Network Synergy Blog

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Why Spam?
Spam can lead to a considerable amount of wasted time and assets, as well as provide a convenient medium of transportation for threats like malware and viruses. So why is it named after spam, everyone’s favorite canned lunch meat? One theory claims that the folks over at the University of Southern California’s computer lab named it after spam for some unknown reason--perhaps they simply thought it was a funny analogy to make.

The more accepted theory is that spam comes from the Monty Python song. Both the song and spam messages have a lot in common, being both highly repetitive and offering no real substance.

Where Spam Came From
It’s not clear where spam messages first came from. Some believe that spam messages first became a thing on March 31st, 1993. A Usenet user named Richard Depew accidentally posted 200 of the same message to a newsgroup. These messages were then called spam by another user, and Depew used the term in his apology, cementing its terminology.

Another theory regarding the name spam comes from multi-user dungeons, or MUDs, which were a type of chat room named after the role-playing game Dungeons and Dragons. These users would fill these chat rooms with a large quantity of unwanted content. Even the MUDers, as they were called, coined these junk messages spam.

There are two other theories related to spam involving Bitnet Relay, a 1980s chat system, and TRS-80, another use of the aforementioned Monty Python song to annoy users.

Types of Spam
Below, you’ll find the various types of spam that you could potentially encounter:

  • Email spam: Email spam messages are likely the most recognizable form of spam. Spam emails contain all sorts of junk that can make navigating your inbox a complete nightmare. Thankfully, there are regulations put into place that keep spam out of inboxes to an extent, but you can always integrate better solutions and software to augment the sorting of spam emails.
  • Texting spam: In much the same way, texting spam is a way to get unwanted messages through to people. It’s interesting to note that emergency texts don’t constitute spam. Similar to how email spam works, the CAN-SPAM Act also applies to text spam.
  • Comment spam: Comment spam is a bit different in nature from the previous two types. You may have noticed some comments that seem unwanted or “spammy” in nature, such as those advertising the selling of products or simply off-topic.

As always, you don’t want to be dealing with spam carelessly. If your business could use assistance preparing for spam, contact Network Synergy for 203.261.2201.

Managed IT Services Provide Good Value for SMBs
A “Disaster” Covers More Than You’d Think


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, September 24, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Excel Crowdsourcing Best Practices Mobile Devices Debate Wearable Technology Tutorials Software Unified Threat Management Small Business Tech Support Privacy Troubleshooting Nanotechnology User Error Internet Exlporer Hard Drive How To Humor Corporate Profile MSP File Sharing Utility Computing Network Congestion Network Security Modem Inbound Marketing Cloud Mirgation User Big Data Electronic Health Records Automation Typing Wires Charger Marketing Managed IT Service Windows 8.1 Update Efficiency Current Events Managed IT G Suite Miscellaneous Error Cleaning Google Drive User Tips Secruity Cloud Computing Social Engineering Tip of the Work Electronic Medical Records Chrome Proactive Consultation Experience Read Only Business Technology Regulation Telephone Systems Print Server VoIP Employer-Employee Relationship Spyware Data Breach IT budget Business Growth Paperless Office Net Neutrality Staffing Legislation Halloween Regulations 3D Knowledge Telephony Apple Business Computing Computer Heating/Cooling Business Intelligence Computing Infrastructure Politics Computer Care Smart Tech Digital Payment Computer Repair Customer Service Vulnerability Intranet Presentation Mobile Security Motion sickness Antivirus Touchscreen Employee-Employer Relationship Trending Automobile Microsoft Office Crowdfunding IT Consultant Windows 8 Users CIO Processors iPhone Best Available Mobile Data Enterprise Resource Planning Files Chatbots Development Virtual Private Network Windows Hosted Solutions Tech Term Public Speaking Business Remote Monitoring and Management Browser Unsupported Software Remote Support Budget Specifications Flexibility IT Management Alt Codes Entrepreneur Computers Black Friday Unified Communications Scheduling Ransomware Wireless Technology Environment Scam Connectivity Tracking Upgrades Remote Monitoring Shortcut Emoji Customer Relationship Management Alerts Twitter Machine Learning People Food Identities Webinar Congratulations Storage Data storage Smartphones Business Continuity Hotspot Web Server Personal Information Hiring/Firing LiFi Virtual Desktop Service-based Business Mobile Computing Help Desk Proactive IT Router Break Fix Language Website Macro Domains Applications Upgrade Deep Learning BDR communications Comparison Vulnerabilities Consumers Websites App Going Green Downtime Battery Saving Time Monitors Memory Scary Stories Supercomputer Computer Accessories Work/Life Balance Technology Tips Redundancy Money Managed Service Provider Government Dark Web Google Analytics Apps Malware Hard Disk Drive Printers Wi-Fi Encryption Internet of Things BYOD Fax Server Undo Downloads Google Docs Information IP Address Application Outsourced IT Management CCTV Disaster Business Owner Recovery Mobile Device Management Printing Workplace Tips Maintenance Cables Mouse Health Smartphone Samsung Point of Sale Cookies Logs Document Management Robot Operations OneNote Save Time Mobile Technology PC Care Remote Workers Relocation Cyber Monday Cryptocurrency Managed IT Services Bring Your Own Device IT service Cybercrime Analyitcs Artificial Intelligence Identity Streaming Media Settings How To Passwords Patch Management Assessment Sync Cortana Multi-Factor Security Phishing Text Messaging PowerPoint Writing Microsoft Buisness eBay Network Management Backup Alert YouTube Retail Technology Google Wallet Administration Bluetooth Virus Fraud Network History Training Social Media Data Management eWaste Collaboration Remote Computing Quick Tips Office 365 Search IBM Mobility Best Practice Gadgets IT Services Sports Staff Black Market Law Firm IT Thank You Digital Firewall Licensing Star Wars Disaster Resistance Mail Merge Facebook Meetings Managed IT services Blockchain WPA3 Enterprise Content Management Refrigeration Administrator GPS Social Networking Business Management Lenovo Hard Drives Hacking Avoiding Downtime Tablet Bitcoin HIPAA Superfish Cybersecurity Running Cable Trainging The Internet of Things Managed Services Provider Android Cooperation Mobile Office Unified Threat Management Address Gmail Cost Management Infrastructure USB Internet E-Commerce Content Filtering Backups Data Backup Solid State Drive Notifications Spam Project Management Information Technology Uninterrupted Power Supply Cabling Video Surveillance Programming Managed Service Data Cyberattacks Vendor Management Botnet CrashOverride Competition Chromebook Productivity Piracy Gaming Console IT Support Operating System Hacks Physical Security Statistics Monitoring Value SharePoint Recycling Conferencing Leadership Server Saving Money Google Maps High-Speed Internet Laptop Disaster Recovery Hackers Webcam Managing Stress VPN Mobile Virtual Reality Work Station Cache Geography 3D Printing Cameras IT Technicians Permissions IT Solutions Server Management Firefox Online Currency Time Management LinkedIn Law Enforcement Hardware Documents Co-managed IT IT Consulting Tip of the week IT Support Augmented Reality Consulting Security Public Cloud Tip of the Week Company Culture Lithium-ion Battery Taxes Techology Data Security Travel Word Communication Screen Reader IoT Data Loss Bandwidth Digital Signature Start Menu PDF Technology Laws Productivity Migration Asset Tracking Software Tips Printer Hacker Wireless Mobile Device Holiday Google Display Outlook Phone System Safety Data Warehousing Software as a Service Features Email Access Control Education Smart Technology Google Calendar Windows 10 Healthcare Microsoft Excel Hosted Solution Computing Distributed Denial of Service Password Office Virtualization Identity Theft Compliance Legal Innovation Fun Two-factor Authentication SaaS Networking Servers Fleet Tracking Motherboard Skype End of Support 5G Office Tips Data Recovery Private Cloud Social Drones Gadget WiFi Save Money Risk Management Windows 10

      Latest Blogs

      Technology support can be one of the major pain points for businesses, and it’s not something that your organization wants to invest in without thinking about the details. Technolo...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube