How to Forward E-mails Properly

Chain letters gather e-mail addresses the further they go. Here's an example that has gathered quite a few e-mail addresses along the way:

The further it goes, the more e-mails it collects

If you're going to forward an e-mail, make sure you actually delete all the e-mail addresses and other useless data from above and below the actual content before you do. Not only are you preventing your e-mail (and the e-mails of everyone else on the list) from being sent to who knows who, but it makes the content of the e-mail much easier to find.

Pranks and Hoaxes

Besides protecting the privacy of those who came before you and those who come after, it might be a good idea to verify the authenticity of an e-mail before sending it along. There are a variety of hoaxes that are constantly being sent around in e-mails with the plea to send them to everyone you know.

In one famous case, Nike shoes was the target of a prank that claimed that if you sent them old sneakers, you'd receive a new pair for free! Because people believed it and kept spreading the lie, Nike received thousands of pairs of old shoes and a lot of bad press through no fault of their own.

Even if you don't share my personal distaste for people who create hysteria or harm through these pranks, at least consider the embarrassment factor. If you're one of those people who forward everything without previously researching it, you look pretty gullible and at the very least, people will start ignoring the things you send.

Whenever you receive one of these chain letters, first check the rumor-busting sites online:

Tags: , , ,

How to Use “CC” Properly

Don't violate the privacy of people in your contact list by sharing their e-mail addresses with everyone. What do I mean? Well, have you ever seen one of these:

Wow! Look at all those names!

The problem here is that everyone who receives this e-mail will also see everyone else's e-mail address and name. Why violate the privacy of your contacts this way? All that does is present a risk to you and them if anyone on the list is a spammer or scammer (or someone forwards this e-mail to one).

Put your own e-mail address in the "To:" field and take that giant list of people and put it in the blind carbon copy (BCC) field. Now when you send it, everyone will still get the e-mail, but the only address they will see is yours. And since they already know who you are, you're not giving away any private information to anyone.

You can still use CC if you wish, but only if you specifically intend for each person who receives the e-mail to know the other people who got the e-mail (for example, you send an e-mail to the tech support people and CC their supervisor so they know they will be called to task for their response).

Here's a great list I found online of all the major e-mail services and how to enable the BCC field if it isn't already.

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Snopes - Answers to Rumors and Urban Legends

Always check Internet Rumors before forwarding a chain e-mail.

[Click for full description]

FactCheck.org - Rumor Busting and Scam Slaying

Always check Internet Rumors before forwarding a chain e-mail.

[Click for full description]

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]