The Danger of Spam

College
Essay
Technology
Pages 2 (502 words)
Download 0
For the countless users of the World Wide Web, email has become a main source of communication for those who find themselves at opposite sides of the globe. Hundreds, if not thousands, of emails are sent on a daily basis. In most cases, users send high volume amounts of correspondence on an hourly time frame…

Introduction

With sometimes up to 150 pieces of spam email possible for an individual user, it can be said that spam email is a real problem, which in the end, needs a real solution as it comes to fixing it.
To put into perspective the volume of spam capable, "E-mail spam has existed since before the beginning of the Internet, and has grown to about 90 billion messages a day, although about 80% is sent by fewer than 200 spammers. Botnets, virus infected computers, account for about 80% of spam. Laws against spam have been sporadically implemented, with some being opt-out laws and others being opt-in. SPAM DUDE! The total amount of spam has leveled off slightly in recent years. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising," ("E-mail spam" p.1).
One would have to wonder as to how it could even be legal to mass produce such email. According to the website spamelert.org in a piece on the legality of spam, they write that, "In the United States spam is legally permissible according to the CAN-SPAM Act of 2003, provided it follows certain criteria: a truthful subject line; no false information in the technical headers or sender address; "conspicuous" display of the postal address of the sender; and other minor requirements. ...
Download paper
Not exactly what you need?

Related papers

Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2…
Online Security
"This report illustrates that sophisticated computer fraud schemes continue to flourish as financial data migrates to the Internet," said FBI Cyber Division Assistant Director Shawn Henry in a written statement. "It also underscores the need for continued vigilance on the part of law enforcement, businesses, and the home computer user to be aware of these schemes and employ sound security…
The Danger of Spam
With sometimes up to 150 pieces of spam email possible for an individual user, it can be said that spam email is a real problem, which in the end, needs a real solution as it comes to fixing it.…
Networking Security Engineering
To avoid this micro content management system can be designed to extract the maximum potential from the content and at the same time the data stored as XML within a native XML must searchable using Xpath. This gives to execute Xpath via a URL from within user's browser.…
Controlling the Internet
However, with the free and unlimited power of the Internet comes great responsibility not only for our leaders but to each and everyone. Since the Internet has also become the haven for offensive and detestable content and gateway for malicious and destructive activities, there have been calls to control and police the use of the Internet in the name of protecting the members of our community…
Web Resources
FTP server provides comprehensive technical solution for files download. FTP can be used for storing corporate documents of large volume, for example price lists or presentations. Customers can download these documents from Habibi's FTP server. …
Web Based Instructional Intervention and Information Literacy.
Web-based instruction strategies employ the Internet in delivering instructional information. A current teaching method can be supported by web-based instruction can support an existing teaching method or computer-based instructional methods can be used instead of the existing method of teaching. These act as an extension of colleges and universities, businesses, teachers, and/or parents in…