Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Texas Professional IT Services LLC Blog

Texas Professional IT Services LLC has been serving the Baytown area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Spam

Tech Term: Spam

Spam: it’s something that just about every computer user has heard of, and knows is bad. However, how much do you really know about spam? For today’s Tech Term, we’ll slice into the different types of spam, as well as some theories as to where the term itself originated.

Why is It Called “Spam?”
There are a few different schools of thought as to why the term ‘spam’ was attributed to the junk messages that annoy and infuriate so many users, waste millions of dollars a year, never mind their propensity to spread malware and viruses. One theory attributes the term to the University of Southern California’s computer lab group, who were inspired by the canned lunch meat’s characteristics to name the annoying messages after it (I guess it put a bad taste in their mouth).

Another, more generally accepted theory, is that the name ‘spam’ comes from the infamously repetitive Monty Python song. The idea here is simply that the song and the messages have much in common, both being highly repetitive and offering little real value.

The Origins of Spam
It isn’t agreed upon where exactly the messages we now refer to as “spam” first originated. On March 31st, 1993, a Usenet user named Richard Depew accidentally posted 200 or so duplicate messages to a newsgroup. After another user referred to these messages as spam, Depew used the term in his apology.

Another theory is that “spam” originated in multi-user dungeons, or MUDs, which were an advanced form of chat room, thusly named due to many similarities to the role-playing game Dungeons and Dragons. Users, or MUDers, would flood different aspects of the chat room with unwanted content. In 1990, MUDers used the word spam as they discussed its origins as a term for the junk messages that we so easily recognize today.

Two more theories involve the Bitnet Relay, a chat system from the 1980s, and another in the TRS-80, with the Monty Python song again being used as an annoyance to users.

Types of Spam
There are a few different kinds of spam out there to deal with.

Email Spam - Possibly the most recognizable form of spam, spam emails are the unwanted junk messages that clog up an inbox. Fortunately, there are more regulations being put into place to prevent spam from reaching inboxes, as well as improved preventative measures being incorporated into email software as well.

Texting Spam - Very similar to email spam, texting spam is unwanted text messages received from a business. Emergency messages don’t count as spam, according to the law. Just as it applies to email spam, the CAN-SPAM act also applies to text spam.

Comment Spam - Spam isn’t restricted to messaging. Comment spam is the term for those comments that pop up in response to your content that have nothing to do with the topic you’re discussing, or even a subject related to your industry.

Spam is no laughing matter. Reach out to Texas Professional IT Services LLC for solutions to help deal with it. Call us (832) 514-6260 today.

Antivirus Fights More than Just Viruses
You May be Losing More than You Think with a Mispl...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Privacy Cloud Technology Cybersecurity Managed IT Services Communications Network Security Malware Backup Outsourced IT Tech Term Smartphones Hardware Microsoft Business Email Ransomware Android Wi-Fi Hackers VoIp Save Money Software Productivity Applications Business Management Communication Google Smartphone Social Media Internet Small Business Data Backup Windows 10 Excel Computer Internet of Things Patch Management Microsoft Office Phishing Employer-Employee Relationship Collaboration VoIP Router Cloud Computing Miscellaneous Passwords Innovation Data Settings Twitter Data Breach IT Services Mobile Devices IT Support Business Intelligence Government Office Browser Data Management Apps Windows Retail Blockchain Bandwidth IT Support Wireless Gmail Holiday Computers Spam User Tips Office 365 Wireless Charging Access Control Cortana Tip of the week Scam Remote Computing Password Word Automation Workers Chrome Data Recovery Tech Terms Saving Money How To Company Culture Hosted Solutions Mobile Device Management Physical Security Alert Networking Cost Management Managed IT Service Virtual Assistant Battery Artificial Intelligence Virus Website Efficiency Cybercrime App Vulnerability Analytics Business Continuity Data Protection Law Enforcement VPN Managed IT Services Network Politics Disaster Recovery Cleaning G Suite Google Drive Hard Drives Processors User Security Managed IT Licensing Connectivity Information Data loss Botnet Bring Your Own Device Two-factor Authentication SSD Printer Server Spyware Business Technology Database Tech Support Streaming Media Amazon Remote Control Antivirus User Tip Facebook Printers HP IT budget Tactics Downloads Users Spam Blocking Staff Virtualization Smart Technology Remote Support Multi-Factor Security Inventory Document Management Maintenance Phone System IT Management Sales Travel Trends Workplace Tips Email Management Websites Server Telecommuting Paperless Office Mobile Security Internet Explorer Tablet Education A.I. Plug-In Safety Remote Monitoring Marketing Automobile Digital Operating System Threat Hosted Solution Gadget Network Attached Storage Millennials Knowledge Live Streaming Movies Proactive IT Biometrics Lead Generation Edge Apple Files Printing Copy Server Management WhatsApp Unified Communications Remote Monitoring and Management Dongle Access Google Maps iPhone Environment Paper Hybrid Cloud Paste Information Technology Telephony Comparison RAM Entertainment BDR BYOD WannaCry Hiring/Firing Big Data Gadgets e-waste Ink Cables Machine Learning Voice over IP Specifications News Microsoft Teams Technology Tips HIPAA Staffing disposal PowerPoint Voice over Internet Protocol Shortcut eCommerce Conferencing Telephone System Managing Stress Backup and Disaster Recovery Hard Drive Recovery Laptop File Sharing Dark Web Value Sports Telephone Systems Telecommute Online Shopping Content Filtering Thank You Congratulations Analysis CrashOverride WiFi Managed Service Emergency

Latest News & Events

Texas Professional IT Services LLC is proud to announce the launch of our new website at http://www.texproit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Texas Professional IT Services LLC can do for your business.

Call Us Today
Call us today
(832) 514-6260

1209 Decker Dr.
STE 202

Baytown, Texas 77520