Dennis Faas's picture

Creating Distribution Lists: MS Outlook

Setting up a distribution list in your Personal Address Book or Outlook Address Book is relatively easy. You can create a distribution list using addresses from multiple address books, which means, that you could include addresses from your Contacts ... folder and Personal Address Book. You can also include addresses of different types such as Internet addresses and Exchange Server addresses. Usually it's easiest to set up a distribution list if all the addresses that will be included already exist, but you can enter addresses on the fly if necessary. Follow these steps to create a distribution ... (view more)

Dennis Faas's picture

How to Send an Email to Undisclosed Recipients

Have you ever wanted to send an email to a group of people -- but need to prevent the individuals in the group from seeing each other's email addresses? You can do this by sending an email to "undisclosed recipients". To do so: Launch your email ... program, and click the button to create a new email message. In the 'To' address field enter 'Undisclosed Recipients' followed by your e-mail address in braces. For example: 'Undisclosed Recipients ' Side note: If you leave the TO: field blank, the email may bounce as some service providers may filter mark the mail as spam. In the BCC (Blind ... (view more)

Dennis Faas's picture

Trace the origin of an email abuser?, Part 2

Since yesterday's article on Tracing the Origins of an Email Abuser through IP addresses, I have received two interesting comments from Readers. The first message comes a user named 'Luvaas', who writes: " Dear Dennis, I suspect that someone has ... accessed my online cell phone account and has snooped around my phone records. I have a pretty good idea who did it, but the phone company tells me that they have no way they can trace this individual. Any ideas? " Side note: IP address stands for Internet Protocol. All computers connected to the Internet have a unique IP address, which is ... (view more)

Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)


Subscribe to RSS - addresses