ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel
  • »
  • Technology»
  • Internet & the Web

Junk mail SPAM

Updated on August 8, 2011


A delicious ham-based product wildly popular in Hawaii, spam also describes unsolicited email. Electronic mailboxes clog with digital detritus until hard drives fill up and crash. Wading through voluminous volumes of commercial communications consumes copious quantities of time during the work day. Experts estimate spam percentages to approach 99% of everything arriving in computer in-boxes. We hate it, but it's fun to play with. Like itchy poison ivy that never heals, we pick at it until it bleeds, then we make haste to the Emergency Room looking for professional help. The analogy is weak, but most of us get the point anyway.

SPAM is entertaining. It teaches us much about human nature. Spammers, the folks working diligently to communicate with complete strangers, stay up late devising strategies to convince us to read their messages. They strive to bypass spam filters. Their technologies inspire college courses and NSA investigative efforts.

Junk mail, spam, causes mass volumes of grief to some users and goes ignored by others. A single solitary unsolicited message may ruin the entire email experience or simply result in one more depression of the Delete key. Spammers couldn't care less: theirs is simply a numbers game. They understand that sending out sufficient numbers of solicitations statistically results in predictable numbers of responses.

Individual instances of these undesirable missives provide hours of entertainment. Human nature reflects back at us from the words and images bundled into tidy packets of spammy goodness. You gotta love it. Let us study in excruciating detail a prime example of spam that recently plunked into in-boxes throughout cyberspace.

A cute little spam message. The link doesn't exactly match the intent.
A cute little spam message. The link doesn't exactly match the intent.
The web page for is still 'up', but completely blank. Note the HTML.
The web page for is still 'up', but completely blank. Note the HTML.

Dig into some tasty SPAM

This tasty morsel popped up like an unexpected poisonous mushroom. Someone wants to loan us money. The deals are delectable, the terms irresistible. We all need some extra cash now and then. Sending out millions of these offers certainly results in a few clicks. Not everyone is as shewed as we are.

Note the link, revealed by hovering over the "Click Here." button. Does mspeedyplumbing include a subsidiary specializing in low-interest loans? We can only find out by clicking. In the interest of Computer Science and creative writing, we pasted the domain into our browser, omitting the specific page. The domain proved disappointing. Their home page was completely blank. No attractive images, no welcoming messages, no reassuring links to the Better Business Bureau or to Verisign.

The specific link, including the gobbledegook at the end, indicates that these spammers have taken great pains to track every recipient. Clicking on the link in it's original form would result in a flurry of electronic activity. A tiny annotation in a specially-designed database would forever record the fact that I responded. Our erstwhile marketers obviously maintain serious paper trails: they would know that I exist and I am potentially gullible. My email address becomes a more valuable commodity.

Where'd it come from?

Email does leave a trail. As it slithers through cyberspace, it hops from server to server. Each server attaches a little more information. Most folks give little care to the circuitous route taken by their spam: it's easier to hit the Delete key and return to Plants Vs Zombies.

Every computer hooked to the Internet has a unique identifier referred to as an IP address. Our spammy example originated at address From there, it traveled to another, probably reputable, server that recorded the original address as a permanent artifact. Looking up this IP address is trivial. We learn that it belongs to an organization called "ColoCrossing" in Withamsville, New York. ColoCrossing turns out to be a company providing web hosting services to companies and individuals. They own a block of IP addresses and they parcel them out to customers.

Did ColoCrossing spam us? Certainly not.

We surmise that a computer using services provided by ColoCrossing fell victim to a virus or external attack. Almost certainly the system admins at ColoCrossing quickly recognized the spam outbreak and efficiently stubbed it out. They get paid to do that.

Should ColoCrossing be prosecuted or even persecuted? Absolutely not. We don't picket the landlord when tenants let weeds grow in the driveway.

What can be done?

As an honest computer user, you can't get mad and you can't get even.

Spamming is a game of competing technological advances. The bad guys devise strategies to subvert current prevention methods. The good guys react. Scores indicate that the black hats are winning at the Internet level but losing at the inbox level. Billions of unsolicited messages flood into cyberspace. Fortunately, the vast majority of spam vanishes at the hands of sophisticated software and clever system administrators. Very little of it survives to torment end-users.

  • Keep your filter up to date.
  • Don't click on anything unrecognized.
  • Don't give out your email address: eventually it will end up on spam lists.

One nuclear option does exist: spamming could be throttled tomorrow. Hopefully it will never happen, but when governments realize that 'revenue' can be enhanced by taxing every transmitted email, we may see the end of spam avalanches and the continuous degradation of our personal freedoms.


    0 of 8192 characters used
    Post Comment

    • nicomp profile image

      nicomp really 6 years ago from Ohio, USA

      It's a mish-mosh of unidentifiable stuff that nobody wants. Computer people have a weird sense of humor.

    • Robwrite profile image

      Rob 6 years ago from Oviedo, FL

      But WHY is it named after a spiced ham?

    • nicomp profile image

      nicomp really 6 years ago from Ohio, USA

      It's named after the spiced ham.

    • Robwrite profile image

      Rob 6 years ago from Oviedo, FL

      Useful hub. How did it get to be called Spam, anyway?

    • nicomp profile image

      nicomp really 6 years ago from Ohio, USA

      @breakfastpop : Spam is independent of hardware. You will be found sooner or later.

      @dallas93444 : Thank you for your kind words.

    • dallas93444 profile image

      Dallas W Thompson 6 years ago from Bakersfield, CA

      Great article. Thanks! Flag up!

    • breakfastpop profile image

      breakfastpop 6 years ago

      I n the past I have had some spam that made me see a shrink! Now I have a MAC and I don't get spam. I don't eat it either!

    • profile image 6 years ago

      Everyone should read this article carefully - it shews a lot of good advice - I suspect the author can actually travel in packets across vast terrains at the speed of digital light - a real bonus you are trually a new type of cyberspace superhero Nicomp!

    • nicomp profile image

      nicomp really 6 years ago from Ohio, USA

      @drbj : Cool!

    • drbj profile image

      drbj and sherry 6 years ago from south Florida

      no one, Nicomp,is as shewed as you are. Trust me.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: ""

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)