Scammer's Scam Glossary
Scam's Lexicon
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
B |
Burn |
Any activity done by a baiter that harms, annoys, insults or delays a scammer.Some baiter websites use this term to tell the scammer that they have been baited. |
BTA |
(Basic Travel Allowance) - One among the many fees that scammers try to collect from victims telling that they require them for sending the prize they have won. |
Bait Thread |
Written correspondence between a scammer and baiter. |
Baiter |
Short form of "Scam Baiter" is usually a person who uses any of a variety of techniques to irritate, harm, or waste the time of a scammer responding to fraudulent emails. |
Bagman |
Person used by the scammers to get the money. |
Bait Number |
The phone number that are used for scam baiting. |
Business Opportunities (or Bizopps) |
Methods that naturally engage excessive and speculative income claims and are in fact fake business undertakings. |
Browser |
Programs that permit a user to locate, examination, listen to, and cooperate with material on the Internet. Browser Hijacker - A familiar spy ware program that modifies your web browser's home page mechanically, even if you alter it back. |
Browser Hijacker |
A familiar spy ware program that modifies your web browser's home page mechanically, even if you alter it back. |
Baiter Account |
The email account used by the baiters to bait the scammers. |
Badger (Badger) |
A human being who baits baiters. Alike to how baiters bait scammers. |
Bayesian Filtering |
An arithmetical move toward to formative whether an email is spam, based on possibility deduction method found by English mathematician Thomas Bayes. |
Blacklist |
A characteristic of anti-spam software that permit users to assign IP addresses, province names, and person email addresses from which no mail will be acknowledged. This is at times termed as a "Static Black List" for the reason that the users define the list. |
Block list |
A publicized list, typically commercial, of IP addresses recognized to be basis of spam which is able to be used to make a set of connections block list to sort out mail initiating from these addresses. |