|
Coping with EmailsHere are my notes on how you can take advantage of email and electronic communications. Please let me know what you find helpful or missing here. Sound of Jim Carrey saying “Well when you figure it out email me” Take the Brainbench certification test on MS Outlook 2000 Fundamentals and MS Outlook Express 5.0 Fundamentals.
|
|
Related: |
Emoticons and Abbreviations
|
|
Web-based Email - Gmail
To find all emails from jblow, enter
To find all emails containing attachments, enter
Gmail help and information says it best: While most companies have server-level backup and disaster recovery plans, they may not support account level recovery. So for example, if one of their data-centers burns down, everything can be safely restored to another data-center. But if the contents of your account are lost, there may be no way to get it back. This is generally true of Gmail*, although there are some cases where messages deleted as a result of a compromised (hacked) account may be able to be restored. Because of this, it's critical that people provide their own backups of their e-mail accounts, and in fact all important information that is stored in "the cloud". There are various ways the information can be lost, the most common of which is a compromised (hacked) account, and the provider may not have a way to restore it. Gmail Backup
http://www.macworld.com/product/collection/13550/mac-email-clients.html Email clients on Mac OSX This link was written by Bethan England. http://stackoverflow.com/questions/7537969/backup-restore-from-to-gmail http://stackoverflow.com/questions/926694/download-emailsbackup-from-gmail-programatically http://blog.rebex.net/news/archive/2007/05/14/howto-download-emails-from-gmail-account-in-csharp.aspx http://lifehacker.com/235207/geek-to-live--back-up-gmail-with-fetchmail Got Your Back (GYB) takes advantage of Gmail's ability to respond to IMAP protocol requests (which ironically Microsoft invented). This is great because it allows for restore of messages, and preserves Gmail's useful labels tags. But GYB is a command-line tool with no GUI. First open a browser and log into Gmail. Empty your Trash and Spam folders. GYB does not check Spam or Trash even though these count against your Gmail quota (displayed at the bottom of your Gmail inbox).
On another browser window go to
github.com/jay0lee/got-your-back/releases. On a Mac, double-click on the zip file to expand into a folder. Go to the Mac Finder. Open the Terminal application. The $ (dollar sign) is the command prompt. Go to the folder containing gyp's files: cd downloads/got-your-back-0.29 Get a list of files in the folder: ls Ensure the script has the necessary permissions: sudo chmod 755 gyb.py Get the full folder path to the file: pwd The response should be a path such as: /Users/wilsonmar/downloads/got-your-back-0.29 Some like to move the folder to where other Python modules are. Run setup.py to install the python package: sudo python setup.py install The response: BLOCKING QUESTION: Is the py2exe here refer to the distutils extension to create standalone windows programs from python scripts. (which is not applicable to Mac). The counterpart to py2exe on the Mac is: https://pythonhosted.org/py2app/install.html obtained using pip install -U py2app http://svn.pythonmac.org/py2app/py2app/trunk/doc/index.html But that website is gone. https://www.youtube.com/user/sentdex/about HKinsley@live.com, harrison@sentdex.com http://sentdex.com/
Linux folders
are located, such as Double-click on the path to highlight it, and press Command+C to copy the string to the Mac internal clipboard. To save a few seconds, create an alias to the GYB Python file: alias gyb="python gyb.py" List the Mac's search path: ~/.profile echo $PATH Mine shows: /opt/local/bin:/opt/local/sbin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin Colons separate items. To run your script from the Terminal window, put this path in your Mac's shell search path, as described at http://coolestguidesontheplanet.com/add-shell-path-osx/ NOTE: Python on OS X honors all standard Unix environment variables such as PYTHONPATH, but setting these variables for programs started from the Finder is non-standard as the Finder does not read your .profile or .cshrc at startup. For bash to do that, Open or create a .bash_profile file using the built-in nano text editor: nano .bash_profile Paste a line such as this containing the folder where you want your Mac to notice: export PATH=/Users/wilsonmar/downloads/got-your-back-0.29:$PATH Save the file in nano by clicking ‘control’ +’o’. Confirm the name of the file is .bash_profile by hitting return. Click ‘control’+’x’ to exit nano. Macs machines come with Python in the Applications folder, so there is no need to download the Python interpreter from Python.org. To run without requiring an existing Python installation, convert python scripts into executable Mac OS X applications using bundlebuilder or py2app NOTE: Macs have specific services. But you don't have to worry about them now. The path to setup.py for GYB should be displayed. List GYB commands: python gyb.py |
|
|
Email Client Software
Software like Microsoft Outlook for Windows installed on a computer store emails on the user's computer.
|
Get this print framed for your wall! |
|
Microsoft OutlookScott McNeely of Sun calls Microsoft's Outlook e-mail software "Look Out," the virus-prone "petri dish of choice on the Internet."
|
|
Transfers
Address books:Email messages: |
1-57231-500-8 Developing Applications for Microsoft® Exchange with C++ (Microsoft Press: Redmond, Washington, 1996) by Ben Goette
|
|
Virus Protection
Clicking on a malicious email with a link that downloads a virus is the top way hackers break into systems.
Subject TextAvoid beginning emails with Subject: “Recall:” because some systems filter out email recall commands and reject such email. Spammers use these subject lines to lure you into opening their mail:
To avoid being filtered out, avoid these trite titles. Begin subjects with an identifier, personally relevant info, and date in your email titles. Example: [CSEX] Followup from our lunch at Coco's 12/2/03 If you're the curious type, instead of clicking, check out hoaxes before you forward warnings and end up looking like a fool to those who know how computers really work. This stems from a decision Microsoft made in structuring their operating system. |
Get this print framed for your wall! |
Secure Electronic Communications
There are two approaches to sign and encrypt files you send via email or FTP, both being standardized by different groups of the Internet Mail Consortium:
S/MIME and OpenPGP — Internet Mail Consortium's article comparing the two protocols. The Entrust.com Entelligence client transparently (to users) encrypts files and appends the .cpt file extension to the original file's name. Those who receive the encrypted file also need the same client program, which automatically decrypts the file and restores the original file name. Xrayapp runs on desktops to intercept outgoing SMTP emails and alter headers for privacy and for switching among mail and newsgroup servers. PEM (Privacy Enhanced MailPEM is an application-layer protocol finalized in 1993 by the IETF to add in a way that is compatible with existing mail systems.
|
Instant Communications
Each service has their own protocol. So to go through firewalls, configure:
Also, check registry keys in "HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ MessengerService\ Policies\ Suffixes" to make sure other applications are not adding sites to the access list. If you don't want to install any program on your machine, or if you're behind a firewall, use the eMessenger website to access MSN using a JavaScript enabled browser.
If you have AOL Internet Messenger running, send a message to it
using protocol
If you have Yahoo Messenger open: ymsgr:sendIM?screenname
|
Interoperable and secure instant messenger clients: Microsoft's Live (Real-Time) Communications Server 2003 (code named “Greenwich”) Communications Server first shipped Sep. '03 at an initial cost of $929 to install plus $34.95 per employee. It integrates closely with Microsoft's Outlook.
Social networks |
Email Addresses
Email Addresse TypesRFC 821 is jblow@where.comRFC 822 is "BLow, Joe" <jblow@where.com> Email addresses are a hassle to change. I don't want to have to send out announcements, miss out on mail, or other hassles associated with changing addresses. One good reason for having an AOL account: Because there are a lot of complaints about AOL messing up the formatting of web pages, I need to have AOL just to see how badly it messes up web pages. I use Internet Service Provider (ISP) Earthlink to work on the Internet. Here are some considerations: comparing ISP's at TheList and Epinions
It's like giving someone a phone number like 1-800-GO-AWAY.
|
Free Email Addresses
* Juno requires a separate program (which takes up 15 MB of hard disk) that displays ads while you do your emailing. That's why it's free dial-up. The following also provide free email: |
Spam Proofing
|
|
Web Bugs
Since a an image can be easily created for each email address and each subject line, a sophisticated spammer can determine which subject line is effective and which email address are “live”. Here's what you can do:
|
Spam WordsHere are some email Subject lines that have enticed people to read spam mail:
Let me know the subject lines that got you to open spam mail.
|
|
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page
Thank you! |