wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SPAM

profile
Taruna Yadav
Aug 24, 2022
0 Likes
0 Discussions
80 Reads

Spam is considered as electronic junk mail. Spam reaches computers by email. Inexpensive weight loss programs, online degrees, job opportunities and online gambling are spme spam sources.

Spam not only waste people's time with unwanted email but it also needs lot of network bandwidth.

Spammers hack personal accounts and send false links under the appearance of a user's trusted contacts such as friends and family.

 

DISADVANTAGES OF SPAM:-

1. Spam severely damages an internet company's reputation.

2.  Unwanted and annoying mails waste a lot of time.

3. Spam even wastes lots of bandwidth.

4. Spam also takes lots of memory.

 

Measures to be taken to avoid spam:-

1. We should avoid opening Spam emails and clicking on links in spam messages. 

2. Use a disposable email address.

3. Never disclose your email address on your website.


Comments ()


Sign in

Read Next

Buffering

Blog banner

Tracking Emails & Email Crimes

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Predicting Student Performance with Data Science

Blog banner

Understanding E-mail Servers

Blog banner

Importance of business process documentation

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Hash password! Is it really secured?

Blog banner

ADIDAS

Blog banner

How to grow followers on Instagram business account?

Blog banner

Types of Malware in Cyber Security

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Every body is beautiful

Blog banner

GOOGLE

Blog banner

Having passion in life

Blog banner

The evolution of OS

Blog banner

Odoo

Blog banner

Google App Engine

Blog banner

Veg Mix Pickle

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Cyber Security in Data Breaching

Blog banner

A Short History of GIS

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Water Resources are about to exhaust...

Blog banner

MYNTRA

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

computer security

Blog banner

Google classroom

Blog banner

RAID

Blog banner

Malware

Blog banner

Race Condition in Operating Theatre

Blog banner

Random Forests

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

NETWORK SECURITY RISKS

Blog banner

Visualization in Data Science

Blog banner

Risk factors in service transistion

Blog banner

Models of Information Security.

Blog banner

Scheduling

Blog banner

Introduction to GIS

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

OS Assignment 3

Blog banner