Spam | Part 1

Spam | Part 1

What Is Spam

Spam or junk (or “waste”): It is always unsolicited. Spam is usually referred to electronically transmitted and online email messages that are delivered to the email recipient and often contains unsolicited advertising content. This process is called spamming or spamming, and also spammer polluters.

Origin of word Spam

SPAM is originally a brand name for canned meat, and in 1936, it originated from spiced ham, erroneously Spiced Pork and Meat / Ham or Specially Prepared Assorted Meat.

The term spam – as a synonym for an unnecessarily frequent use and repetition comes from – the spam sketch of the British comedy series Monty Python’s Flying Circus: In a cafe, the menu consists entirely of dishes made with spam that “spam” partially several times in the name. In the sketch, the word “spam” is mentioned 132 times in total.

During the war-rationing in America, spam one of the few foods that were virtually available anywhere, with unlimited quantity. The ubiquity of the meat, much like the unwanted messages (such as e-mails), promoted the development of the concept, which was characterized by Monty Python’s Flying Circus.

The use of the term spam for communications has its origin probably in the Multi-User Dungeons. Initially, it was not known spam advertising, but after some users practiced mass flooding of the text interface with messages, the word Spam came in to being.

In connection with advertising of spam, it was first marketed in the Usenet. There are frequently repeated articles in the newsgroups that are substantially equal to or advertise for the same service.

The first spam email was probably sent on May 3, 1978, but only in 1993 it was referred to as such.

Impact of Spam

Spam causes major damage in the system of global communications. This is mainly due to the additional data (usually worthless) and the burden of the associated processing.

* Sorting and read spam costs worked.
* Spam filters need to be procured and maintained.
* As companies and Internet service providers typically do not settle their lines on time, but according to data transmitted incur costs for each byte of spam that is transferred.
* The processing of mail can cause a loss or a slowing of the desired e-mail traffic. The compensation of the load in turn, generates costs for new, more powerful hardware.
* With fax spam may incur expenditure through the consumption of paper and ink or toner.

By itself generate spam in the United States annually consumes a loss of 22 billion U.S. dollars. According to recent studies, 62 trillion spam messages a year about 33 billion kilowatt hours of energy, as well as 100 billion hours working to view and delete the spam e-mails. Accordingly, spam now makes 97% of all e-mail in volume.

Types of Spam:

E-mail Spam: Unsolicited Bulk E-Mail

The unsolicited bulk e-mails are usually sent to very large number of recipients. Often, this is to send e-mail marketing campaigns, missionary or inciting e-mail, and the notorious chain letters also belong to this category. These e-mails are most frequent known as scam, phishing, Joe job, hoax, and stock spam.

Unsolicited Commercial E-Mail

The unsolicited commercial email (UCE short, from “Unsolicited Commercial E-Mail”) is an e-mail containing commercial content (which is also sent to a recipient individual or a few individuals). UCE is legal in some countries like Germany, but only under certain circumstances. Often e-mails are the hallmark of UBE and UCE, so these are sent in massive numbers as promotional e-mails.

Typical examples of UCE are dubious or seemingly very favorable deals for se*x, por*nography, pen*is enlargement, illegal online gambling casinos, fake watches, life extension, software, branded products, financial services or medicines, etc.

Collateral Spam, Backscatter

As collateral spam or e-mails are called backscatter, produced in response to an incoming e-mail and a disinterested third party be served. Causing collateral spam is particularly common malware or spam, as used here is usually spoofed sender.

Collateral Spam Arises In Two Main Forms:

1. If E-(emails with forged return address the address of a disinterested third party) will be sent, the receiving email system accepts this e-mail first and then send a bounce message, an away message or something similar.

2. Collateral spam is generated by recipients who obtain supplies in disregard of the situation the supposed sender of a spam or a virus with complaint e-mails or e-mail bombs.

Multi-User Dungeons Spam

The late 80s and early 90s created the early Internet, the so-called Multi-User Dungeons (MUD). This is a kind of text-based RPGs, but are also often used simply as a chat room. Users connect to the Telnet protocol with the MUD.

Usenet Spam

These were used during the mid-1990s, when very few people and companies used e-mail addresses. The word ‘spam’ originated with such e-mail on the Usenet. The very first spam, that extremely polluted many newsgroups in 1994, was probably a promotional campaign of the Law Office Can*ter & Sie*gel (USA), which campaigned for the participation in the lottery for green cards to be helpful. As a result, the situation escalated, were set up to a million spam items each day.



Leave your comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.