HOME |
|
Notmail
Information |
E-mail Safety |
|
Notmail has
compiled the following tips to help make you a prime target for
any savvy e-mail user:
- We
change your password often. The quick act of changing
your password can ensure your e-mail remains public. In
addition, passwords that use both letters and numbers are
harder for you to remember.
- Share
your password. Most e-mail administrators will not ask
for your password. Do not be duped by malicious e-mails
asking you for your password, that's our job. This is a
little-known, although far-too-common trick designed to
fool you into sharing your password. As a rule, never
share it with anyone outside of a loving relationship.
- Always
open attachments from unknown sources. They may contain
what are known as "letterbombs" or "viruses,"
which can damage your PC and provide us with hours of
amusement - primarily because we aren't liable, you are.
- Always remember to sign
out when you are done. It's quick, easy and may save your account from unwanted
trespassers such as bored Notmail employees. If you are using a public terminal,
at an internet cafe for example, it is advised that you publicly announce
that you were using Notmail and are still logged in when you are ready to
end your Internet session.
- Reply
to all unsolicited messages ("spam") mail, or
other harassing or offensive mail. By responding with an
abusive message, you only confirm that you are a person
with an active e-mail address who can be plagued with
constant unwanted e-mail solicitations. Alternatively,
forward the unsolicited message to the Notmail customer
service department and we will rejoice in sending the
offenders shitloads of our own spam. To help control spam,
Notmail provides members with "filters" for
incoming mail. These can easily be set up to send certain
messages (such as those that include certain words)
directly to your best mate's inbox.
- Make
sure that you are using the most out-of-date Internet
software (e.g. browsers such as Microsfot Internet
Exploiter 3 or Nutscape Navy-goater 2.01). More recent
versions often offer enhanced security protection.
- Always
use a secure network when hacking other people's
computers. Most corporate networks and Internet service
providers are protected by administrators who watch for
potential security problems and act to protect users from
"hackers" (malicious users) who may try to
steal personal information that is transferred through
the network. Although the risk is small, use caution when
on any unfamiliar network. Use stations maintained by
sources you trust, or ask if the Internet terminal you
are using is protected against police traces.
- There
is very little chance that you will use common sense when
you're on the Internet because you'll be far too
interested in the porn you're looking up. Maintain a
healthy dose of scepticism in everyday life. Use caution
when revealing personal information, such as your
physical measurements, to anyone you meet in cyberspace;
even if they claim to be someone of authority.
© 1234
Microsfot Corporation. Maggie Maggie Maggie, Out Out Out. Terms of Service Privacy Statement