About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

Texas Professional IT Services LLC has been serving the Baytown area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Texas Professional IT Services LLC for solutions to help deal with it. Call us (832) 514-6260 today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Privacy Cloud Cybersecurity Technology Malware Communications Managed IT Services Network Security Hardware Backup Business Outsourced IT Hackers Smartphones Save Money Software Microsoft Email Wi-Fi Ransomware Smartphone VoIp Productivity Applications Android Internet Communication VoIP IT Services Data Management Google Social Media Miscellaneous Passwords Data Backup Twitter Data Breach Windows 10 Small Business Government Office Excel Cloud Computing Microsoft Office Phishing Settings Computers Battery Wireless Charging Virus Employer-Employee Relationship Automation Website Workers Efficiency Saving Money Vulnerability Law Enforcement Mobile Device Management Business Continuity IT Support Business Intelligence Alert Tech Terms User Tips Access Control App Patch Management Analytics Cortana Tip of the week Data Remote Computing Scam Browser Managed IT Services Word Password Apps Politics Windows Chrome Mobile Devices Retail How To VPN Bandwidth IT Support Hosted Solutions Router Holiday Physical Security Spam Office 365 Computer Business Management Innovation Comparison Phone System Paste Antivirus Entertainment Facebook HP IT budget Specifications Company Culture Staff Virtualization News Remote Monitoring Data Protection Automobile Document Management IT Management Conferencing Gadget Websites Server Telephone System Biometrics File Sharing Dark Web Recovery Paperless Office Content Filtering Telephone Systems Google Drive Safety Marketing Cleaning Access User Security Google Maps Managed IT Digital Network Attached Storage Gmail Millennials Licensing Information Technology Two-factor Authentication Networking Lead Generation Botnet BYOD Business Technology Hiring/Firing Gadgets Edge Server Management User Tip Managed IT Service Tech Support Cybercrime Remote Control Dongle Virtual Assistant Staffing Artificial Intelligence Telephony Shortcut Spam Blocking Multi-Factor Security BDR WannaCry Remote Support Sales Big Data Machine Learning Telecommuting Voice over IP Travel Email Management Data Recovery Disaster Recovery Technology Tips HIPAA Tablet Collaboration eCommerce Education Printer Server Backup and Disaster Recovery Hard Drive Laptop Knowledge Hosted Solution Telecommute Online Shopping Live Streaming Printers Internet of Things Hard Drives Processors Apple Blockchain Files Copy Data loss Wireless WhatsApp Smart Technology SSD Spyware iPhone WiFi CrashOverride Inventory Thank You Mobile Security Emergency Congratulations

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520