Bookmark
PhireWare - Software - Web - MobileCube
phireware.com/software/web/mobilecube/#, posted 2011 by peter in download email free messaging mobile software toread
MobileCube is a simple and clean theme that fits perfect with the Roundcube Mail system. It includes mail, contacts, and calendar that displays it in a simple, yet elegant way. MobileCube works with RoundCube 0.3.1+ so if you have RoundCube set up and installed, download MobileCube today and try it out! It's free! We hope you enjoy it!
Bookmark
Mail::DKIM::Signer - search.cpan.org
search.cpan.org/~jaslong/Mail-DKIM-0.39/lib/Mail/DKIM/Signer.pm, posted 2011 by peter in development email free messaging perl software
This class is the part of Mail::DKIM responsible for generating signatures for a given message. You create an object of this class, specifying the parameters of the signature you wish to create, or specifying a callback function so that the signature parameters can be determined later. Next, you feed it the entire message using "PRINT()", completing with "CLOSE()". Finally, use the "signatures()" method to access the generated signatures.
Bookmark
SPF: Introduction
www.openspf.org/Introduction, posted 2011 by peter in email networking reference security spam
The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. More precisely, the current version of SPF — called SPFv1 or SPF Classic — protects the envelope sender address, which is used for the delivery of messages. See the box on the right for a quick explanation of the different types of sender addresses in e-mails.
Even more precisely, SPFv1 allows the owner of a domain to specify their mail sending policy, e.g. which mail servers they use to send mail from their domain. The technology requires two sides to play together: (1) the domain owner publishes this information in an SPF record in the domain's DNS zone, and when someone else's mail server receives a message claiming to come from that domain, then (2) the receiving server can check whether the message complies with the domain's stated policy. If, e.g., the message comes from an unknown server, it can be considered a fake.
Bookmark
DomainKeys Identified Mail (DKIM)
www.dkim.org/, posted 2011 by peter in email networking reference security spam
DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message while it is in transit.
The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for delivery. Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.
Bookmark
Dan Born - delatt
danborn.net/delatt/, posted 2011 by peter in conversion download email free software
delatt: Delete attachments. delatt strips attachments from email, and can optionally save the attachments to files. It will work with either mbox or maildir files.
It's great for archiving old email without wasting space on attachments and the extra HTML message parts that some MUAs attach.
Bookmark
SOGo: Open Source Groupware
www.sogo.nu/english.html, posted 2011 by peter in calendar collaboration email free linux messaging software sync
SOGo is fully supported and trusted groupware server with a focus on scalability and open standards. SOGo is released under the GNU GPL/LGPL v2 and above.
SOGo provides a rich AJAX-based Web interface and supports multiple native clients through the use of standard protocols such as CalDAV, CardDAV and GroupDAV.
Bookmark
How to Export Your Facebook Friends’ E-mail Addresses | Social Hacking
theharmonyguy.com/2010/11/05/how-to-export-your-facebook-friends-e-mail-addresses/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+theharmonyguy+%28Social+Hacking%29, posted 2010 by peter in backup cloudcomputing email howto online social
Last night, TechCrunch reported that Google will now require sites that import e-mail addresses from Gmail to also allow export of their data. The move was clearly aimed at Facebook, which has kept Google from accessing their users’ data. In response, many people have mentioned that while Facebook lets users download some data, they’re still not able to download an e-mail address book of their Facebook contacts. However, that’s not quite the case. Back in March, I published a guide to exporting data from Facebook using various tricks and FQL queries. Facebook has since made changes and added tools which have made the post a bit outdated, but much of the information still applies. In particular, I described using Yahoo’s contact import tool to download an e-mail address book for all your Facebook friends. This technique relies on a Facebook-approved feature and should not violate the site’s terms of service. A few specific steps have changed a bit, so I’ll recap the process here.
Bookmark
The case of the 500-mile email
www.ibiblio.org/harris/500milemail.html, posted 2010 by peter in email history humor networking physics statistics
"We can't send mail farther than 500 miles from here," he repeated.
"A little bit more, actually.
Call it 520 miles.
But no farther."
Bookmark
Guide to CSS support in email clients - Articles & Tips - Campaign Monitor
www.campaignmonitor.com/css/, posted 2010 by peter in css design development email html reference webdesign
Designing an HTML email that renders consistently across the major email clients can be very time consuming. Support for even simple CSS varies considerably between clients, and even different versions of the same client.
We’ve put together this guide to save you the time and frustration of figuring it out for yourself. With 23 different email clients tested, we cover all the popular applications across desktop, web and mobile email.
Bookmark
Gravatars: why publishing your email's hash is not a good idea
www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea, posted 2009 by peter in email hack privacy security spam
The guys at gravatar.com offer a nice service: for website owners, they let you automatically associate an avatar to your users, through the user's email address. The users who register to gravatars.com are able to change their gravatar and the change will be visible on all gravatar-enabled websites where they registered with the same email.
...
There is a piece of information which must be made public, though. It's this 32 char string which serves as a token for your web browser to retrieve the right image. How much information are we leaking to the bad people inhabiting the internet? Can that key be used to retrieve our email?
|< First < Previous 21–30 (36) Next > Last >|