Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Why Spam?
Spam can lead to a considerable amount of wasted time and assets, as well as provide a convenient medium of transportation for threats like malware and viruses. So why is it named after spam, everyone’s favorite canned lunch meat? One theory claims that the folks over at the University of Southern California’s computer lab named it after spam for some unknown reason--perhaps they simply thought it was a funny analogy to make.

The more accepted theory is that spam comes from the Monty Python song. Both the song and spam messages have a lot in common, being both highly repetitive and offering no real substance.

Where Spam Came From
It’s not clear where spam messages first came from. Some believe that spam messages first became a thing on March 31st, 1993. A Usenet user named Richard Depew accidentally posted 200 of the same message to a newsgroup. These messages were then called spam by another user, and Depew used the term in his apology, cementing its terminology.

Another theory regarding the name spam comes from multi-user dungeons, or MUDs, which were a type of chat room named after the role-playing game Dungeons and Dragons. These users would fill these chat rooms with a large quantity of unwanted content. Even the MUDers, as they were called, coined these junk messages spam.

There are two other theories related to spam involving Bitnet Relay, a 1980s chat system, and TRS-80, another use of the aforementioned Monty Python song to annoy users.

Types of Spam
Below, you’ll find the various types of spam that you could potentially encounter:

  • Email spam: Email spam messages are likely the most recognizable form of spam. Spam emails contain all sorts of junk that can make navigating your inbox a complete nightmare. Thankfully, there are regulations put into place that keep spam out of inboxes to an extent, but you can always integrate better solutions and software to augment the sorting of spam emails.
  • Texting spam: In much the same way, texting spam is a way to get unwanted messages through to people. It’s interesting to note that emergency texts don’t constitute spam. Similar to how email spam works, the CAN-SPAM Act also applies to text spam.
  • Comment spam: Comment spam is a bit different in nature from the previous two types. You may have noticed some comments that seem unwanted or “spammy” in nature, such as those advertising the selling of products or simply off-topic.

As always, you don’t want to be dealing with spam carelessly. If your business could use assistance preparing for spam, contact Network Synergy for 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Computer Care Presentation Windows 8 Upgrade IBM Technology Drones Best Available Management Antivirus Business Computing User Error Licensing Managing Stress Technology Tips Mobile Office Twitter Specifications Troubleshooting Google Maps Google Wallet Social Engineering Business Public Cloud Refrigeration Dark Web Webinar Alt Codes Remote Support User Word Google Calendar Undo Password Nanotechnology Heating/Cooling Document Management Applications Work/Life Balance Public Speaking IP Address LiFi Holiday Mobile Security PDF Saving Time Help Desk Analyitcs Consumers Computer Cost Management The Internet of Things Staff Hiring/Firing YouTube How To Lenovo IT Support Disaster Recovery Servers Microsoft Excel Techology Food Superfish Entrepreneur Botnet Recovery Hardware Cryptocurrency Private Cloud Chromebook Cortana Secruity IT Management Tech Term Buisness Bring Your Own Device Tip of the Week Save Time Legal Development Politics Flexibility Electronic Medical Records Recycling Managed IT Services Hard Drive Google Analytics Modem Printer Computer Accessories Uninterrupted Power Supply Hosted Solutions Office 365 Cleaning IT Consultant Mobile Device Data Backup Mobile Computing iPhone Network Management Law Firm IT Wearable Technology Cyber Monday Automation Intranet Managed IT Service Security Personal Information Print Server BDR Documents Quick Tips Technology Laws Websites Retail Computing Deep Learning Efficiency Hard Drives Windows 8.1 Update VoIP Mobile Bandwidth Halloween IT service Access Control Time Management Best Practices Redundancy Server Management Business Management Sports Processors Humor Employer-Employee Relationship Work Station Compliance Staffing Education Tip of the Work Environment Smart Technology Computing Infrastructure IT Support Bitcoin Big Data Computer Repair Cybersecurity Managed Service Provider Innovation Tech Support Firefox Running Cable Company Culture Content Filtering Downloads Notifications Marketing Internet Co-managed IT Piracy Data Management Sync Windows 10 Data Warehousing Hotspot Business Owner Online Currency Web Server Cloud 3D Printing Network Screen Reader Healthcare Mouse Google Docs Travel Business Technology Social Networking History IT Solutions Digital Payment Tablet Data Recovery Writing Shortcut Android Taxes Software Gmail CCTV Star Wars Collaboration Risk Management Identities Operations Congratulations Law Enforcement Samsung Consultation Fraud Apps Wires Passwords Remote Monitoring Regulations Vendor Management CIO Network Congestion Leadership Hacking Connectivity Touchscreen Workplace Tips Internet Exlporer Motion sickness Business Growth Office Tips Server Black Market Digital Signature Apple Office Software Tips Crowdfunding Start Menu Upgrades eBay Memory communications Current Events Virtualization Windows 10 Virus Macro People Health Cookies Save Money Mail Merge Text Messaging Unsupported Software CrashOverride Laptop Facebook Two-factor Authentication Meetings Privacy End of Support Virtual Reality Managed IT Assessment Files Data storage Customer Relationship Management Small Business Software as a Service App Data Telephone Systems Users Backups Google Spyware IT budget Email Productivity Proactive IT SaaS Settings Statistics Streaming Media Value Augmented Reality Data Breach Spam Telephony Machine Learning Scam PowerPoint Automobile Emoji Mobile Technology Identity Theft Migration Debate Domains Budget LinkedIn Cameras Chatbots Artificial Intelligence Wireless Microsoft Virtual Private Network Vulnerability Hacker Information Technology Bluetooth Wireless Technology Router Social Media Virtual Desktop Mobile Data Unified Threat Management eWaste Cybercrime Saving Money Disaster Resistance Digital Smartphone BYOD Browser Excel Mirgation Gadget Legislation 5G Battery Data Loss Unified Communications VPN Training PC Care Language Robot Monitors WiFi IT Consulting Mobility Inbound Marketing Cables Remote Computing IT Services IT Technicians Fun Display IoT Skype Supercomputer Google Drive Patch Management Thank You User Tips Administration Enterprise Content Management Multi-Factor Security Productivity Business Continuity Solid State Drive Corporate Profile Fax Server Networking Crowdsourcing Best Practice GPS G Suite Microsoft Office Blockchain Social Service-based Business HIPAA Hacks Chrome Paperless Office Business Intelligence Gaming Console Windows Backup Unified Threat Management Phishing Competition Maintenance Outlook Outsourced IT Logs Permissions File Sharing Smartphones Data Security Cache Encryption Hosted Solution Tip of the week Infrastructure Mobile Device Management Printing Address Safety Alert Money Managed IT services Operating System Computers Wi-Fi Ransomware Video Surveillance 3D Break Fix Point of Sale Error Typing Conferencing Internet of Things Project Management Knowledge Trainging Downtime Disaster Charger Cloud Computing Identity Scheduling Trending Smart Tech Lithium-ion Battery Net Neutrality USB Experience Tutorials Geography Relocation Cooperation Network Security High-Speed Internet Motherboard Phone System Communication Black Friday Scary Stories Gadgets Enterprise Resource Planning Search Alerts Firewall Hackers Going Green Miscellaneous Avoiding Downtime Customer Service Malware Administrator Website Programming Comparison Government Physical Security Hard Disk Drive Webcam Tracking Utility Computing Cabling Vulnerabilities Mobile Devices Storage Distributed Denial of Service SharePoint Application

      Latest Blogs

      The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube