programming4us
           
 
 
Windows

Windows 7 : Maintaining Your Privacy While Reading Email

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/15/2010 2:47:08 PM
You wouldn’t think that the simple act of reading an email message would have privacy implications, but you’d be surprised. Two scenarios can compromise your privacy: read receipts and web bugs.

Blocking Read Receipts

A read receipt is an email notification that tells the sender that you’ve opened the message sent to you. If the sender requests a read receipt and you either select the message so that the message text appears in the preview pane, or double-click the message to open it, Windows Live Mail displays the dialog box shown in Figure 1. Click Yes to send the receipt, or click No to skip it.

Figure 1. You see this dialog box when you open a message for which the sender has requested a read receipt.


Many people like asking for read receipts because they offer proof of delivery. It has been my experience, however, that getting a read receipt back starts a kind of internal clock that the sender uses to measure how long it takes you to respond after reading the message. Because of this annoyance, and because I feel it’s nobody’s business to know when I read a message, I always click No when asked to send a read receipt. (Spammers, too, sometimes request read receipts as a way of validating email addresses.) In fact, you can go one better and tell Windows Live Mail never to send a read receipt:

1.
Click Menus (or press Alt+M), and then click Options to display the Options dialog box.

2.
Display the Receipts tab.

3.
In the Returning Read Receipts group, activate the Never Send a Read Receipt option.

4.
Click OK.

Squashing Web Bugs

A web bug is an image that resides on a remote server and is included in an HTML-formatted email message by referencing a URL on the remote server. When you open the message, Windows Live Mail uses the URL to download the image for display within the message. That sounds harmless enough, but if the message is junk email, it’s likely that the URL will also contain either your email address or a code that points to your email address. When the remote server gets a request for this URL, it knows not only that you’ve opened the message, but also that your email address is legitimate.

You have three ways to combat web bugs:

  • Don’t open a message that you suspect to be spam, and don’t preview the message in the Windows Live Mail preview pane— In fact, before you can delete the message, you have to turn off the preview pane temporarily.

  • Read your messages in plain text— In Windows Live Mail, click Menus (or press Alt+M), and then click Options to display the Options dialog box. Choose the Read tab, and then activate the Read All Messages in Plain Text check box. This prevents Windows Live Mail from downloading any web bugs because it displays all messages in plain text, which means that it also thwarts other message formatting, as well.

    Tip

    If you get a legitimate HTML message, you can tell Windows Live Mail to display the formatting. Select the message, press Alt to display the menu bar, and then select View Message in HTML (or press Alt+Shift+H).


  • Block images from displaying— In Windows Live Mail, click Menus (or press Alt+M), and then click Safety Options to display the Safety Options dialog box. Display the Security tab, and then activate the Block Images and Other External Content in HTML E-mail check box. This prevents Windows Live Mail from downloading web bugs and any other items that would otherwise come from some remote server.

Other -----------------
- Windows 7 : Email Phishing Protection
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 3) - Managed Windows Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 2) - Self-Hosted Services
- SOA with .NET and Windows Azure : Service Hosting with WCF (part 1)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 2)
- SOA with .NET and Windows Azure : Service Implementation with WCF (part 1)
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 2) - Blocking Countries and Languages
- Windows 7 : Thwarting Spam with Windows Live Mail’s Junk Filter (part 1)
- Windows 7 : Configuring Windows Defender to Scan Email
- Windows 7 : Protecting Yourself Against Email Viruses
- Windows 7 : Understand Internet Explorer’s Advanced Security Options
- SOA with .NET and Windows Azure : WCF Services - Overview
- SOA with .NET and Windows Azure : Web Services (ASMX and WSE)
- Windows 7 : Enhancing Your Browsing Security (part 6) - Managing Add-Ons
- Windows 7 : Enhancing Your Browsing Security (part 5) - Encoding Addresses to Prevent IDN Spoofing
- Windows 7 : Enhancing Your Browsing Security (part 4) - Thwarting Phishers with the SmartScreen Filter
- Windows 7 : Enhancing Your Browsing Security (part 3) - Changing a Zone’s Security Level
- Windows 7 : Enhancing Your Browsing Security (part 2) - Adding and Removing Zone Sites
- Windows 7 : Enhancing Your Browsing Security (part 1) - Blocking Pop-Up Windows
- Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 4) - InPrivate Browsing and Filtering
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us