Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Texas Professional IT Services LLC Blog

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Texas Professional IT Services LLC for solutions to help deal with it. Call us (832) 514-6260 today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Tech Term Communications Malware Smartphones Backup Productivity Communication Microsoft Business Hardware Outsourced IT Android Hackers VoIp Google User Tips Internet Software Browser Email Hosted Solutions Passwords Wi-Fi Social Media Save Money Small Business Ransomware Efficiency Business Intelligence Collaboration Smartphone Miscellaneous Data Backup Cloud Computing Business Management Windows 10 Innovation Applications Microsoft Office Data Saving Money Data Recovery Automation Data Management Users IT Support VoIP Managed IT Services Mobile Devices Apps Router Computer Bandwidth Internet of Things Phishing Data Breach Network Excel Blockchain Settings Twitter Access Control Analytics Patch Management Employer-Employee Relationship Office Government Mobile Device IT Services Politics Business Continuity Law Enforcement BDR Mobile Device Management Data Protection Windows Chrome Marketing Alert How To IT Support Dark Web Holiday Spam Workplace Tips VPN Wireless Tech Terms Physical Security Retail Compliance Managed IT Service Virtual Assistant Gmail Wireless Charging Gadgets Cybercrime Office 365 Networking Cost Management App Information Virtualization Tip of the week Battery Computers Website Cortana Workers Virus Scam Remote Computing Artificial Intelligence Company Culture Password Word Vulnerability News eCommerce IT budget Tactics Medical IT Sales RAM Staffing Email Management Hybrid Cloud Big Data e-waste Shortcut Analysis Hard Drive Staff Downloads Disaster Recovery Troubleshooting Travel Telecommuting Machine Learning Ink Biometrics Touchscreen Conferencing Document Management Inventory Telephone System Online Shopping IT Management Maintenance Recovery SaaS Tablet Technology Tips Microsoft Teams Cables disposal Managed Service File Sharing Processors Websites Trends Automobile Printer Server Telephone Systems Update Education Millennials Gadget Google Drive Lead Generation PowerPoint Access Hosted Solution Microsoft Office 365 Content Filtering Paperless Office Mobile Security Voice over Internet Protocol Cleaning Internet Explorer Managed IT GDPR Knowledge Backup and Disaster Recovery Managing Stress Laptop Value Information Technology User Security Spyware Safety A.I. Printers Live Streaming Operating System Two-factor Authentication Plug-In Apple Telecommute Sports BYOD Copy Authentication Licensing Digital Botnet Network Attached Storage Threat Storage Files Hard Drives Business Technology HP Movies Smart Technology Google Maps Remote Control G Suite WhatsApp Telephony Edge Proactive IT iPhone WannaCry Data loss Connectivity Paste Authorization Tech Support User Tip Server Management Printing Error Comparison SSD Entertainment Database Reporting Dongle Unified Communications Hiring/Firing Spam Blocking Bring Your Own Device Voice over IP Environment Multi-Factor Security Remote Monitoring and Management HIPAA Antivirus Streaming Media Amazon Remote Support Server Paper Remote Monitoring Specifications Facebook Phone System Thank You Emergency Congratulations Outlook Regulation CrashOverride WiFi Quick Tips

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520