About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Texas Professional IT Services LLC Blog

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Texas Professional IT Services LLC for solutions to help deal with it. Call us (832) 514-6260 today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Network Security Cybersecurity Productivity User Tips Malware Tech Term Microsoft Smartphones Managed IT Services Communications Internet Backup Efficiency Communication Browser Business Hardware Email Outsourced IT Android Google Hackers Software Data Backup Wi-Fi VoIp Mobile Device Ransomware Small Business Data Recovery Collaboration IT Support Hosted Solutions Network Cloud Computing Smartphone Passwords Holiday Social Media Windows 10 Internet of Things Data Save Money Microsoft Office Business Management Applications IT Services Saving Money Business Intelligence Managed IT Services Apps Wireless Miscellaneous Innovation Access Control Users Mobile Devices Workplace Tips Automation VoIP Data Management Marketing Router Blockchain Networking Bandwidth Information Excel Computer Settings Phishing Twitter Data Breach Patch Management Analytics Employer-Employee Relationship Password Word Office Government Business Continuity VPN Data Protection Tech Terms Chrome Company Culture How To Compliance Politics Dark Web Mobile Device Management Windows Alert Retail IT Support Physical Security Managed IT Service Connectivity Cost Management Gmail Spam Virtual Assistant Mobility Computers Wireless Charging Remote Monitoring and Management Office 365 Artificial Intelligence BYOD Virtualization BDR Tip of the week Battery Gadgets Virus Cybercrime Website Cortana Scam Remote Computing App Vulnerability Managed Service Law Enforcement Workers Wearables Travel Telecommuting PowerPoint Shortcut Microsoft Office 365 Hard Drive Paperless Office Mobile Security Internet Explorer GDPR Remote Monitoring Backup and Disaster Recovery Managing Stress Voice over Internet Protocol Upgrade Conferencing Laptop Value Telephone System Online Shopping Safety A.I. Recovery Outlook Tablet Plug-In Education Millennials Telecommute Sports Authentication File Sharing Processors Disaster Recovery Digital Operating System Automobile Telephone Systems Content Filtering Network Attached Storage Threat Gadget Google Drive Storage Lead Generation Biometrics Hard Drives Hosted Solution Certification Cleaning Movies Managed IT G Suite Profitability Knowledge Proactive IT Live Streaming Data loss Authorization User Security Spyware Printer Server Edge Licensing Server Management Printing Two-factor Authentication Error Apple Access SSD Copy Database Reporting Botnet Dongle Unified Communications Bring Your Own Device Eliminating Downtime Files Google Maps Remote Control WhatsApp Telephony Information Technology Antivirus Streaming Media Business Technology HP Printers Environment Training Tech Support User Tip Paper iPhone WannaCry Facebook Paste Amazon IT budget Tactics Entertainment Medical IT RAM Hybrid Cloud Wireless Internet Comparison Hiring/Firing Spam Blocking Analysis Voice over IP Staff Downloads Troubleshooting Smart Technology Big Data e-waste Security Cameras Machine Learning Ink Multi-Factor Security Touchscreen HIPAA Document Management Inventory IT Management Maintenance Phone System SaaS Remote Support Server Technology Tips Microsoft Teams Cables Help Desk Specifications disposal Staffing Email Management News eCommerce Websites Trends Update Sales Healthcare Emergency Regulation Thank You Congratulations Quick Tips CrashOverride WiFi

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520