wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

virtual machines and virtualization

Blog banner

Oracle Corporation

Blog banner

The launch of UniMap by HERE

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Social Media Sentiment Analysis

Blog banner

Bulk E-mail software

Blog banner

What are Virtual Machines

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Hacking Mobile Platforms

Blog banner

File management -disha parekh

Blog banner

How to manage in BEST bus in mumbai specially PEAK Time!

Blog banner

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

Data is an asset and it is your responsibility!

Blog banner

What is semaphore in operating system?

Blog banner

5 People who claimed to have Time Traveled

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

RAID - LEVELS OF RAID

Blog banner

Virtual Memory

Blog banner

Deadlock

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Security and E-mail

Blog banner

Emerging threats in cyber Forensics

Blog banner

Question

Blog banner

Having passion in life

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

MUTUAL EXCLUSION

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

PERSONAL STORIES

Blog banner

Old age lifestyle

Blog banner

Bit Coins

Blog banner

Processing Crime and Incident Scenes

Blog banner

Memory Management

Blog banner

INTRODUCTION

Blog banner

Deadlock and Starvation

Blog banner

Threads

Blog banner

IT RISK

Blog banner