954-866-1600    Get SUPPORT

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Why Spam?
Spam can lead to a considerable amount of wasted time and assets, as well as provide a convenient medium of transportation for threats like malware and viruses. So why is it named after spam, everyone’s favorite canned lunch meat? One theory claims that the folks over at the University of Southern California’s computer lab named it after spam for some unknown reason--perhaps they simply thought it was a funny analogy to make.

The more accepted theory is that spam comes from the Monty Python song. Both the song and spam messages have a lot in common, being both highly repetitive and offering no real substance.

Where Spam Came From
It’s not clear where spam messages first came from. Some believe that spam messages first became a thing on March 31st, 1993. A Usenet user named Richard Depew accidentally posted 200 of the same message to a newsgroup. These messages were then called spam by another user, and Depew used the term in his apology, cementing its terminology.

Another theory regarding the name spam comes from multi-user dungeons, or MUDs, which were a type of chat room named after the role-playing game Dungeons and Dragons. These users would fill these chat rooms with a large quantity of unwanted content. Even the MUDers, as they were called, coined these junk messages spam.

There are two other theories related to spam involving Bitnet Relay, a 1980s chat system, and TRS-80, another use of the aforementioned Monty Python song to annoy users.

Types of Spam
Below, you’ll find the various types of spam that you could potentially encounter:

  • Email spam: Email spam messages are likely the most recognizable form of spam. Spam emails contain all sorts of junk that can make navigating your inbox a complete nightmare. Thankfully, there are regulations put into place that keep spam out of inboxes to an extent, but you can always integrate better solutions and software to augment the sorting of spam emails.
  • Texting spam: In much the same way, texting spam is a way to get unwanted messages through to people. It’s interesting to note that emergency texts don’t constitute spam. Similar to how email spam works, the CAN-SPAM Act also applies to text spam.
  • Comment spam: Comment spam is a bit different in nature from the previous two types. You may have noticed some comments that seem unwanted or “spammy” in nature, such as those advertising the selling of products or simply off-topic.

As always, you don’t want to be dealing with spam carelessly. If your business could use assistance preparing for spam, contact Evolution Networks for 954-866-1600.

Managed IT Services Provide Good Value for SMBs
A “Disaster” Covers More Than You’d Think
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Malware Privacy Software Cloud Outsourced IT Ransomware Email IT Services Network Security Data Backup Managed IT Services Business Computing Small Business Cloud Computing Android Hosted Solutions Backup Data Recovery Hackers Productivity Business Remote Monitoring Data Management Mobile Devices Browser Computer IT Support User Tips Managed IT IT Support Internet Business Management Business Continuity Microsoft Disaster Recovery Cybersecurity Infrastructure Google Managed IT Services Data Managed Service Provider Firewall Unified Threat Management Smartphone Encryption Mobile Device Tip of the week Office 365 Server Holiday Smartphones Project Management Saving Money Government Efficiency Word Hardware BYOD Data Security Antivirus Telephone Systems Applications Phishing Artificial Intelligence Data loss Productivity Windows 10 SaaS Windows IT Management Tech Term Innovation Recovery Tablet Document Management Employer-Employee Relationship Server Management Maintenance HIPAA Uninterrupted Power Supply Scam Vulnerability VoIP Vendor Management Save Money Communication Content Filtering VPN Big Data Virtual Private Network Analytics Internet of Things Risk Management Chrome Licensing Two-factor Authentication Windows 10 Paperless Office Mobile Security Money Social Media Business Technology Redundancy Passwords Collaboration Heating/Cooling Computing Infrastructure Data Breach 3D Printing Outlook Spyware Operations Mouse Break Fix Automation Lenovo Bandwidth Files Google Drive Regulations Servers Alerts Technology Laws Upgrade Shortcut Wearable Technology Apple Comparison Disaster Dark Web Superfish Avoiding Downtime Spam Unsupported Software Unified Communications User Error Patch Management Politics Customer Service Specifications Microsoft Excel VoIP Time Management Social Networking Mobile Data Statistics IBM The Internet of Things Printer BDR IT Technicians Data storage Black Friday Data Warehousing Networking Communications Assessment Motherboard Bluetooth Corporate Profile Net Neutrality Access Control How To Mirgation Google Maps Cyber Monday Consultation Mobile Computing Alert Solid State Drive Blockchain Remote Computing Facebook Computer Care Travel Mobile Device Management WannaCry Internet Exlporer SharePoint Tech Support Storage Router Samsung Hard Disk Drive Permissions Techology Training Miscellaneous Search Monitors Cooperation IT service Downloads Identity Theft Software as a Service Computing Mail Merge Gadgets Migration Network Management Modem Hosted Solution Fraud Unified Threat Management Upgrades Microsoft Office Staff Mobility Virtual Reality Technology Tips Address Websites Firefox Chatbots Touchscreen Website Software Tips Disaster Resistance YouTube Gmail Wireless Multi-Factor Security Help Desk Smart Technology Workplace Tips Customer Relationship Management Identity Cookies Hotspot Proactive IT Password Digital Payment Robot Hacking Settings Augmented Reality Google Calendar Distributed Denial of Service Nanotechnology History Language IT Consulting Wi-Fi Trending Digital Flexibility Legislation Cabling Managed IT Service Virtualization Quick Tips Compliance Screen Reader Computer Repair Tracking Mobile Device Managment Taxes Marketing Private Cloud Downtime Smart Tech Chromebook IT Consultant Error File Sharing Connectivity Crowdsourcing Health Physical Security G Suite CrashOverride Black Market Cybercrime Electronic Medical Records Office Twitter Social Cleaning Legal Information Technology Apps Emoji Processors Automobile Motion Sickness Sports Point of Sale Budget Staffing Office Tips Work/Life Balance Supercomputer Users Hacker Personal Information Network Education Meetings Law Enforcement How To IT Budget Web Server Emergency Botnet Notifications WiFi Administrator Webcam Gadget Cortana Cameras Machine Learning GPS App Sync Update IT Solutions CCTV Relocation