SlideShare a Scribd company logo
1 of 2
What is spam?

If you use email, you’ll have encountered spam. But do you know where the term
comes from, and why it’s used to refer to unwanted email?

 ‘Spam’ is an acronym derived from the words ‘spiced’ and ‘ham’.
In 1937, the Hormel Foods Corporation (USA) started selling minced sausage made
from out-of-date meat. The Americans refused to buy this unappetizing product. To
avoid financial losses the owner of the company, Mr. Hormel, launched a massive
advertizing campaign which resulted in a contract to provide tinned meat products to the
Army and Navy.

In 1937, Hormel Foods began to supply its products to American and allied troops.
After World War 2, with Britain in the grips of an economic crisis, spam was one of the
few meat products that wasn’t rationed and hence was widely available. George Orwell,
in his book ‘1984’, described spam as ‘pink meat pieces’, which gave a new meaning to
the word ‘spam’ - something disgusting but inevitable.

In December 1970 the BBC television comedy series Monty Python’s Flying Circus
showed a sketch set in a cafe where nearly every item on the menu included spam - the
tinned meat product. As the waiter recited the SPAM-filled menu, a chorus of Viking
patrons drowned out all other conversation with a song repeating "SPAM, SPAM,
SPAM, SPAM... lovely SPAM, wonderful SPAM", hence "Spamming" the dialogue.
Since then spam has been associated with unwanted, obtrusive, excessive information
which suppresses required messages.




In 1993 the term ‘spam’ was first introduced with reference to unsolicited or undesired
bulk electronic messages. Richard Dephew, administrator of the world-wide distributed
Internet discussion system Usenet, wrote a program which mistakenly caused the
release of dozens of recursive messages onto the news.admin.policy newsgroup. The
recipients immediately found an appropriate name for these obtrusive messages – spam.

On April 12 1994, a husband-and-wife firm of lawyers, Canter & Siegel, posted the first
massive spam mailing. The company’s programmer employed Usenet to advertise the
services offered by Canter & Siegel, thus giving a start to commercial spam.
Today the word ‘spam’ is widely used in email terminology, though Hormel tinned
meat products are still on sale in the USA.


Types of spam

Spam comes in many different varieties, ranging from advertizing of legitimate goods
and services to political propaganda to Internet scams. Spam worldwide tends to
advertise a certain range of goods and services irrespective of language and geography.

Spammers constantly extend the range of their offers and are always searching for new
ways of attracting unwary users. The list of spam categories is growing. However, when
averaged out over the course of the year, 50% of spam falls into the following
categories:


   1. Adult content                                4. Personal finance
   2. Health                                       5. Education and training
   3. IT

How to reduce spam

Spam isn’t only a nuisance, but can pose a threat to your computer or your data. For
simple, practical guidelines on how you can reduce the amount of spam you receive,
read here. http://www.securelist.com/en/threats/spam?chapter=98

More Related Content

Viewers also liked

Politica 2.0
Politica 2.0Politica 2.0
Politica 2.0b_alberi
 
QUALITY ASSURANCE AND STANDARDS OF RESEARCH
QUALITY ASSURANCE AND STANDARDS OF RESEARCHQUALITY ASSURANCE AND STANDARDS OF RESEARCH
QUALITY ASSURANCE AND STANDARDS OF RESEARCHThiyagu K
 
Great Richmond Chamber of Conference
Great Richmond Chamber of ConferenceGreat Richmond Chamber of Conference
Great Richmond Chamber of ConferenceInfoTrends
 
Making Sense of Social Media Measurement
Making Sense of Social Media MeasurementMaking Sense of Social Media Measurement
Making Sense of Social Media MeasurementCandace McCaffery
 
Tsring-hua University Workshop File 2 of 2 12/07/12
 Tsring-hua University Workshop File 2 of 2 12/07/12 Tsring-hua University Workshop File 2 of 2 12/07/12
Tsring-hua University Workshop File 2 of 2 12/07/12Stephen Kwan
 
Evan Ratliff - Atavist. Where Stories Beging...
Evan Ratliff - Atavist. Where Stories Beging...Evan Ratliff - Atavist. Where Stories Beging...
Evan Ratliff - Atavist. Where Stories Beging...IfBookThen
 
Ukrainian top-websites-august-2013
Ukrainian top-websites-august-2013Ukrainian top-websites-august-2013
Ukrainian top-websites-august-2013Watcher
 
DH POV Facebook FMC Updates 3.2.12
DH POV Facebook FMC Updates 3.2.12DH POV Facebook FMC Updates 3.2.12
DH POV Facebook FMC Updates 3.2.12Sarah Larcker
 
Rui lança dia 13 de julho blog1
Rui lança  dia 13 de julho blog1Rui lança  dia 13 de julho blog1
Rui lança dia 13 de julho blog1rlanca
 
Cover Letters & Resumes
Cover Letters & ResumesCover Letters & Resumes
Cover Letters & Resumesabsupinski
 
GTANSW Country Conferences 2007
GTANSW Country Conferences 2007GTANSW Country Conferences 2007
GTANSW Country Conferences 2007Martin Pluss
 
O PPT- ju (malo drugače ...)
O PPT- ju (malo drugače ...)O PPT- ju (malo drugače ...)
O PPT- ju (malo drugače ...)lmihel1
 

Viewers also liked (14)

Politica 2.0
Politica 2.0Politica 2.0
Politica 2.0
 
QUALITY ASSURANCE AND STANDARDS OF RESEARCH
QUALITY ASSURANCE AND STANDARDS OF RESEARCHQUALITY ASSURANCE AND STANDARDS OF RESEARCH
QUALITY ASSURANCE AND STANDARDS OF RESEARCH
 
Great Richmond Chamber of Conference
Great Richmond Chamber of ConferenceGreat Richmond Chamber of Conference
Great Richmond Chamber of Conference
 
Making Sense of Social Media Measurement
Making Sense of Social Media MeasurementMaking Sense of Social Media Measurement
Making Sense of Social Media Measurement
 
Tsring-hua University Workshop File 2 of 2 12/07/12
 Tsring-hua University Workshop File 2 of 2 12/07/12 Tsring-hua University Workshop File 2 of 2 12/07/12
Tsring-hua University Workshop File 2 of 2 12/07/12
 
Evan Ratliff - Atavist. Where Stories Beging...
Evan Ratliff - Atavist. Where Stories Beging...Evan Ratliff - Atavist. Where Stories Beging...
Evan Ratliff - Atavist. Where Stories Beging...
 
Ukrainian top-websites-august-2013
Ukrainian top-websites-august-2013Ukrainian top-websites-august-2013
Ukrainian top-websites-august-2013
 
Quad 10
Quad 10Quad 10
Quad 10
 
Host8e
Host8eHost8e
Host8e
 
DH POV Facebook FMC Updates 3.2.12
DH POV Facebook FMC Updates 3.2.12DH POV Facebook FMC Updates 3.2.12
DH POV Facebook FMC Updates 3.2.12
 
Rui lança dia 13 de julho blog1
Rui lança  dia 13 de julho blog1Rui lança  dia 13 de julho blog1
Rui lança dia 13 de julho blog1
 
Cover Letters & Resumes
Cover Letters & ResumesCover Letters & Resumes
Cover Letters & Resumes
 
GTANSW Country Conferences 2007
GTANSW Country Conferences 2007GTANSW Country Conferences 2007
GTANSW Country Conferences 2007
 
O PPT- ju (malo drugače ...)
O PPT- ju (malo drugače ...)O PPT- ju (malo drugače ...)
O PPT- ju (malo drugače ...)
 

More from MaSolP

Validity.pdf
Validity.pdfValidity.pdf
Validity.pdfMaSolP
 
Validity of a site
Validity of a siteValidity of a site
Validity of a siteMaSolP
 
M marinucci story_intern_chapt04b
M marinucci story_intern_chapt04bM marinucci story_intern_chapt04b
M marinucci story_intern_chapt04bMaSolP
 
Power Point
Power PointPower Point
Power PointMaSolP
 
Luján and Sol ICT
Luján and Sol ICTLuján and Sol ICT
Luján and Sol ICTMaSolP
 
Presentación
PresentaciónPresentación
PresentaciónMaSolP
 

More from MaSolP (6)

Validity.pdf
Validity.pdfValidity.pdf
Validity.pdf
 
Validity of a site
Validity of a siteValidity of a site
Validity of a site
 
M marinucci story_intern_chapt04b
M marinucci story_intern_chapt04bM marinucci story_intern_chapt04b
M marinucci story_intern_chapt04b
 
Power Point
Power PointPower Point
Power Point
 
Luján and Sol ICT
Luján and Sol ICTLuján and Sol ICT
Luján and Sol ICT
 
Presentación
PresentaciónPresentación
Presentación
 

Recently uploaded

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 

Recently uploaded (20)

Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 

What is spam?

  • 1. What is spam? If you use email, you’ll have encountered spam. But do you know where the term comes from, and why it’s used to refer to unwanted email? ‘Spam’ is an acronym derived from the words ‘spiced’ and ‘ham’. In 1937, the Hormel Foods Corporation (USA) started selling minced sausage made from out-of-date meat. The Americans refused to buy this unappetizing product. To avoid financial losses the owner of the company, Mr. Hormel, launched a massive advertizing campaign which resulted in a contract to provide tinned meat products to the Army and Navy. In 1937, Hormel Foods began to supply its products to American and allied troops. After World War 2, with Britain in the grips of an economic crisis, spam was one of the few meat products that wasn’t rationed and hence was widely available. George Orwell, in his book ‘1984’, described spam as ‘pink meat pieces’, which gave a new meaning to the word ‘spam’ - something disgusting but inevitable. In December 1970 the BBC television comedy series Monty Python’s Flying Circus showed a sketch set in a cafe where nearly every item on the menu included spam - the tinned meat product. As the waiter recited the SPAM-filled menu, a chorus of Viking patrons drowned out all other conversation with a song repeating "SPAM, SPAM, SPAM, SPAM... lovely SPAM, wonderful SPAM", hence "Spamming" the dialogue. Since then spam has been associated with unwanted, obtrusive, excessive information which suppresses required messages. In 1993 the term ‘spam’ was first introduced with reference to unsolicited or undesired bulk electronic messages. Richard Dephew, administrator of the world-wide distributed Internet discussion system Usenet, wrote a program which mistakenly caused the release of dozens of recursive messages onto the news.admin.policy newsgroup. The recipients immediately found an appropriate name for these obtrusive messages – spam. On April 12 1994, a husband-and-wife firm of lawyers, Canter & Siegel, posted the first massive spam mailing. The company’s programmer employed Usenet to advertise the services offered by Canter & Siegel, thus giving a start to commercial spam.
  • 2. Today the word ‘spam’ is widely used in email terminology, though Hormel tinned meat products are still on sale in the USA. Types of spam Spam comes in many different varieties, ranging from advertizing of legitimate goods and services to political propaganda to Internet scams. Spam worldwide tends to advertise a certain range of goods and services irrespective of language and geography. Spammers constantly extend the range of their offers and are always searching for new ways of attracting unwary users. The list of spam categories is growing. However, when averaged out over the course of the year, 50% of spam falls into the following categories: 1. Adult content 4. Personal finance 2. Health 5. Education and training 3. IT How to reduce spam Spam isn’t only a nuisance, but can pose a threat to your computer or your data. For simple, practical guidelines on how you can reduce the amount of spam you receive, read here. http://www.securelist.com/en/threats/spam?chapter=98