Out of the Box Solutions Blog

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Out of the Box Solutions for solutions to help deal with it. Call us 800-750-4OBS (4627) today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 23 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Tech Term Network Security Privacy Cybersecurity Smartphones User Tips Malware Hardware Internet Android Communications Cloud Communication Data Microsoft Managed IT services Passwords Ransomware Browser Network Blockchain IT Support Hosted Solutions Wi-Fi Applications Mobile Devices Backup Saving Money Social Media Productivity Business Management Collaboration Email Employer-Employee Relationship Innovation Efficiency Google Business Intelligence Small Business VoIp Software Compliance Virtualization Marketing VPN IT Services BDR Data Management Information Computers Users Outsourced IT Managed IT Service Data recovery Internet of Things Save Money Networking Business Tech Terms Remote Computing Patch Management Wireless Automation Computer Hackers Artificial Intelligence Workplace Tips Cost Management Cortana Analytics Cloud Computing Bandwidth Virtual Assistant Wireless Charging Mobile Device Data Backup Windows 10 Gmail Inventory Unified Communications Workers Spam Websites Internet Explorer Specifications IT Management Touchscreen Spyware Cybercrime Proactive IT Voice over IP Backup and Disaster Recovery Downloads WannaCry Server Management e-waste G Suite Sales Big Data Sports Gadgets Data Protection RAM Millennials Edge Virus Safety Threat Server Microsoft Office 365 HP Tactics Remote Monitoring and Management Settings Hard Drives Trends Storage HIPAA disposal Bring Your Own Device Tablet Mobile Security Microsoft Teams Business Technology Miscellaneous Antivirus Printing Reporting Conferencing A.I. Access Control Document Management Telecommute Microsoft Office IT budget SSD Dark Web Managed IT Services Hard Drive Value Hybrid Cloud Amazon Excel Holiday Physical Security Connectivity Operating System Company Culture Staff Dongle Paper Medical IT Office Lead Generation Network Attached Storage Facebook Movies Authentication Telecommuting Paperless Office Smartphone Maintenance Analysis Battery Error Tip of the week Processors Cables Knowledge Office 365 eCommerce Laptop Technology Tips Apps Password Managing Stress Phishing Ink SaaS Content Filtering Twitter Authorization Digital Data loss Router Managed Service Comparison User Tip Vulnerability Machine Learning Database Voice over Internet Protocol Plug-In Telephony Online Shopping Streaming Media Environment Data Breach Government PowerPoint GDPR Quick Tips Disaster Recovery Regulation Alert Printers Troubleshooting