Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and programs created to rescue us from the deluge of unwanted e-mail! There is practically a "solution" for everything. But as with most online "solutions" filters and programs are only tools that users need to make some effort to use properly to reap the benefits.

You have to learn how to use these programs to your advantage or you can experience the unexpected downside. How can there be a downside when we're talking less spam you say? Unfortunately, all too often legitimate and expected e-mails are being eaten by filters and are ending up in the trash!

Twice this week I received terse e-mails from new clients awaiting my response on certain issues. Because they were new to working with me, they didn't know that I usually respond within an hour to most e-mail. My responses were not returned as "undeliverable" so what happened? Where are they? In both instances I called my clients only to find my messages had inadvertently landed in their junk or trash folder because of their ISP's filtering systems.

When communicating with clients and in my day-to-day communications, I do not go to extremes to alter certain words that may trip filters in my day to day communications. With folks I know, that shouldn't be an issue because they are supposedly expecting my e-mail. In addition, I always instruct new clients and subscribers to add me to their address book, approved or white list.

Plus as I am sure you'll agree, you've seen all those funky ways of spelling certain words with characters or spaces that are unnatural. I believe they ruin the flow of your message because the reader can't help but take pause to notice.

Before you send off a terse e-mail complaining or assuming no response, be sure you have covered the following:

1) When you know you will be communicating with a specific person on a regular basis, make sure you add them to your approved list or address book as soon as possible. Many onliners now use Web based e-mail such as Yahoo! and MSN that allow them to control who they receive e-mail from. Just as the majority of ISPs now give you the ability to filter e-mail based on level of spamminess or by adding e-mail addresses to your list so they can get through. Be sure to use these tools to avoid trashing wanted e-mail.

2) Same goes for Web sites or eZines you sign up for. Add their dot com to your list as soon as you sign up. Most legitimate eZines use a double-opt in subscription process that requires you respond or click on a link within an e-mail from them before you get formally added to their list. If you don't get that e-mail to respond to it-you will not be added.

3) Before you empty your trash or junk folder-go through the trash! Take a quick peak and look at the Sender: and Subject: fields to see if names are familiar or for a topic that is expected. Otherwise you risk wanted e-mail going out with the trash!

Three simple little steps can help ensure the e-mail you do want lands in your inbox. The e-mail you are waiting for may have already arrived!

About the Author:
Judith Kallos is an authoritative and good-humored Technology Muse who has played @ http://www.theistudio.com for over a decade. Check out her popular Software, Programming and Web Design Cheat Sheets @ http://www.theistudio.com

shuttle from O'Hare Bingham .. Lockport Chicago limo O’Hare
In The News:

Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.
The European Space Agency's Euclid space telescope was going through preliminary tests in September 2023 when it captured images of an Einstein Ring in a nearby galaxy.
Tech expert Kurt “CyberGuy" Knutsson says hackers are using Microsoft Teams for phishing, vishing and quishing via social engineering.
Red light camera tickets: Not liable to ID the driver; some are fishing expeditions. Tech expert Kurt “CyberGuy" Knutsson helps you fight back against tricky fake tickets.
The apps collecting the most data about you are among the most widely used. Kurt the CyberGuy takes a look at 20 of these apps and how you can protect personal information.
AST SpaceMobile of Texas is developing the world's first global cellular broadband network that can connect directly to your smartphone without special equipment.
Community Health Center, a Connecticut-based healthcare provider, has disclosed a recent data breach affecting over 1 million people in the U.S.

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Spam Filters Explained

What do they do? How do they work? Which one... Read More

Im Guilty Until Proven Innocent

No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

Spam with Typos: Why Do They All Have Spelling Errors?

A friend asked me: I don't get it. Why do... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

The Anti Spam Challenge ? Minimizing False Positives

Email is the quintessential business communication tool, so when it... Read More

Fight Spam and Fortify Your Web Site with RSS

RSS is the answer to the Spam epidemic of the... Read More

Mishawaka limo O'Hare ..