The term spam is Internet slang that refers to unsolicited commercial email or unsolicited bulk email. Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the postal service. Unsolicited email is email that you did not request and usually contains advertisements for products or services. Few reputable marketers use spam to advertise goods and services. The most common types of spam include the following:
Unlike junk paper mail, email spam costs the sender very little to send. The recipient and the carriers pay almost all of the costs because the spammer does not have to pay for all the Internet bandwidth tied up in the delivery of the spam. Because they have no incentive to be efficient in their mass emailing, spammers usually do not put much effort into verifying email addresses. Spammers use automatic programs called bots to search the web and newsgroups for email addresses, or they can purchase them in bulk from other companies. Spammers also guess at addresses using name generation programs and even send thousands of messages that bounce due to invalid addresses. In order to get a single response, spammers are willing to send out thousands of email messages.
Many spam senders use tricks to get you to read their messages. For example, they use the “Subject” line to entice you to open the message. Because of the tricks spammers use to send the email to you, your email address may not even be visible in the “To” line of the message, and you almost never see the email addresses of the other people they sent the message to. The worst thing about spam, though, is that the spammers use tricks that help disguise the origin of their messages.
One of the spammer’s most common tricks is to relay messages through the email server of an innocent third party. This tactic doubles the damage: both the receiving system and the innocent relay system are flooded with spam. For any mail that gets through, the flood of complaints often goes back to the innocent third party because it was made to look like the origin of the spam. Many spammers send their spam from a free account on a large ISP such as AOL, Yahoo, or Hotmail, then abandon the account and open a new one to use for the next assault. Another common trick that spammers use is to forge the headers of messages, making it appear as though the message originated elsewhere. This is called spoofed email. There are some pieces of information in the full headers that the spammer cannot forge. After a technical investigation into the source of spoofed email messages, the results most often lead to a dead end, an abandoned account, or an innocent mail relay server.
Is your email address on any web pages? Do you post to newsgroups using your RRC Polytech address? Research by the Federal Trade Commission and by the Center for Democracy and Technology found that email addresses posted on websites or in newsgroups attract the most spam. A simple way to find out why you are getting so much spam is to type your email address into a search engine, such as google.ca. The number of times your address is found by the search may surprise you.
You might also receive spam if you fill out online forms or correspond with certain companies via email. Although most reputable sites have good privacy policies and will not share your information, it is up to you to decide what sites you trust not to sell your address to spammers.
Spam has increasingly become a problem on the Internet. Even though there are laws concerning some types of unsolicited email (most often the fraudulent kind), these laws do not address all types of spam email and it can be very costly to pursue spammers through the courts. Although computer experts are continuously designing better ways to filter out unwanted mail, the spammers are also continuously devising ways to get around those technical solutions. It is a very frustrating situation for users as well as for technical support personnel. It is a basic fact of Internet life that if you use the Internet, you will get unsolicited email.
RRC Polytech campuses are located on the lands of Anishinaabe, Ininiwak, Anishininew, Dakota, and Dené, and the National Homeland of the Red River Métis.
We recognize and honour Treaty 3 Territory Shoal Lake 40 First Nation, the source of Winnipeg’s clean drinking water. In addition, we acknowledge Treaty Territories which provide us with access to electricity we use in both our personal and professional lives.