Got a tricky question? Receive an answer from students like you! Try us!

The Danger of Spam - Essay Example

Only on StudentShare
College
Author : heath00
Essay
Technology
Pages 2 (502 words)

Summary

For the countless users of the World Wide Web, email has become a main source of communication for those who find themselves at opposite sides of the globe. Hundreds, if not thousands, of emails are sent on a daily basis. In most cases, users send high volume amounts of correspondence on an hourly time frame…

Extract of sample
The Danger of Spam

With sometimes up to 150 pieces of spam email possible for an individual user, it can be said that spam email is a real problem, which in the end, needs a real solution as it comes to fixing it.
To put into perspective the volume of spam capable, "E-mail spam has existed since before the beginning of the Internet, and has grown to about 90 billion messages a day, although about 80% is sent by fewer than 200 spammers. Botnets, virus infected computers, account for about 80% of spam. Laws against spam have been sporadically implemented, with some being opt-out laws and others being opt-in. SPAM DUDE! The total amount of spam has leveled off slightly in recent years. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising," ("E-mail spam" p.1).
One would have to wonder as to how it could even be legal to mass produce such email. According to the website spamelert.org in a piece on the legality of spam, they write that, "In the United States spam is legally permissible according to the CAN-SPAM Act of 2003, provided it follows certain criteria: a truthful subject line; no false information in the technical headers or sender address; "conspicuous" display of the postal address of the sender; and other minor requirements. ...
Download paper
Not exactly what you need?

Related Essays

Technology stress
"Opportunity" of computers and cell phones expresses the irony of the situation modern society is now. Without these new gadgets and innovations, people seem to be 'incapacitated and unable to finish tasks, even though it may have been accomplished at a faster pace without the help of a particular technology.…
4 pages (1004 words)
Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2…
20 pages (5020 words)
Online Security
"This report illustrates that sophisticated computer fraud schemes continue to flourish as financial data migrates to the Internet," said FBI Cyber Division Assistant Director Shawn Henry in a written statement. "It also underscores the need for continued vigilance on the part of law enforcement, businesses, and the home computer user to be aware of these schemes and employ sound security procedures (Valenzuela, 2009)."…
7 pages (1757 words)
Networking Security Engineering
To avoid this micro content management system can be designed to extract the maximum potential from the content and at the same time the data stored as XML within a native XML must searchable using Xpath. This gives to execute Xpath via a URL from within user's browser.…
11 pages (2761 words)
Controlling the Internet
However, with the free and unlimited power of the Internet comes great responsibility not only for our leaders but to each and everyone. Since the Internet has also become the haven for offensive and detestable content and gateway for malicious and destructive activities, there have been calls to control and police the use of the Internet in the name of protecting the members of our community predominantly the innocent children. "For success in any field of human activity leads to crime that needs mechanism to control it" (Singh, 2005, p.1) and "technology is a human activity" (Williams, 1997,…
10 pages (2510 words)
Web Based Instructional Intervention and Information Literacy.
Web-based instruction strategies employ the Internet in delivering instructional information. A current teaching method can be supported by web-based instruction can support an existing teaching method or computer-based instructional methods can be used instead of the existing method of teaching. These act as an extension of colleges and universities, businesses, teachers, and/or parents in providing learning opportunities to various individuals such as students and employees. …
90 pages (22590 words)