wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Race Condition in Operating Theatre

Blog banner

Principal of concurrency

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Operation system

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Paginng In OS

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

The Laws of Karma

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

File management

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Mumbai famous street food

Blog banner

Importance of education

Blog banner

Vikrant’s first blog

Blog banner

MACHINE LEARNING

Blog banner

Evolution of Operating System

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Memory Management

Blog banner

Modern operating system

Blog banner

Metasploit

Blog banner

Measuring IT Risk

Blog banner

GIS

Blog banner

Life

Blog banner

To travel is to live

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

On-Page SEO

Blog banner

10 Types of Friends in every friend group

Blog banner

PROCESS STATE:

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

File Systems in OS.

Blog banner

Smartsheet

Blog banner

Types of Threads

Blog banner

Starvation

Blog banner

Memory heirachy (Operating system)

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

10 Interesting facts you should know!!!

Blog banner

Evolution of Operating System

Blog banner

Why am I never satisfied with my Life?

Blog banner

TAILS OS

Blog banner