Does blogging kill?

There are professions that are notoriously dangerous. Fishermen, pilots and loggers top the list of the professions with the highest fatality rates.
Calling the homes many bloggers work out of “the digital-era sweatshop,” the article raises the possibility that the deaths of two technology bloggers and the heart attack of another were caused.

Faxing with Asterisk PBX

In any organization, using the latest and most advanced technologies have become a must now. And when talking about the latest technology, no organization would want to miss on the older but effective technologies such as Fax. Fax for Asterisk gives Asterisk PBX — that supports a wide range of TDM protocols for the handling and transmission of voice over traditional telephony interfaces, and VoIP packet protocols such as IAX, SIP and H.323—the ability to send and receive fax over both telephone and VoIP connections.

Using Fax for Asterisk, you can send faxes from your desktop using your standard email client without any need to install any software on your desktop. It endows you with the ability to send and receive faxes to and from TDM and IP channels. It includes analog and VoIP fax capabilities to Asterisk VOIP PBX and develops fax-on-demand, fax-broadcast, desktop fax and fax gateway applications and services. Fax for Asterisk Read the rest of this entry »

Faulty Emails can Wreck your PC and Credibility

If your e-mail program allows you to preview the entire message before or while it is being downloaded, turn this setting off. Some e-mails can contain dangerous code that could unknowingly compromise your computer and leave you vulnerable to viruses, worms or worse! Check the options in your e-mail program for a way to disable the message preview pane.

Don’t ever respond to messages claiming to be from your bank, credit card company, or other financial institution, which ask for personally identifiable information such as card or account numbers, passwords, or other private information – even if the e-mail looks to have come from the actual company. It may be a hoax designed to get you to unknowingly part with crucial financial or private contact information, leaving you vulnerable to credit card fraud, identity theft or credit card theft.

Email Security via Phone Verification Codes

mobile phoneWe’ve already discussed the topic of email verification and why it is important for websites to use it when gathering email addresses. This email verification is different from phone verification of your email account.

Since passwords are often not enough to keep email accounts secure with people giving out passwords to friends and hackers doing their best to bypass this basic security measure, it is no wonder that people’s email accounts are often accessed by people other than the actual email account owner.

Phone verification is employed by email providers (and even other social websites) these days to tighten account security. It works by having the email provider send an automated message containing a verification code to the email owner’s phone. The verification code then has to be typed in before the email account can be accessed. While phone verification is not done every single time you log in, you can set your account to require this security whenever your account is being accessed in a computer you do not routinely used. It may be a simple security measure but it will surely reduce the wrinkles in your skin with you less worried about your email being hacked.

Photo Credit

Mobile Mail

Mobile emailMost mail service providers are offering the same service for the growing mobile users who rely on them for business and social use. Email is still one of the most prominent messaging method for businesses and individuals alike but maybe because it has the same nostalgic effect of traditional mail that has lessened in popularity in the past few years. Email though now more secure are still some of the most exploited forms of spreading malware and is still being used in scams and other criminal activities. Read the rest of this entry »

Sign Up with Free Mail

The first thing you can do while you are on the web is make use of the cheaper way of communicating with family and friends. Electronic mail has been heard here and there and it sure beats the rising costs of having to make long distance calls and waiting impatiently for your snail mail to arrive to its destination.

With free email, you can send a message in a couple of seconds. There are a lot of free mail accounts on the web:

1. Yahoo Mail
2. Gmail
3. AOL
4. MSN
5. Excite

There are a lot of other free mail sites you can use on the web. But it would be best to stick with the pioneers to avoid risks as sudden closure of sites.

Spammers Still Make Big Bucks

Image Source: caveyourtrolls.com

A report indicated that only ONE in 12.5 million junk mails usually end up as a SALE. But while this is relatively a small percentage, spammers make a lot of money out of annoying other people with their junk mails. Recently, researches have hacked themselves into a network of zombie PCs, actually controlled by the hackers, the network is called the ‘Storm’. Their intention was to keep track of the actual users that respond to the spam sent through emails and to monitor how much that particular campaign makes. They spent twenty six days attracting the infected pc’s users to a hoax pharmacy that promises to sell them fully guaranteed libido enhancer. The researchers sent a staggering 350 million messages. But they only got 28 response that was translated into a SALE. Overall, when they did the math, they came with $2 million a year stolen money from just about a million PCs at a given time.

Be Cautious of Sign-Ups with your Email

As far as other uses of our email is concerned, you have to consider that there will be times where we may eventually need it when signing up for a particular site. Newsletters and updates are common these days and for most of us, we have to provide emails as basis of authentication to a lot of site.

But the problem is that it may risky. They do say that they will not use our email in any form. But how about sending information that may soon become irrititating? It happens. Before you know it, your email box is full of newsletters and information that make your email a mess.

Compress Your Attachments

In cases where you have to send large files, you can always use the usual compression software such as Winzip or Winrar to save on space. The larger files sent as is will take a long time to download and worst, some may even linger in the mail server causing unnecessary space that may eventually lead for other incoming mails to bounce.

While some people would not be religious in checking their emails daily, these are factors that contribute towards clogging up your email box. The best way to go is to try and decrease the size of the file. Compressing them is just one of it.

Limit Your Attachments

We cannot avoid sending files, especially photos and images which will vary in size. Normally, free web mail puts a limit to these but as far as personal emails that come with the package service plans allow us to send larger ones.

This was the practice some time ago and today, most email providers, particularly the free web based ones, have increased the capacity of files to be sent. This stems from the fact that along with the growth of technology comes the increase in file size. While we want to avoid them, there are instances where we really cannot avoid sending them in these large formats.