Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Out of the Box Solutions for solutions to help deal with it. Call us 800-750-4OBS (4627) today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 20 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Privacy Cybersecurity Technology Hardware Tech Term Ransomware Internet Android Data Business Management Email Wi-Fi Mobile Devices Applications Malware Smartphones Microsoft Windows 10 Blockchain IT Support Computers Wireless Communication Cloud Save Money Backup Remote Computing Saving Money Computer Cost Management Wireless Charging Artificial Intelligence Managed IT services Employer-Employee Relationship Business Intelligence VPN Gmail Small Business Data Management Business IT Services Communications Tech Terms Outsourced IT Patch Management Social Media Productivity Collaboration Innovation Cortana Passwords Sports BDR Unified Communications Data Breach Settings Server Management Specifications Software Data Protection Tactics HIPAA Virus Edge Marketing Sales Internet of Things RAM Mobile Security Hard Drive Antivirus IT budget Tablet Connectivity Hackers Microsoft Teams Managed IT Service Operating System Battery Automation Conferencing Maintenance Processors Staff Apps Technology Tips Excel Office Router Vulnerability Cloud Computing Telecommuting Analytics Knowledge Data Backup Office 365 Environment Virtualization Machine Learning Content Filtering Internet Explorer Spyware Websites Streaming Media IT Management Backup and Disaster Recovery Google Telephony e-waste Server Threat HP Safety Downloads Workers Big Data VoIp User Tips Hard Drives G Suite Voice over IP disposal Printing Networking Trends Millennials SSD Holiday Value Lead Generation Telecommute Document Management Paper Dongle A.I. Physical Security Business Technology Network Attached Storage Facebook eCommerce Virtual Assistant Smartphone Managed IT Services Paperless Office Ink Bandwidth Movies Laptop Password Twitter Online Shopping Database Data loss Tip of the week Digital PowerPoint Government Phishing Efficiency Comparison Inventory Cybercrime WannaCry Spam User Tip Browser Data recovery Alert Company Culture Managing Stress Gadgets Bring Your Own Device Users Hybrid Cloud