wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Introduction to GIS

Blog banner

GUIDE TO GIS

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

My Favorite Sportsperson

Blog banner

Types of Hackers.

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Ghee vs. Coconut Oil vs. Mustard Oil: Which Cooking Fat Wins for Indian Food?

Blog banner

Models of Information Security.

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Security Issues

Blog banner

SMARTSHEET

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

VIRTUAL MACHINE

Blog banner

Blockchain uses and use cases

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

The Peephole

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Music is life

Blog banner

Cache Memory

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Network Footprinting in Cybersecurity

Blog banner

objectives and functions of operating system

Blog banner

Google classroom

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Buffering

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Service Operations in ITSM

Blog banner

Components of GIS

Blog banner

OS Assignment 3

Blog banner

Race Conditions

Blog banner

Instagram

Blog banner

Cache memory

Blog banner

Deadlock and Starvation

Blog banner

Cloud Computing

Blog banner

GIS Topography

Blog banner

semaphores

Blog banner

Types of Hackers

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner