Preview

Email Spam

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Email Spam
I believe that spam emails come pretty close to those annoying telemarketing phone calls. It is absolutely no fun to have the phone ring at dinner time and to hear the voice on the other end telling you about a new credit card. This is the same thing with spam email. We do not want to have to go through our inbox deleting every other message just to get to the legitimate ones that are ones from our friends and family members. Email was supposed to be a much more easy and convienent way to keep in contact with friends and family. Unfortunately, spammers saw this as a perfect opportunity to keep our stress levels high.

Spam emails continue to flood our inboxes day after day to the point of having to sign up for 2 different email accounts just to keep the annoying spammers away from our personal and private life. It is such a shame that we are not safe from anyone anymore over the internet. Hackers and spammers find it entertaining to watch us rip our hair out over these junk emails.

Whether it be on the phone or through our email inboxes, telemarketers and spammers will continue to find a way to keep annoying us.Actions can be taken to help diminish the the effects of these junk emails, but unfortunately, as we know it today they will never completely be gone. I see two options. Create a second email address for friends and family members only. Or number two, get rid of email completely. It's unfortunate, but in this day and age these seem like the only things that can be done to take care of this cyber

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Educate facility not to open email from unknown users and not to click on links in emails from unknown users.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, we need to have training about email scams. Most users know not to access suspicious emails when on our system but a quick training course will help. Also, adding spam filters will help get rid of most of the junk email, so there is much less risk of employees opening emails containing malware.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Another SMTP Server security threat is malware. Malware is malicious software which can be in various forms such as trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bob Hicok’s poem “Spam leaves an aftertaste” focuses on a series of analitical thoughts and questions triggered in result to a received email spam. The narrator speaks against the digital age, feeling as though the Internet takes the personal aspect out of things. The email spam advertising “a larger penis” symbolizes the commercialization-based society we live in and the internet serves as a mass consumer-reaching tool. One can sense the narrator’s frustration with the strong emphasis companies put on the consumption of their products by promoting the person that one can become. The author’s word choice is very selective when referring to the internet as “digital ether.” Knowing that Ethers are common organic compounds and pervasive in biochemistry it can be understood the narrator perceives technology to be invasive and prevalent. The poem juxtaposes elements of primitive times with those of the modern age, begging a satirical question, have we really gotten better? Perhaps we knew ourselves better in the past. The serious theme is that spam emails are very annoying and most of the time useless. This complicates the poem's tone because it switches from annoyed to humorous by making fun of the random advertisements but also making it evident that no one likes to get them. The narrator presents a disconsolate closing to his poem using a hyperbolic statement “mouths making sounds once known as conversations,” creating a sense of desperation for a person who shares the same beliefs as him.…

    • 410 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Spam is expected to increase to 80 to 90 percent of total email. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. You can expect the occurrence of these spam-virus hybrids to increase and develop into even more dangerous and damaging threats…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I do not agree with that statement. There are many ways to make email secure – whether using an end to end encrypted email, a virtual private network (VPN), secure erasure programs, and many other counter measures. If all countermeasures are taken, you would be able to trust an email to an individual just about as much as you can trust that individual. If someone wants information badly enough they will get that information regardless of what form of communication is being used.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The texts, “Undaunted Courage” and “The Way To Rainy Mountain” depict the land as a spiritual entity that’s worth being worshipped and respected as shown by man’s praise of it. The way man, rather than exploit it for profit, respects the land through animism shows their gratitude for it. From the detailed descriptions that give the reader an illustration of what man has seen, it is clear to say that man had this religious relationship again, but was also in tune with the lay of the land.…

    • 316 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I101 Unit 1 Assignment

    • 1542 Words
    • 7 Pages

    As we learned in lecture, technology just means something that is scientifically used for personal betterment. Although we mostly dealt with Information Technology in this course, technology is everywhere. People have been using technology for centuries, even the basic wheel is an example of technology. As long as people have been using technology for the good of their peers, others have used it to benefit themselves at the cost of their peers. Paul Marks of New Scientist shines light on the first recorded hacking, in 1903 a magician and inventor interfered with Guglielmo Marconi’s early wireless telegraphy to display mean messages in Morse code. While in the Technoethics lecture, Logan opened my eyes to the masses of people trying to disturb others for their own personal gain. I can understand how a few people in the shady ends of the internet are trying to steal from others, but not how these scammers are everywhere on the internet preying on those who don’t know any better. It is unsettling to think about the population of people who aren’t overly knowledgeable about the internet who are blindly walking into traps left and right. An example is when Logan talked about phishing and how realistic some scamming attempts look. There are a few emails currently in my inbox that smell a little fishy, but I am relatively well versed on the internet. I am usually able to pick out scams on the internet. My Grandparents though, due to the nature of…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003) was created because of complaints that people were being misled and deceived by emails and text messages that they were receiving from companies. In the past, there was no need for such a law because there was no such thing as email and text messaging. SPAM, which is unsolicited email and text message advertizing, was the main issue that caused people to see the need for such an Act. People felt that…

    • 554 Words
    • 3 Pages
    Good Essays
  • Better Essays

    1.1 Within my role as assistant manager I communicate with many different groups and individuals on a daily basis. Groups and Individuals I come across on a daily basis are the client, their relatives, GPs, Community nursing team, sales reps, pharmacists and my colleagues.…

    • 2016 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The Use of Email

    • 754 Words
    • 4 Pages

    At work I use email on a daily basis, whether that be reading emails or sending them. Safety is one of the most important aspects of any job. It is important to stay safe and respect others when using email. If I don’t use email correctly I could quite easily see myself passing confidential information to the wrong people and end up in a difficult situation. To stop myself from sending emails to the wrong people I should always double check an email address before sending an email. This will stop me from ever being put in that difficult situation of sending a confidential email to the wrong person. I should also always try to encrypt confidential when possible in case information somehow does go to the wrong person. I could also accidently spread a virus on a computer system via questionable emails. If I ever receive a suspicious email I send it to my junk email and report it straight away. A suspicious email may ask me to click a link to a website that could spread a virus around the computer system and network. Another way to stay safe when using email is avoid misuse of images. When I am working on a task to crop…

    • 754 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bigbasket.Com

    • 604 Words
    • 3 Pages

    Unfortunately, Rachel's boss had a different approach. The Vice President of Marketing wanted results-he wanted existing customers to upgrade their networking packages and follow through on advertisements. He told Rachel to be as aggressive as possible with her email campaigns. But at the same time, Rachel spoke with coworkers who didn't want to work for a company known for its email spam. They prided themselves on working at an organization that respected its users and didn't abuse the ease of email communication-even within the competitive market.…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Traveling On A Budget

    • 1314 Words
    • 6 Pages

    2. Subscribe, subscribe, subscribe. I understand the loathing of junk mail. Believe me, every unwelcome message from Match.com or ChristianMingle-or-whatever makes me want to register for a new email address, like: DoIlookthatdesperate@howrude.com. Coupons, dating services, etc. can make your inbox feel cluttered. I get it. However, you're missing out if you aren't getting emails from the following businesses: Go Last Minute, One Travel, Virgin America, Priceline, and Spirit Deals. These carriers will email you the best deals in the world. I wasn't even looking for a flight when One Travel sent me an email offering a $250 round-trip flight to New York City. I may not have been looking, but did I want to go? Of course! I just didn't think a deal like that existed.…

    • 1314 Words
    • 6 Pages
    Good Essays