wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Article on team management software

Blog banner

Fault tolerance

Blog banner

What is metaverse?

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

What is M-commerce and how it's work

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

RAID and It's Levels

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Electronic Funds Transfer

Blog banner

Virtual machine.

Blog banner

Uniprocessor Scheduling

Blog banner

Cache memory

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Deadlock and starvation

Blog banner

Deadlocks

Blog banner

Electronic Funds Transfer

Blog banner

Tools to support CSI activities

Blog banner

Data Lake

Blog banner

VIRTUAL MACHINE

Blog banner

The Golden Temple , Amritsar

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Operating system

Blog banner

38_Exploring The Honeynet Project

Blog banner

Music

Blog banner

Direct Memory Access

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Process Creation

Blog banner

SPEM

Blog banner

Malware

Blog banner

Memory management

Blog banner

Rain bow

Blog banner

LinkedIn

Blog banner

Hash password! Is it really secured?

Blog banner

Footprinting

Blog banner

Short note on Microsoft office

Blog banner

Rain

Blog banner

Direct Memory Access

Blog banner

Evolution of Operating System

Blog banner

Importance Of Time

Blog banner