Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Why Spam?
Spam can lead to a considerable amount of wasted time and assets, as well as provide a convenient medium of transportation for threats like malware and viruses. So why is it named after spam, everyone’s favorite canned lunch meat? One theory claims that the folks over at the University of Southern California’s computer lab named it after spam for some unknown reason--perhaps they simply thought it was a funny analogy to make.

The more accepted theory is that spam comes from the Monty Python song. Both the song and spam messages have a lot in common, being both highly repetitive and offering no real substance.

Where Spam Came From
It’s not clear where spam messages first came from. Some believe that spam messages first became a thing on March 31st, 1993. A Usenet user named Richard Depew accidentally posted 200 of the same message to a newsgroup. These messages were then called spam by another user, and Depew used the term in his apology, cementing its terminology.

Another theory regarding the name spam comes from multi-user dungeons, or MUDs, which were a type of chat room named after the role-playing game Dungeons and Dragons. These users would fill these chat rooms with a large quantity of unwanted content. Even the MUDers, as they were called, coined these junk messages spam.

There are two other theories related to spam involving Bitnet Relay, a 1980s chat system, and TRS-80, another use of the aforementioned Monty Python song to annoy users.

Types of Spam
Below, you’ll find the various types of spam that you could potentially encounter:

  • Email spam: Email spam messages are likely the most recognizable form of spam. Spam emails contain all sorts of junk that can make navigating your inbox a complete nightmare. Thankfully, there are regulations put into place that keep spam out of inboxes to an extent, but you can always integrate better solutions and software to augment the sorting of spam emails.
  • Texting spam: In much the same way, texting spam is a way to get unwanted messages through to people. It’s interesting to note that emergency texts don’t constitute spam. Similar to how email spam works, the CAN-SPAM Act also applies to text spam.
  • Comment spam: Comment spam is a bit different in nature from the previous two types. You may have noticed some comments that seem unwanted or “spammy” in nature, such as those advertising the selling of products or simply off-topic.

As always, you don’t want to be dealing with spam carelessly. If your business could use assistance preparing for spam, contact Voyage Technology for 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 02 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Efficiency Hardware User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Productivity Managed Service Smartphone Android Upgrade Smartphones VoIP Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser AI Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Spam Employee/Employer Relationship IT Support Compliance Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Router Operating System Virtual Private Network Risk Management Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Solutions Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Monitoring Infrastructure Excel Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Microsoft 365 Social Going Green Patch Management Save Money Settings Wireless Printing Content Filtering Employees Integration IT Management Customer Relationship Management VPN YouTube Meetings Modem User Tip Processor Mobile Security Cryptocurrency Hacking Holidays Presentation Computer Repair Virtual Desktop Data Storage Data storage Smart Technology Supply Chain LiFi Wireless Technology Video Conferencing Managed Services Provider Virtual Machines Outlook Professional Services Saving Time Machine Learning Money Humor Managed IT Service Word Downloads iPhone Maintenance Sports Licensing Antivirus Mouse Entertainment Vulnerabilities Data Privacy Safety Administration Images 101 Multi-Factor Authentication Mobility Telephone System Cost Management Robot Directions Videos Assessment Electronic Health Records Permissions Workforce Alt Codes IBM Downtime Unified Threat Management Wasting Time Threats Trend Micro Unified Threat Management Specifications Security Cameras Workplace Strategies Hosted Solution Microchip Internet Exlporer Software as a Service Fraud Meta Typing Network Congestion Username Managing Costs Amazon eCommerce Google Drive User Error Black Friday SSID Competition Knowledge Database Surveillance Virtual Assistant Outsource IT Media Point of Sale 5G IT Technicians Virtual Machine Environment Cookies Google Docs Cyber Monday Medical IT Unified Communications Experience Proxy Server Reviews Running Cable Tech Support User Tactics Development Hotspot Transportation Small Businesses Bitcoin Network Management Google Wallet Monitors Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Shopping Laptop Websites Addiction Language Employer/Employee Relationships Outsourcing Windows 8 IP Address Drones Navigation Management PCI DSS Chatbots Screen Reader SharePoint Distributed Denial of Service Workplace Electronic Medical Records Gig Economy Halloween Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Lenovo Evernote Paperless Hard Drives Writing Regulations Compliance Identity Smart Tech Memes Co-managed IT Domains Virtual Reality Bookmark Scary Stories Private Cloud Download Net Neutrality Alerts SQL Server Technology Care Hacks Server Management Superfish Business Communications Identity Theft Refrigeration Fun Financial Data History Browsers Smartwatch Connectivity IT Break Fix Scams Deep Learning Public Speaking Twitter Error Upload Procurement Azure Hybrid Work Lithium-ion battery Cyber security Multi-Factor Security Tech Human Resources Education Social Engineering Entrepreneur Social Network Telework CES IoT Communitications Dark Web Cables Remote Computing Trends Supply Chain Management Mobile Computing Regulations Google Calendar Term Google Apps Tablet Undo Search Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Best Practice Alert Buisness File Sharing Dark Data Gamification Flexibility Staff Value Business Intelligence Managed IT Social Networking Legal Legislation Shortcuts IT solutions How To Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Business Growth Notifications Travel Application Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Techology Comparison Google Play Be Proactive Google Maps Cortana Health IT

Blog Archive