Health knowledge made personal
Join this community!
› Share page:
Go
Search posts:

Tower Technology News, Byte torrent: How we're becoming more vulnerable to spamming

Posted Aug 31 2013 2:32am 1 Comment
 

One Sunday evening in the spring of 1864, messenger boys employed by the London District Telegraph Company appeared on the doorsteps of several MPs and other prominent figures across the British capital. Each boy carried a telegram in a sealed envelope, and an urgent message, at so late an hour, naturally prompted alarm. "Having only arrived from the country on the previous day," one recipient later recalled, "I feared that a fire or some other casualty had occurred subsequent to my departure." 

But there was no fire, nor any national crisis. As Matthew Sweet tells the story, in his book Inventing the Victorians, the telegram was from Messrs Gabriel, a sketchy firm of dentists and purveyors of a tooth-whitening powder "as used by Her Majesty". The message was a friendly reminder of their opening hours. 

"I have never had any dealings with Messrs Gabriel," an anonymous correspondent bellowed in a letter to The Times the next day, "and beg to ask by what right do they disturb me by a telegram which is evidently simply the medium of advertisement?" 
Today, the letter is included in the archives of the Computer History Museum, in Silicon Valley, in the United States, and with good reason: that telegram was arguably the first example of what would come to be known as spam. 

It's tempting to think of e-mail spam as a largely historical phenomenon, too. Sure, messages touting knock-off Viagra do still arrive, along with pleas from the daughters of dictators looking to launder "15,000,000.00 (15 million) US Dollars", and wondering if you'll help. But they're intercepted by spam filters or else easily identified and deleted. (Human vanity doesn't evolve much: tooth-whitening products are still a popular topic.) There was a time, in the 1990s, when serious commentators predicted that spam might kill e-mail altogether. 

Read more: Tower Technology News
Comments (1)
Sort by: Newest first | Oldest first
Hackers will find ways to pass any securities, its kind of a cycle. Don’t just click on anything!
Post a comment
Write a comment:

Related Searches