What is spaming?

spamming includes sending undesirable electronic communication and is often considered an unhealthy e-mail. Spammers attract individuals to read emails through tempting words in the line of the subject. Most spam is related to commercial advertising that supports dubious products or services. Sending spam is often an attempt to commit identity or other types of fraud over the Internet.

spamming has three common elements. With spam, the user's identity and the e-mail address are intentionally hidden. The e-mail is sent to a large number of e-mail addresses, often at the same time. SPAM is also unsolicited; The recipient did not intentionally disclose to be sent to his account.

One type of spaming is canceled SPAM USENET. USENET is an online discussion group. The spammers that perform this type of spam hope to focus on individuals who rarely publish and are more casual observers. SPAM is the only message delivered to 20 or more discussion groups. Tzda is a current of advertising or publishedIt has nothing to do with any topics discussed.

One of the most common types of spam is e -mail spam. This kind of spam is sent directly to the individual's e -mail account. SPAMMERS can obtain addresses by different methods, including using USENET posts, internet tracking for addresses, or obtaining e -mail lists. Sometimes it is easy to identify SPAM before opening, as the line of the object may contain apparent advertising or simply be subordinate.

Examples of junk e -mail are chain letters, pyramid schemes and get rich by quick schemes. Other types of spam are advertised by pornographic items, unknown societies and sketchy medical products and medicines. However, spam ads are not the only type of e -mail spam; Other types can be much more dangerous.

more sophisticated spaming, called phishing, involves junk -mails that seem to be from realCH and trustworthy companies such as banks, shopping sites and payment services. Spammers send e -mail that indicate that a kind of immediate measures need to take the user. These schemes rely on people who believe E -mail and answers with critical information such as credit card numbers and social security numbers, or click on the link to a fake site asking for information and password. Spammers can then use this information to steal a person's identity or shopping in the name of victims.

While spammers are undergoing a big problem, unsolicited e -maly is not very effective. It is estimated that 5% of e -mail users will respond to the phishing e -mail. Less than 15% of the actual reading of the spam and less than 5% buy the product from the sent spam. Phishing is often more successful; One study found that almost half of the people who visited the false phishing website presented a private information.

assumesThat the term "spam" comes from Mrs. Monty Python from the 1970s. In the sketch they contain all items in the preserved mass SPAM® menu. The deadline for excessive publication of more e -mails has become popular for the first time in the age of 90.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?