wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

I/O Management and Disk Scheduling

Blog banner

Threats To Computer System

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Why is online marketing is important in current scenario

Blog banner

Education?

Blog banner

Online Education

Blog banner

DATA VAULT

Blog banner

"Games and the future"

Blog banner

A book review

Blog banner

IT Service Continuity Management

Blog banner

How to lose belly fat

Blog banner

Virtual memory

Blog banner

Virus

Blog banner

Threads and concurrency

Blog banner

Answer

Blog banner

CyberSecurity Color Wheel

Blog banner

Decoding Confusion Matrix

Blog banner

Direct Memory Access

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Memory Management

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

What is a Malware ?

Blog banner

Fitness regime by Deepesh

Blog banner

Firewall in Computer Network

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Platonic Solids

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Operating Systems

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Os Virtual Memory

Blog banner

Modern operating systems (OS)

Blog banner

LINUX

Blog banner

M commerce

Blog banner

Concurrency and Deadlocks

Blog banner

Importance Of Yoga.

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Virtual Machine

Blog banner

What is Segmentation?

Blog banner

Introduction to GIS

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner