Skip to main content

What is Spam?

The irrelevant, unwanted and inconsequential emails that are sent to many users for the purpose of advertising, phishing etc. is called spam. Spam not only waste people’s time with non-essential mail, it also uses up a substantial network bandwidth.

The word Spam is believed to come from a song in a television comedy series called Monty Python’s Flying Circus. In a scene from that television series, a dialogue between a customer and the waiter was drowned by a chorus of a song that kept on repeating “Spam, Spam...Wonderful Spam”, hence spamming the conversation.

Spam can be further branched into two categories, cancellable Usenet spam, and Email spam.

Cancellable Usenet Spam                                                                   

Cancellable Usenet spam is basically a lone message which is sent to at least 20 Usenet newsgroups. There are people who are termed as lurkers. The lurkers are those who read newsgroups but seldom or barely give away their details or post anything. Usenet spam plunders the utility of the newsgroups of the user and they do so by astounding them with a storm of irrelevant posts and advertising. Furthermore, Usenet spam corrupts the ability of system administrators and owners to conduct or govern the topics that they obtain or accept on their systems.

Email Spam

Email Spam targets only individual users by sending direct mail messages. The list of email spam is often conceived by exploring the web for addresses, scanning Usenet postings or by stealing the internet mailing lists. Email spam commonly cost users, who receive, money. When the user read or receive costs are incurred accordingly. In addition to that, it costs money to broadcast spam for online services and ISPs and these costs is transferred directly to subscribers.

Spamming is common in other media as well. Here are some categories in different media:

Instant Messaging Spam

Instant messaging spam is very common on instant messaging systems like Skype. Since instant messaging is not protected by the firewall, it proves to be a very useful channel for spammers.

Mobile Phone Spam

Mobile phone spam is aimed at the text messaging service of mobile phones. Spam through SMS is also described as SpaSMS, a term coined in 2000 at the news website Adland. Mobile phone spam can be increasingly annoying not only for inconvenience alone but also for the fact that sometimes the fees is charged per text for receiving to the user.

Social Network Spam

Social networks like Facebook and Twitter are also not exempted from spamming. Messages containing spam links are sent to the users. In Facebook, spammers sometimes even hack an account and send spam links to all the user’s trusted contacts including friends and family. In Twitter, spammers first gain trustworthiness by following a public or famous figure and when the owner of that account follows the spammer back; it allows the spammer to proliferate.

Spamming has become a nuisance all over the internet. Few measures can be taken to be safe from being a victim of spammers, like by not opening a spam email, not replying back to spam emails and by never revealing one’s email address or contact details.


Popular posts from this blog


Sometimes people need to use an unknown computer to complete a task with Internet and they need to share some personal information there. This may compromise their personal information. When using a public computer, Key logging comes handy to people seeking such information. Key Logging is also known as Keystroke logging or Keyboard capturing. This feature enables information seeker to the recording of key struck on a keyboard. Users do not know that his actions are monitored by anyone else. This is a dangerous feature that compromises people’s personal information like the debit card, credit card and more. To overcome above situation it is always advised that you use an anti-keylogger app, at the time of using a public terminal with your personal information. This will not let other monitor your keyboard strokes. Software named Ghost press can be used to prevent capturing of keyboard strokes typed by you for windows. Ghost press is a free and easy to use program that preven

How to install MAC mouse cursor in Windows 10

Windows 10 comes with many options in mouse cursors. They can be changed with their Shape and Size, Their Black and White cursor are also good. But if you are interested in something different than Apple's Mac mouse cursors are available in market to satisfy you. How to install MAC mouse cursor in Windows 10 Now I will show you how to install MAC EI Capitan cursors in Windows 10.  Following steps will help you. Step 1.   Go to . Step 2.   Now click on Download link which is in the right corner of website, When this Zip file completely downloaded, now open that Zip file using WINRAR , or locate the file and right click. Now select Extract All(if you have WinRAR installed in your device). Step 3.   After that select location, where you want to install that file on your Device. Step 4.   Now open that file and locate the file install.inf. After that click on particula


● Ctrl+A      Use the keyboard shortcut key ctrl+A   to select all item in a window or a text file.. ● Ctrl+B      Use the keyboard shortcut key ctrl+B   to  Bold   highlighted text ● Ctrl+C      Use the keyboard shortcut key Ctrl+C  to copy the highlight text. ● Ctrl+F     Use the keyboard shortcut key Ctrl+F  to Find in any program,This  includes your Internet browser to find text on the current page. ● Ctrl+N     Use the keyboard shortcut key Ctrl+N  to Create new page Or Documents. ● Ctrl+O     Use keyboard shortcut key Ctrl+O to open a file. ● Ctrl+P    Use the keyboard shortcut key Ctrl+P to  Print the page being viewed. For example, the document in Microsoft Word or the web page in your Internet browser. ● Ctrl+S     Use the keyboard shortcut key Ctrl+S to While working on a document or other file in almost every program pressing Ctrl+S will save that file. This shortcut key should be used frequently anytime you're work