wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Yoga in INDIA and ABROAD

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Bulk E-mail software

Blog banner

Clustering Techniques

Blog banner

What is thread and alse multithreading

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Social Engineering

Blog banner

Travel: Everything Everywhere!

Blog banner

Rapido

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Memory Management

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Ethical Hacking

Blog banner

Measuring IT Risk

Blog banner

Operating system evolution

Blog banner

File Management system

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Oracle Corporation

Blog banner

IOT- Internet Of Things

Blog banner

Virtual Machine

Blog banner

LINUX

Blog banner

10 Types of Friends in every friend group

Blog banner

Fault tolerance

Blog banner

Traditional Unix System

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

File Organization and Access

Blog banner

Security Issues and Countermeasures

Blog banner

An Overview of Virtual Machines

Blog banner

Deadlock

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

From Model Mistakes to Metrics

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Buffering

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

BITCOIN WALLET

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Culture Of Ladakh

Blog banner

GraphX:- A graph processing tool

Blog banner

URL vs Domain

Blog banner