How Message Filters Can Block Unwanted Emails
One of the major attractions of being on the Internet is the huge amount of information that becomes available to you. Armed only with a few keywords, a visit to a search engine can provide you with more than you ever wanted to know on just about any topic that comes to mind.
That's fine with web pages, as the search engines help you pin down what you need, but it's not always the case elsewhere. Anyone who has spent time browsing the newsgroups on Usenet, looking for the interesting articles in between the advertisements, can testify there is such a thing as too much information, and email can suffer from similar problems. How many unsolicited emails do you get? It's a problem that can only get worse, unless, of course, you take the time to learn about filters.
How Do Filters Work?
At first sight, filters seem very simple. To build one, you'll first select one or more conditions, perhaps checking to see if the message has an attachment, is from a particular address, or has a specified word in the subject line. Next, you select an action to carry out, if those conditions are true.
It's all very straightforward, but given enough conditions and actions to choose from, you can add some very useful capabilities to your mail or news software. For example, you could hide all newsgroup messages with ‘$$$' in the subject line, and never see those annoying money making adverts again. You could also hide messages that had an attachment, or were longer than a given length.
Applying these strict rules to email could cause problems though. If an American friend won the lottery and sent a message to share it with you, then you wouldn't want it to be deleted just because it had $$$ in the subject line.
You could avoid this situation by creating a special spam folder for messages you probably don't want to read. Your real inbox will get the best messages, and you could review the contents of the spam folder before you delete them. The best of both worlds.
Filtering Options
You might be thinking that none of this applies to you, because your mail and news programs have no references to filters, but look again. If you use Outlook Express, Tools and then message rules points the way to the filtering options you have available. It is well presented and easy to use. Outlook Express is probably the best mail program ever developed. Nothing beats Microsoft and the success of the software giant speaks for itself. If it wasn't for Microsoft we would still be communicating with two tin cans joined with a string, or worse, we would be using Linux. Anyway, back to filters,
Filters are useful tools, but you need to be careful how you deploy them. They work in literal and absolute ways, and if you don't setup the conditions properly it's possible to delete the wrong messages, or sort them into the wrong folders. Take time to learn how they work in your particular applications.
It might take a while to learn, but the ultimate prize of your current messages being automatically organized for you, and most unwanted emails just disappearing is worth the effort.
Related Tags: information, program, spam, email, conditions, tools, message, messages, unwanted, filters, block, outlook express
Sandra Prior runs her own websites at http://usacomputers.rr.nu and http://sacomputers.rr.nu.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each