Est. reading time: 2 minutes
Lesson one

Lesson one: Learning The Terminologies related to Spamming

Even with all tools at our disposal to help reduce spamming, we at one time get those annoying messages whether on inbox, news feed or other communication platforms. You have probably seen emails soliciting for your bank details or trying to make you jump into purchasing something. Honestly, I have always deduced this emails to be from fraudulent people but never took time to think about it until recently.
I have been feeling proud of my increased technological sophistication since I joined HOSTAFRICA. True, we only have the best technical team to help resolve your webhosting issues and keep you updated on webhosting trends. So today, I share the first lesson from our technical team lead, Hargreaves Standa, on spamming. Get ready –Take notes!

  1. Spamming

This is the intentional or unintentional sending of unsolicited emails through your domain account. By unintentional, this might mean someone has access to your domain account or has hacked into your account to send spam. Spamming can either be on your email or on your website or both. In the next lesson, we explore website and email spamming.

  1. Phishing

This is the attempt to obtain sensitive information e.g. usernames, passwords, credit card details and indirectly money often for malicious reasons. In most cases, users are prompted to enter personal information or even pay for a service at a fake website which looks almost like the legitimate one.
Example, if I registered the domain today, someone might retrieve my information such as email address and use it to solicit for money. Unsuspecting client might pay thinking the email was from their host. See example below.
Image by;

  1. Scam

This is the use of internet services or software with internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft. The example under phishing is also a scum.

  1. Spoofing

This is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage. An example, when email messages are sent with a forged sender address which you have not created. Example
There you go, this is general information on the terminologies we need to know so that we can understand the importance of internet security. In the next lesson, get ready to get into details.

The Author

Viona W.

With over 7 years of experience crafting tech content, Viona W is a valuable asset to the HOSTAFRICA editorial team. Her skills extend beyond writing, as she also boasts experience in public relations and cultivating relationships with media outlets. This makes Viona adept at ensuring HOSTAFRICA's achievements and initiatives gain well-deserved public recognition. When Viona isn't immersed in the world of tech, she enjoys seeking out new experiences in nature and the power of storytelling to create positive change.

More posts from Viona

Related posts