This is an illustrated, step-by-step tutorial on how to set up a free CorrLinks e-mail account and use it to e-mail federal prisoners.
In this article , I share a personal experience with a 419 phishing e-mail fraud. I only include her picture to show how deceptive this scam can be. Keep this one on the down low, as she requested.
There are several different ways to deal with multiple Gmail accounts, including multiple sign-in, delegation, and a browser plugin. Find out the one that suits your needs best here.
How to write secret messages and pass them without getting caught. Send secret messages by email or text, encode messages, or make up a secret language.
How to make an email you can use over and over as a template or boiler plate or copy etc in Lotus Notes 8.5 or better. Great for mail you need to repeat and send repeatedly more than once on LotusNote
The first step in stopping internet-based scams is learning how to read the warning signs of something fraudulent. In this article, I use an example of a spammy e-mail I received to show you how to sniff out scammers.
This article explains spam and how to setup Yahoo email to mark and unmark email as spam. In addition, learn how companies get your email address and how to block spam in your email inbox.
End your email, cover letter, or other communication with a bang, not a whimper! Whether formal or informal, business or personal, here are many examples of ways to close your letter appropriately.
Why not finish up an email with a funny signature? Try one of these humorous, witty signatures for the perfect sign-off on your outgoing messages! "After all is said and done, more is said than done."