Issue 40

October 2011

Previous

Next

STRAY NEWS

Next

Previous

Home. Front Page. Committee etc.. AGM 2011. U3A Conference. Open Meetings. Joint Exhibition. Group Events. Group News. Leader's Lament. Advertising. Local News.

u3a.harrogate@googlemail.com

Please note that most email addresses on this site are protected to avoid abuse by spammers. You will need a JavaScript enabled browser to see the email addresses.

Email Security

Addressing emails to multiple recipients

Whenever you send an email to more than one person., do NOT use the To: or Cc: boxes for adding more email addresses. You may have to put at least one address in the To: box (I usually send it to myself) but wherever possible always use he BCC: (blind carbon copy) box for listing ALL the email addresses. This way the people you send to will only see their own email address.

Forwarding emails

Every time you forward an email there is information left from the people who received the message before you did, namely their email addresses and names. As the messages get forwarded along, the list of addresses builds and all it takes is for one person to get a virus and his computer can then send that virus to every email that has come across his computer. Also someone can use those addresses to send junk mail and spam.

 

Try the following if you have not done it before.

When you forward an email, click the Forward button first and then you will have full editing facilities. Now highlight and DELETE all of the other addresses that appear in the body of the message (at the top), and any other content you do not need to forward.

Alternatively you can highlight the content you wish to forward and cut and paste this into a New Message.

Either way avoids recipients from having to read through replies to replies to replies etc.

 

George Tickle

Tracking Your Laptop

BBC Click featured a free open-sourced program called Prey which can be installed on a laptop. Basically you install a tiny agent in your PC which silently waits for a remote signal to wake up the laptop if it is stolen or lost. Click on a link to Prey who will activate the laptop, pinpoint its exact location and monitor any activity if the laptop is used. It's instructive to watch the BBC clip for a full explanation of the process by clicking on the link http://tinyurl.com/42dy2dg. The program can be downloaded from http://preyproject.com/ (Thank you Peter Ridgway, Spelthorne U3A).

 

Taken from U3A Signpost Number 130