Welcome!
If you have an account, please:
Log in
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

How to Forward E-mails Properly

Chain letters gather e-mail addresses the further they go. Here's an example that has gathered quite a few e-mail addresses along the way:

The further it goes, the more e-mails it collects

If you're going to forward an e-mail, make sure you actually delete all the e-mail addresses and other useless data from above and below the actual content before you do. Not only are you preventing your e-mail (and the e-mails of everyone else on the list) from being sent to who knows who, but it makes the content of the e-mail much easier to find.

Pranks and Hoaxes

Besides protecting the privacy of those who came before you and those who come after, it might be a good idea to verify the authenticity of an e-mail before sending it along. There are a variety of hoaxes that are constantly being sent around in e-mails with the plea to send them to everyone you know.

In one famous case, Nike shoes was the target of a prank that claimed that if you sent them old sneakers, you'd receive a new pair for free! Because people believed it and kept spreading the lie, Nike received thousands of pairs of old shoes and a lot of bad press through no fault of their own.

Even if you don't share my personal distaste for people who create hysteria or harm through these pranks, at least consider the embarrassment factor. If you're one of those people who forward everything without previously researching it, you look pretty gullible and at the very least, people will start ignoring the things you send.

Whenever you receive one of these chain letters, first check the rumor-busting sites online:

email Tutorial
prev: Reply-All|INDEX|next: Personalize E-mail

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

shopping online Tutorial
|INDEX|next: Research Products
If you like to keep your money and safe yourself the trouble and hassle of getting nailed by a bad or fraudulent retailer online, you need to learn to identify them before it's too late.
Before you buy anything, utilize the vast power of the Internet to research products and pick the best one possible.
You're about to pay for something, but what's the safest way to do it?

Related Guide

Once you've gone through the trouble to make an online account with a company, make sure you protect your passwords properly

... or check out any of my other guides and tutorials by clicking here!

Snopes - Answers to Rumors and Urban Legends

Always check Internet Rumors before forwarding a chain e-mail.

[Click for full description]

FactCheck.org - Rumor Busting and Scam Slaying

Always check Internet Rumors before forwarding a chain e-mail.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]

Validating Webstores and Services

It can be hard to know who to trust and who to not trust online, but there are things you can do to verify who the good guys and bad guys are before it's too late.

[Click for full description]

Research Products

One of the best things about shopping online is the ability to research information online.

[Click for full description]

Paying Online

Ever been nervous about paying online for something. Just take a second to learn about the various options and put your mind at ease.

[Click for full description]