Yes another post for today.
I found the information regarding the use of Curtin Uni logo, it was hiding in someone's blog. see LavaTiger. (gee they make it difficult to find things at the uni.) This ties in with my post on the future direction of emails see post. The collective working as a group is far more efficient than the individual. I'm sure I saved lots of time not searching the Curtin site to thoroughly but getting the info from another NET11'er who was luckier in their searches than I was. Great work LavaTiger!
Individual thought wins again, or is that collective?
Showing posts with label email. Show all posts
Showing posts with label email. Show all posts
Thursday, April 2, 2009
Wednesday, April 1, 2009
email part 6, the future?
I attended a meeting last night at the Canberra Branch of the Australian Computer Society where they held a talk on Web 2.0 and the future direction of email. The speaker, Ralph Dermuth, Director of Technology Sales SW service support, Asia Pacific at IBM Software Group, presented a strong argument that emails are on the way out. He indicated that the group working as a collective community was much stronger than the individual working on email in one-to-one contact. He gave a few examples but the most interesting point he presented was an employee at IBM decided that emails were not an efficient way to combine work and communication, so he decided to stop using emails and created an internal blog (not for public viewing). He used this blog as a communication channel, everyone could see what he was working on and could also contribute to the work as a group. He said the main benefit of this was to generate a community that supported each other. If a question was asked by a contributor in the comment area of the blog, anyone could provide the answer, the support gradually grew which provides a diverse range of suggestion and answers that they claim keeps IBM innovative. Apparently this form of communication was particularly successful when people were away from work.
The speaker then went on to talk about how kids use email, they interviewed a number of them and the most common answer was, they use email to contact their parents, apparently the older generation don't chat or Skype. I feel so old but privileged, I use Skype to keep in contact with my kids at school.
He then went on to say web 3.0, the "meshing" of web 2.0 technologies is the next step in enhancing communication tools. The main problem people encounter today with web 2.0 services such as Flickr, blogging and other web user contribution applications is that they are very isolating, they don't cross over and work together. "Meshing" will bring all these communities together to allow for greater interaction.
It was very interesting presentation but it did leave me feeling that I've missed the boat and was trying to swim in the wake of a ocean liner.
I'm not sure how to reference this as I said it was a presentation and the notes on APA referencing 2008 don't give details for this type but I'll give it a go, see below.
References
Ralph Dermuth, (2009). Enterprise 2.0, presented 31 March 2009, 7pm at the Southern Cross Club, Canberra.
The speaker then went on to talk about how kids use email, they interviewed a number of them and the most common answer was, they use email to contact their parents, apparently the older generation don't chat or Skype. I feel so old but privileged, I use Skype to keep in contact with my kids at school.
He then went on to say web 3.0, the "meshing" of web 2.0 technologies is the next step in enhancing communication tools. The main problem people encounter today with web 2.0 services such as Flickr, blogging and other web user contribution applications is that they are very isolating, they don't cross over and work together. "Meshing" will bring all these communities together to allow for greater interaction.
It was very interesting presentation but it did leave me feeling that I've missed the boat and was trying to swim in the wake of a ocean liner.
I'm not sure how to reference this as I said it was a presentation and the notes on APA referencing 2008 don't give details for this type but I'll give it a go, see below.
References
Ralph Dermuth, (2009). Enterprise 2.0, presented 31 March 2009, 7pm at the Southern Cross Club, Canberra.
Saturday, March 21, 2009
List-part 4 & Email part 5
Email security and Lists
Oh-My, Oh-My, Oh-My I don't believe it, I found a useful List service, www.gnupg.org. It's a site for open source software that improves the security of electronic communications. Yes, I now subscribe. Subscription was not through that insidious Topica but by stumbling upon the site while searching for useful information.
First observation, posted Wednesday, 4 March.
Now this is the last post for the day, it's a beautiful sunny Saturday afternoon and I could be outside enjoying the sun. This supports my First Thoughts about Blogs.
Oh-My, Oh-My, Oh-My I don't believe it, I found a useful List service, www.gnupg.org. It's a site for open source software that improves the security of electronic communications. Yes, I now subscribe. Subscription was not through that insidious Topica but by stumbling upon the site while searching for useful information.
First observation, posted Wednesday, 4 March.
Now this is the last post for the day, it's a beautiful sunny Saturday afternoon and I could be outside enjoying the sun. This supports my First Thoughts about Blogs.
Email part 4
Tracing emails
After reading a post on the Blackboard tracing emails by one of the beautiful people in the NET11 group, I decided to follow this through further and visit the suggested sites, www.learnthenet.com and www.johnru.com. Now I don't trust every site I visit (cynic), so I also my own searches and found similar information on the Australian Department of Broadband, Communications and the Digital Economy, so I guess email security is a problem. (not another)
Well it opened my eyes. This was one of those things I've been intending to, or as the Aussie's say gonna address for sometime. It would appear the easy way to fix the problem is to encrypt the email, "Encryption-based email software packages use a technique known as public key cryptography to scramble messages so that only the authorised recipient can read them". I must encrypt soon. However, with all the email noise out there I think it would be unlikely that my emails are intercepted unless I'm being singled out.
So putting it to the test I tried to ping an IP address I received from a spam email but had no luck. They must be masking their real IP address.
Not actually sure what this achieved because I'm at a dead end, just thought it was interesting.
After reading a post on the Blackboard tracing emails by one of the beautiful people in the NET11 group, I decided to follow this through further and visit the suggested sites, www.learnthenet.com and www.johnru.com. Now I don't trust every site I visit (cynic), so I also my own searches and found similar information on the Australian Department of Broadband, Communications and the Digital Economy, so I guess email security is a problem. (not another)
Well it opened my eyes. This was one of those things I've been intending to, or as the Aussie's say gonna address for sometime. It would appear the easy way to fix the problem is to encrypt the email, "Encryption-based email software packages use a technique known as public key cryptography to scramble messages so that only the authorised recipient can read them". I must encrypt soon. However, with all the email noise out there I think it would be unlikely that my emails are intercepted unless I'm being singled out.
So putting it to the test I tried to ping an IP address I received from a spam email but had no luck. They must be masking their real IP address.
Not actually sure what this achieved because I'm at a dead end, just thought it was interesting.
Friday, March 13, 2009
Email part 3, Opening the attachment 'big money to be made'
3. In what ways can you ensure that an attachment you send will be easily opened by the receiver?
Opening attachments can bite you on the computer bum, so be careful!
To ensure the recipient is always able to open attachments, you must first offer them something amazing.
I was toying with the idea to include the following in the subject line:
But getting back to it.
Format of attachments
To ensure the recipient can open any of my attachments I will usually only send pdf files. If I suspect the person has limited experience in using computers I will include the url to download the Adobe Acrobat Reader with a short explanation of how and why. http://www.adobe.com/au/
If I'm forced to use something other than Acrobat I will first determine which format they can accept before I send the email eg MicroSoft Word, Excel and so on.
Encoding
As suggested in Module Two notes "First: communicate about your computer systems. Sometimes, when you expect to send attachments, particularly to users whom you suspect may not be as knowledgeable as you about attachments, you need to seek information from them and to assist them in dealing with the attachment."
I would think it would be highly unlikely that many people know anything about encoding email messages or its purpose, so I would certainly not be contacting the recipient as my first action. I would either follow up the original email with a phone call or send another email without the attachment and ask if they received the first successfully. Bothering people about something that doesn't interest them is just likely to annoy them. (Hey, if I don't like someone I should change the encoding on my email.)
When the encoding fails
Below is a picture of my beautiful dog after a swim at the beach, the image of Lizzy was correctly encoded to show the jpg as intended.
Below is the email opened with a text editor that shows the picture as ASCII text.
"e-mail messages can contain only text information, and attachments aren't text" howstuffworks, http://communication.howstuffworks.com/email5.htm
Because the file I was emailing was not text, the email software is required to encode the image before sending, the encoding used was MIME (Multipurpose Internet Mail Extensions). If the receiving email software is using different encoding such as, uuencode, Base64 or BinHex the image will not render and you will need to do some heavy maths or some creative thinking to interpret the attachment. Below is a sample of the same image of Lizzy but opened in a text editor. The text editor is only a basic word processor and will not interpret code or render the image.
If that fails I could format the attachment in html and place it directly into the body of the email, or just use ASCII text in the body of the email, assuming there are no images.
Of course there is always fax, sail mail, carrier pigeon or I could get on my bike and start peddling. I just hope its not overseas because I may need a snorkel.
Opening attachments can bite you on the computer bum, so be careful!
To ensure the recipient is always able to open attachments, you must first offer them something amazing.
I was toying with the idea to include the following in the subject line:
- love from
- easy money from Nigeria
- increase the length of your nose
- free Viagra to help the dead stay stiff
- update your details from the banks of the world
- secure your place in the after world
But getting back to it.
Format of attachments
To ensure the recipient can open any of my attachments I will usually only send pdf files. If I suspect the person has limited experience in using computers I will include the url to download the Adobe Acrobat Reader with a short explanation of how and why. http://www.adobe.com/au/
If I'm forced to use something other than Acrobat I will first determine which format they can accept before I send the email eg MicroSoft Word, Excel and so on.
Encoding
As suggested in Module Two notes "First: communicate about your computer systems. Sometimes, when you expect to send attachments, particularly to users whom you suspect may not be as knowledgeable as you about attachments, you need to seek information from them and to assist them in dealing with the attachment."
I would think it would be highly unlikely that many people know anything about encoding email messages or its purpose, so I would certainly not be contacting the recipient as my first action. I would either follow up the original email with a phone call or send another email without the attachment and ask if they received the first successfully. Bothering people about something that doesn't interest them is just likely to annoy them. (Hey, if I don't like someone I should change the encoding on my email.)
When the encoding fails
Below is a picture of my beautiful dog after a swim at the beach, the image of Lizzy was correctly encoded to show the jpg as intended.
Below is the email opened with a text editor that shows the picture as ASCII text.
"e-mail messages can contain only text information, and attachments aren't text" howstuffworks, http://communication.howstuffworks.com/email5.htm
Because the file I was emailing was not text, the email software is required to encode the image before sending, the encoding used was MIME (Multipurpose Internet Mail Extensions). If the receiving email software is using different encoding such as, uuencode, Base64 or BinHex the image will not render and you will need to do some heavy maths or some creative thinking to interpret the attachment. Below is a sample of the same image of Lizzy but opened in a text editor. The text editor is only a basic word processor and will not interpret code or render the image.
If that fails I could format the attachment in html and place it directly into the body of the email, or just use ASCII text in the body of the email, assuming there are no images.
Of course there is always fax, sail mail, carrier pigeon or I could get on my bike and start peddling. I just hope its not overseas because I may need a snorkel.
Thursday, March 12, 2009
Email-part 2, you can't say no to "cc" or "bcc" but you can "reply"
2. In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all functions of email?
How useful is "cc"—carbon copy, "bcc"—blind carbon copy and the "reply" button.
In the past I have only used "cc" and "bcc" sparingly, mainly because I had no reason to and I never really understood the difference between using the multiple "to" functions and "cc" but from reading Module Two notes all was explained. You can quickly forget that there are such things as email ethics hiding behind the computer screen. I have taken points from this lesson and I trust will make me a better person. (If not, at least abuse the system more efficiently.)
In brief
The "to" function is to direct the communication at a particular person or persons.
The "cc" function is just to spread the love further and keep others informed—it may not necessarily require the receiver to action on receipt. It's usually for 'your information only'—FYI.
The "bcc" function is for ratting on your work mates to your boss without them knowing you have passed on the same information in one easy process. This is probably used in ASIO a lot. In my experience it's also used in "request for quotes" or "request for tenders", when the sender is required to keep details of who else is invited to quote, secret.
The "Reply" function is when I need to keep a copy of the previous email within the body, hence "quoting" or maintaining the thread of the conversation in the one document. or. When I'm just too lazy and I need to quickly respond to someone, even if the threads don't follow and the conversation wonders all over the place.
I have received emails from people that I suspect may have "bcc" in the original email and have often wondered if that information can be extracted. Please leave a comment if you can help me out.
How useful is "cc"—carbon copy, "bcc"—blind carbon copy and the "reply" button.
In the past I have only used "cc" and "bcc" sparingly, mainly because I had no reason to and I never really understood the difference between using the multiple "to" functions and "cc" but from reading Module Two notes all was explained. You can quickly forget that there are such things as email ethics hiding behind the computer screen. I have taken points from this lesson and I trust will make me a better person. (If not, at least abuse the system more efficiently.)
In brief
The "to" function is to direct the communication at a particular person or persons.
The "cc" function is just to spread the love further and keep others informed—it may not necessarily require the receiver to action on receipt. It's usually for 'your information only'—FYI.
The "bcc" function is for ratting on your work mates to your boss without them knowing you have passed on the same information in one easy process. This is probably used in ASIO a lot. In my experience it's also used in "request for quotes" or "request for tenders", when the sender is required to keep details of who else is invited to quote, secret.
The "Reply" function is when I need to keep a copy of the previous email within the body, hence "quoting" or maintaining the thread of the conversation in the one document. or. When I'm just too lazy and I need to quickly respond to someone, even if the threads don't follow and the conversation wonders all over the place.
I have received emails from people that I suspect may have "bcc" in the original email and have often wondered if that information can be extracted. Please leave a comment if you can help me out.
Wednesday, March 11, 2009
Email part 1
1. What information about a user's email, the origin of a message, and the path it took, can you glean from an email message?
Email task—death to all spammers. As you may have guessed from the title, my first sample is from your happy fiend to spammer. Yes I hate them. One day the web will takes its revenge!
Its obvious the email above is from deprived person only set out to cause trouble, just look at the garbage in the address block. I find the best way to quickly and easily identify who the email is from is to use filters that automatically presort any new mail. Any incoming email that bypasses this first stage of sorting is either a new contact or spam—this method is a great time saver.
The next screen shot is from an email that has been automatically forwarded from the beautiful people in NET11 through my uni email to my main email account.
So, which path? Follow the yellow brick road. Before I started this question I had a look at the Discussion Board which just confused me more.
I'm not to sure in which direction I should take this question. The two possible answers I can see are:
If it was only that easy to trace spammers the web would be a quieter place.
more soon.
Email task—death to all spammers. As you may have guessed from the title, my first sample is from your happy fiend to spammer. Yes I hate them. One day the web will takes its revenge!
Its obvious the email above is from deprived person only set out to cause trouble, just look at the garbage in the address block. I find the best way to quickly and easily identify who the email is from is to use filters that automatically presort any new mail. Any incoming email that bypasses this first stage of sorting is either a new contact or spam—this method is a great time saver.
The next screen shot is from an email that has been automatically forwarded from the beautiful people in NET11 through my uni email to my main email account.
So, which path? Follow the yellow brick road. Before I started this question I had a look at the Discussion Board which just confused me more.
I'm not to sure in which direction I should take this question. The two possible answers I can see are:
- Hit the road Jack and take the IP path—as talked about on the Blackboard which I had to think about how to extract the meta data out from the head of the email. I started as usual to search on Google but this proved fruitless and I got bored because most of the searches came up with PC suggestion—pointless for a Mac user. I then had a brilliant idea to just save an email to the desktop as an html file and open that in a text editor. Bingo, it worked. See the results below. ps I'm still trying to decode the info but I can see IP addresses and domain names so I trust this is correct.
- The path can be traced if the user has forwarded the mail to another participants. This is simple providing the user has invoked the "forward" function in the email software which just appends the new message to the old, just like chain mail. To find, just scroll down within the body of the email and look for "quoted" information in the email and bingo, info revealed.
It views very must like threads on the Discussion Board.
If it was only that easy to trace spammers the web would be a quieter place.
more soon.
Subscribe to:
Posts (Atom)