SPEWS can be used in many different ways. It can be used to double check the "spammishness" of a
particular range of Internet addresses by using this webpage's test feature. If the IP address
is listed in SPEWS, there's a good chance others have been spammed (received unsolicited bulk email)
by the same place. One can then use this knowledge to decide how to handle email from this source
in the future.
SPEWS also has lists of IP address ranges and associated domain names which can be used by one's
email filtering system (i.e. Procmail,
to reject email or "tag" email from SPEWS listed sources.
SPEWS lists are available and can be used on a DNS query level. Either Level 1 or Level 2 SPEWS
lists can be checked at systems currently providing this service. These levels are explained in
the SPEWS FAQ.
SPEWS can be used to build router or firewall "reject" lists, used to deny
any packet traffic to SPEWS listed areas.
SPEWS lists can be used with DNS servers to invalidate SPEWS listed nameservers run by spammers.
On smaller, not highly trafficked systems, SPEWS lists can be used to deny website access to people
or email address harvesting robots coming from SPEWS listed areas.
But what if you are just an end user? What if all these technical terms mean little to you and you
just came to this website to find out how to cut down on your spam? The best way is to ask and coax
your Internet Service Provider (ISP) to use some sort of email filtering system. Most ISPs these days
run email software products where it's relatively easy to change a few parameters and get the full effect
of the different spam advisory systems. Since many of these systems are free to use, ISPs should
jump at the chance to provide better service for their users, not to mention saving themselves money
by not having to process and store the spam.
Recently, end users running the Windows® operating system have been given a couple of
do-it-yourself options to deal with spam on their own PCs. Check this link to learn about these
client-side POP email filtering methods.