To send me e-mail, manually write my address (see below) in your e-mail software (you won't be able to copy-and-paste the address below). Note also that I shall change my address as soon as someone will start to spam it, so check this page for my current address if an older one does not seem to work anymore:
Does my e-mail address look strange? In case you wonder why, this is a "captcha" that makes it impossible for automated software to read it, but you should have no difficulty to read it correctly.
An increasing number of e-mail servers are (incorrectly) configured to regard as spam any e-mail that is sent from an account with a different account name than the addresses in the From: and/or Reply to: fields. Some e-mail client software can be mis-configured in a similar way. My e-mail address above is an alias, not my real e-mail account (so that I can change the alias any time it becomes necessary to avoid spam, without needing to get a new real e-mail address). Therefore, these e-mail fields in my messages contain different data than my account name. This is a fully correct use of e-mail fields and aliases, frequently used for legitimate purposes and fully supported by e-mail protocols. If you sent me e-mail and think you should have received my reply, but you did not (I try to reply to all relevant and sensible e-mail, although I may do so after quite some time), you might be using one of these mis-configured servers or clients, and I cannot do anything about it. My outbox contains several, potentially useful replies to e-mail inquiries that the server of the destinatary refuses to accept. Reconfigure your e-mail server and/or client if you can, or talk to your server administrator.
How do spammers harvest e-mail addresses?
Spammers use web spiders (which are automated programs similar to those used by Google and other legitimate web search engines) to read web pages and extract e-mail addresses. This is a simple task, because an e-mail address always has the format email@example.com.
Often, the address is accompanied by an HTML link in the format <a href = "mailto: somename@ domainname. topdomain">, like the above example. Once a large number of addresses are collected, they can be verified by other automatic programs (to eliminate fake addresses, or addresses that no longer work), and used for spamming. For this reason, I am not writing my e-mail address here in a form that can be read easily by a spider.
E-mail addresses can also be harvested by breaching your computer's security. The most common method is by infecting your computer with malicious software, usually sent to you as an e-mail attachment, or downloaded by a specially written web page you may visit while web-surfing. This software will read the address book of your e-mail software, and send all addresses to an Internet server controlled by spammers. In some cases, malicious software can convert your computer into a mail server that sends out spam on a continuous basis. You may suspect that this is the case if your computer slows down excessively and generates significant amounts of Internet traffic without any obvious reason (note that many programs generate moderate amounts of Internet traffic, usually on an occasional basis, for perfectly good reasons like searching and downloading updates).