ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Spamming

Essay by   •  June 4, 2011  •  Essay  •  1,361 Words (6 Pages)  •  1,161 Views

Essay Preview: Spamming

Report this essay
Page 1 of 6

thi sis file for the resserch for the my class

Spam can be defined by various type :- Unsolicited mass e-mail that is deceptive in its subject line and hides the sender or seeks to commit fraud

- Unsolicited mass e-mail even if it comes from legitimate or well-branded businesses

- Unsolicited mass e-mail on subjects or offers that interest them

In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

Spamming is economically having normal growth and development because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

How spammers operate :

For that purpose different techniques are there to operate spam ;

1)Gathering of addresses

2)Delivering spam messages

3)Using Webmail services

4)Using other people's computers

5)Open relays

6)Open proxies

7)Spammer viruses

8 )Obfuscating message content

Spam can be defined by various type :- Unsolicited mass e-mail that is deceptive in its subject line and hides the sender or seeks to commit fraud

- Unsolicited mass e-mail even if it comes from legitimate or well-branded businesses

- Unsolicited mass e-mail on subjects or offers that interest them

In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

Spamming is economically having normal growth and development because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

How spammers operate :

For that purpose different techniques are there to operate spam ;

1)Gathering of addresses

2)Delivering spam messages

3)Using Webmail services

4)Using other people's computers

5)Open relays

6)Open proxies

7)Spammer viruses

8 )Obfuscating message content

Spam can be defined by various type :- Unsolicited mass e-mail that is deceptive in its subject line and hides the sender or seeks to commit fraud

- Unsolicited mass e-mail even if it comes from legitimate or well-branded businesses

- Unsolicited mass e-mail on subjects or offers that interest them

In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques. But because the Internet is public, there is really little that can be done to prevent spam, just as it is impossible to prevent junk mail. However, some online services have instituted policies to prevent spammers from spamming their subscribers.

Real spam is generally e-mail advertising for some product sent to a mailing list or newsgroup.

Spamming is economically having normal growth and development because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

How spammers operate :

For

...

...

Download as:   txt (9 Kb)   pdf (122.4 Kb)   docx (10.4 Kb)  
Continue for 5 more pages »
Only available on ReviewEssays.com
Citation Generator

(2011, 06). Spamming. ReviewEssays.com. Retrieved 06, 2011, from https://www.reviewessays.com/essay/Spamming/53684.html

"Spamming" ReviewEssays.com. 06 2011. 2011. 06 2011 <https://www.reviewessays.com/essay/Spamming/53684.html>.

"Spamming." ReviewEssays.com. ReviewEssays.com, 06 2011. Web. 06 2011. <https://www.reviewessays.com/essay/Spamming/53684.html>.

"Spamming." ReviewEssays.com. 06, 2011. Accessed 06, 2011. https://www.reviewessays.com/essay/Spamming/53684.html.