually exist. Read below to learn how spammers check the reality of addresses.
  5. There are special worms (viruses) that can send themselves to the database of addresses found on the victim's computer. The database collected in this way will already be cleared of non-working mailboxes.

How do spammers clean the databases from inactive email addresses?

Those who collect the database of addresses, in fact, do not care who owns this or that address - they send letters to everyone in a row, because there will still be someone who will respond to them (as they say, they hit the squares).

But still, in order to optimize costs and increase the return on mailings, it is beneficial for them to clear the databases of non-existent addresses. How do they do it? Let's get a look.

  1. The simplest thing is to place a picture in the letter (maybe not even visible - one pixel in size), which will be loaded from the site owned by the spammer when the user opens the letter. If the picture is loaded, then the letter was opened and the email is valid.
  2. Many mail clients (programs for working with e-mail) automatically send a message about reading the letter, which again plays into the hands of spammers.
  3. The letter may contain a link calling to go somewhere, promising mountains of gold. Moved - consider that your Email will now be marked as valid. The most annoying thing is that such a link can be disguised as an unsubscribe button, which in fact will lead to the opposite effect.

How to reduce the likelihood of your email getting into the spam database?

In general, as soon as your mailbox is "confirmed", spammers will not just get off of you. It is important to understand that no one is immune from spam. But it is possible to significantly reduce the likelihood of getting into such a spam database if you take specific precautions:

  1. You can, of course, not publish your Email anywhere at all and not tell it to anyone. But in most cases it is difficult to do, so I advise except for the main box have one or two secondary ones that you will use to register on forums and the like. Often they can come in handy and, which can be obtained without registration at all.
  2. Don't click on links in spam emails (even if there is an unsubscribe button, it's a trap) and, if possible, turn off automatic image downloads in your email client program. There is a chance that your Email will be counted as inactive and mass mailings will not come to it at a hundred per day.
  3. If you have not yet registered a mailbox or are planning to start a new one (for example, due to the complete clogging of the old spam), then proceed not from the convenience and ease of remembering it, but on the contrary, make it more authentic and more complicated. You will still send it to your friends electronically, but spammer programs are unlikely to guess it.

What to do if spam no longer lets you breathe?

These were all preventive measures to combat spam (or rather reduce its amount). But there is the possibility of an effective struggle even in an already completely neglected situation. In this case, it becomes extremely important, .

The fact is that in such large services as or, there are powerful anti-spam filters.

They put all suspicious emails in a separate Spam folder, thereby freeing the Inbox folder from garbage. Yes, there is no perfect spam cutter, and as far as possible, the contents of the "Spam" folder before cleaning it would be better to look diagonally for legitimate correspondence. But it's still much easier than digging through all this garbage all the time.

If you have a mailbox on another service, where the spam cutter is useless (for example, as in), then you should not despair. Get yourself an Email on Gmail or Yandex, and then set up mail forwarding to it from your old mailbox. Moreover, these settings can be made as in the old box (i.e., set up forwarding - shown in the screenshot):

Also in the new mailbox, you can configure the collection of mail from the Emails you already have (the screenshot shows the settings for collecting mail in Gmail):

The same can be said about mail client software. Most of them also have a built-in spam cutter.

But in this case, do not forget that the mail service will have its own spam folder, which will also need to be periodically viewed (or searched there for messages that should arrive, but did not reach - for example, confirmation of registration somewhere is often cut by a spam filter), because mail will not be sent from it to your computer by default (although this can be corrected in the settings of the service or client program).

Good luck to you! See you soon on the blog pages site

You may be interested

Account - what is it, how to create or delete it
How to create an email - what is it, how and where to register and which email to choose (mailbox)
What is Email (E-mail) and why is it called email
How to restore a page in VKontakte (in case of loss of access, deletion or blocking)
CAPTCHA (captcha) - what is it and what is it used for Moon Bitcoin (Litecoin, Dash, Dogecoin, Bitcoin Cash) - earn money on cryptocurrency faucets Should I buy image links?
Dog symbol - why is the @ dog icon so called, the history of the appearance of this sign in the email address and on the keyboard A moderator is a person who makes online communication possible.

Hello dear site readers! Today we will talk about how to protect the site from spam using captcha, we will analyze the best plugins to protect wordpress from spam in comments, profiles and letters.

It is the height of summer, and it is very difficult to write articles as often as we would like. In addition, my car began to let me down a bit and after work I spend the evening in the garage.

But this will not stop me, and I will never give up my blog and you my friends. As they say, everything that does not kill us makes us stronger ... Moreover, I have a lot that have not yet been fulfilled ...

Spam protection methods

A spammer is a person who sends, leaves and pollutes other people's sites with spam.

A spam bot is a special program designed to automatically add comments, register profiles or send emails, even cracking the captcha, if any.

Captcha (CAPTCHA) is a special test program, the purpose of which is to determine who leaves a comment, a human or a robot, using various logical tasks.

The question is, why would a spammer litter hundreds of blogs and websites with various comments? The fact is that this person has a grid of sites, the so-called. And in order to make money on these sites, you must first increase the TIC and PR indicators or attract traffic, and due to comments, the spammer will receive everything at once, both free links and visitor conversions.

Of course, I also do not mind replenishing my personal budget. There is never a lot of money, but not with the same barbaric methods. Every day, my plugin, which is on guard against such webmasters, blocks 25 spam comments, and this is provided that the blog is still very young and has a small traffic of 170 people per day. It's scary to imagine what will happen when the blog becomes famous and promoted.

So, if you still do not protect your site in any way, I advise you to do it as soon as possible with the help of plugins that implement captcha on the site. So, what are the captchas and which one is the best, that's about it below in the text.

Types of captcha on websites

We figured out who spammers are and why they have malicious intent, now let's talk directly about ways to protect comments.

Advanced bloggers protect their sites by embedding various javascript into the “Leave a comment” buttons, since spam bots do not execute JS.

However, this is not 100% spam protection, and such does not exist, because technology does not stand still. If some new captcha came out, then there will definitely be an anti-captcha for it, it's a matter of time.

Since the bulk of my readers are beginners who do not want to deal with all this javascript and PHP, smart people have come up with plugins for them that protect comments on sites from various garbage.

You don’t need to figure out how they work at all, but it will be enough just to download them, install them on wordpress and make a couple of tinctures. It couldn't be easier, that's why I love this engine.

1) Akismet. This spam catcher plugin is installed automatically with the WordPress engine. If you don't have it, you can download. Only for its configuration and proper operation you will need to install an API key, which you can get Here.

After registering and receiving the key, akismet will start correctly, and do his job qualitatively. After adding another comment, this plugin contacts a special server and checks it for spam. If everything is fine, then the comment will pass, and if not, then the author of the comment will add to the akismet spammer database.

However, this plugin is not as smooth as we would like. The fact is that sometimes he does not skip normal comments left by people, not robots.

In addition, I don’t really like the process of obtaining an API key either, because if you don’t have an invitation, you will have to wait until they send it.

2) yaCAPTCHA. A very common plugin, used mainly when registering on the site. You will need to enter the characters drawn in the picture. You can download the yaCAPTCHA plugin Here.

However, such a captcha often causes difficulty for visitors, since many letters are so distorted that you have to suffer before you guess it.

3) SI Captcha Anti-spam. This plugin is very similar to its predecessor yaCAPTCHA. To become its owner go to the following page.

In this captcha, you can even listen to the text or update it, which is important.

4) Simple CAPTCHA. One of the most popular and reliable wordpress captchas. You can download it from this link. After installing the plugin, activate it in the admin panel.

This captcha has the same disadvantages as yaCAPTCHA and SI Captcha Anti-spam and poor readability.

5) WP-reCAPTCHA. To download this plugin to protect the site from spammers, go to this website. Then, when you install and activate the plugin, go to the ReCaptcha service and register. As a result, you will receive an API key, which must be entered in the captcha settings in order for the plugin to start working.

This plugin is the best (in quotes). Not only spammers won't be able to break it, but people will hardly be able to leave a comment.

I would give it to the one who invented it, hands ... It's like it was necessary to think out so much, to be smart with the captcha. It's a shame that many popular services actively use this plugin, Google is no exception.

6) ImHuman. Cool captcha in the form of pictures. You need to select pictures of one feature. In my example, I will have to mark all the pictures with the image of a chair.

I will add that you can change the pictures and their location to your liking. You can download the ImHuman plugin Here.

7) WP-NOTCAPTCHA. Also a graphic captcha to protect the site. In order for the visitor to leave a comment, you will need to rotate the images and line them up vertically.

I didn’t really like it, although the idea is very original, and there are times when you turn these pictures 20 times so that the comment goes through. You can download the plugin from the following link. Images in the plugin can be changed to your own.

8) CheckBot. Another graphic plugin that fights spam. You can download it Here. In order for the plugin to work after installation and activation, you need to insert into the file comments.php the next line to the place where the captcha will be displayed.

In order to leave a comment, you will need to select the largest circle. The condition may be different.

9) DCaptcha. A very popular plugin, as it takes everyone with its simplicity. You just need to check the box to the left of the "I'm not a robot" field. Its disadvantage is that spam robots hack it very easily and rubbish comments seep into the blog.

Often this plugin is installed together with other plugins.

10) Math Comment Spam Protection. A very popular and high-quality plugin that perfectly fights spam and protects wordpress. I had this plugin until recently, until I found an even better replacement for it.

Its essence is as follows, it displays a simple mathematical problem (how many will be 2 + 2 and others), and you must enter the mathematical result in the field.

Necessary download plugin, then install and activate it. After, in the blog file comments.php add the following code to the place where you plan to display the captcha.

1 2 3 4 5 6 7 8 9 /****** Math Comment Spam Protection Plugin ******/ if ( function_exists('math_comment_spam_protection') ) ( $mcsp_info = math_comment_spam_protection() ; ?>

” />

” />

Of course, there are other plugins that perfectly filter out unnecessary spam, but they have a lot of disadvantages and I did not consider them in this article.

In any case, the visitor will have to spend some of the time entering the captcha. As a result, on such a site, the number of comments is slightly reduced, compared to sites where there is none at all or SHE IS, but you can't see it.

Antispam Bee Plugin - Best Spam Protection

I present to your attention the best anti-spam plugin of all time - Antispam Bee.

So why is it better than other modules that I talked about above? This plugin creates an invisible field in the comment form. When a visitor wants to leave a comment, he will not see this field and will not fill it out, so his comment will pass.

But with spam bots, the situation is different. These harmful robots fill absolutely all fields, including the invisible one, and this is where he will get caught and blocked.

Installing and configuring Antispam Bee

You can download the plugin by clicking on this link. The next step is to upload it to the site and activate it. I wrote about how to install plugins in the article "".

You will see a window with settings that you can adjust to your liking. Everything is clear there, I do not think that problems can arise.

That's all for me. Don't forget subscribe to article updates blog to keep abreast of all events and posts.

Now you know how to better protect your site from spam. I do not force the use of all methods, however, as practice shows, only after trial and error the result is obtained.

Do not be afraid to experiment, and only then will you understand which plugin for protecting comments and site profiles is the best.

As always, in the end, a cool video that will not leave anyone indifferent.

And how do you deal with garbage comments and left registrations on your projects, tell us about it in the comments. Bye!