Out of the Box Solutions Blog

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Out of the Box Solutions for solutions to help deal with it. Call us 800-750-4OBS (4627) today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, December 13 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Privacy Internet Cybersecurity Productivity Smartphones Efficiency Browser Microsoft Communication Malware Hardware Email Android IT Support Cloud Applications Users Backup Data Business Management Saving Money Managed IT services Data Backup Mobile Device Ransomware Google Passwords Network Small Business Windows 10 Wi-Fi Data recovery IT Services Communications Wireless Outsourced IT Social Media Managed IT Services Workplace Tips Cloud Computing Collaboration Innovation Business Intelligence Employer-Employee Relationship Blockchain Hosted Solutions VoIp Software Marketing Information Internet of Things Mobile Devices Business Networking Microsoft Office Hackers Connectivity Automation Managed IT Service Remote Computing Patch Management Apps Artificial Intelligence Computer Virtual Assistant Cost Management Analytics Bandwidth Managed Service Wireless Charging Cortana Compliance Virtualization VPN BDR Gmail Data Management Computers Remote Monitoring and Management Tech Terms Save Money Upgrade IT budget SSD A.I. Access Control Document Management Telecommute Dark Web Hard Drive Value Hybrid Cloud Tablet Amazon Eliminating Downtime Holiday Physical Security Conferencing Medical IT Lead Generation Network Attached Storage Operating System Company Culture Business Technology Staff Dongle Paper Analysis Certification Battery Facebook Movies Authentication Paperless Office Smartphone Maintenance Technology Tips Error Processors Cables Excel BYOD eCommerce Laptop Ink Office SaaS Password Managing Stress Troubleshooting Twitter Telecommuting Authorization Digital Data loss Router Streaming Media Tip of the week Vulnerability Machine Learning Database Voice over Internet Protocol Knowledge Office 365 Plug-In Wireless Internet Online Shopping Government PowerPoint Content Filtering GDPR Environment Phishing Update IT Management Inventory Unified Communications Spam Websites Internet Explorer Comparison Backup and Disaster Recovery Downloads User Tip Touchscreen Spyware Cybercrime Telephony Proactive IT Help Desk Sports WannaCry Server Management e-waste G Suite Data Breach Outlook Big Data Server Data Protection RAM Workers Edge Virus Safety Threat Specifications Settings Hard Drives Trends Microsoft Office 365 HP Tactics Voice over IP Business Continuity Gadgets Storage HIPAA disposal Bring Your Own Device Sales Profitability Reporting Mobile Security Microsoft Teams Millennials Miscellaneous Antivirus Printing Alert Printers Quick Tips Regulation Disaster Recovery