Eudora will do what you describe below, if I understand correctly what you are
asking. It also has an excellent filtering system for automatically moving
incoming messages into individual mailboxes. The available filtering criteria
are a broad set, not simply the message sender (which is, of
comp.mail.eudora.ms-windows is a USENET news group that provides excellent
support for Eudora, and while I use Forte Agent to read newsgroups, I think
that they can be read / posted to from a browser, although I've never tried it.
Current activity on the newsgroup is maybe one thread per day.
Yes, but ...
I think he wants to copy only the five or so useful headers, along with the
body text. Show all or details often displays all of the headers (e.g.,
what the blah, blah toolbar button in Eudora does), including all of the
headers that display routing information and timestamping
On Thu, Dec 4, 2008 at 9:57 AM, Tom Piwowar [EMAIL PROTECTED] wrote:
There is a long history on the internet of folks using aliases for any
of a variety of reasons and now a jury has ruled that's illegal and a
misdemeanor.
Some of us are not as tough as you and would find a year in jail
Where would you draw the line? Suppose someone wanted to sue civilly for
misrepresentation on a blind date arranged via the internet? Do you want
adults who have sexually suggestive chats with underage teenagers to be
traced and arrested, even if (or prior to) engaging in any actual behavior
or
FYI: I realize I am preaching to the choir 9no offense Rev.), for the
most part, but I received a Phishing attempt this morning purporting
to be from Cox Cable. Subject line Confirm and upgrade your account,
message Dear valued Cox User,
This is to inform you that we are of current plan to
My wife just got a new MacBook Pro. This is our first Mac running OS X
10.5. What is a good resource for using and utilizing Time Machine?
Thanks
Steve
*
** List info, subscription management, list rules, archives,
At 11:00 AM -0500 12/5/08, Stephen Brownfield wrote:
My wife just got a new MacBook Pro. This is our
first Mac running OS X 10.5. What is a good
resource for using and utilizing Time Machine?
Take Control of Easy Backups in Leopard
http://www.takecontrolbooks.com/leopard-easy-backup.html
A
It also depends on whether the alias is clearly an alias or an attempt to
defraud. I like to be slightly anonymous on usenet and in forums. There
is a whole class of people who have been aliases there whole posting
careers.
Unfortunately this is an assumption without merit. It's violating
I think he wants to copy only the five or so useful headers, along with
the body text.
Gmail.
*
** List info, subscription management, list rules, archives, privacy **
** policy, calmness, a member map, and more at
My wife just got a new MacBook Pro. This is our first Mac running OS X
10.5. What is a good resource for using and utilizing Time Machine?
It is entirely possible to use Time Machine with very little knowledge.
Get a large external drive that is 2 to 3 times larger than the total of
your files
Interesting attitude expressed by Mac users toward other Mac users who do
get hit by a virus...
The only few real exploits required downloading the malware and
installing it with an administrator password. Whoever is bright enough to
do that with software automatically downloaded from the 7th
Yes, Gmail (or some other modern in the cloud AJAX email app) may be
_part_ of the answer. But, given that they all store multi-gigabytes
of prior emails, I can't imagine why he would still want to go to the
hassle of copying and pasting into Word documents. Anyway, I tried,
but he doesn't seem to
Wow a reader at macworld...must be an expert. How about an article from
cnet?
http://m.zdnet.com.au/139239586.htm?redir=1
That cnet piece is from 2006 but the same problems are still within os x,
not the specific security threat, but in general other known/unknown
vulnerabilities.
How about a
At 05:58 PM 12/05/2008 -0500, Tony B wrote
Yes, Gmail (or some other modern in the cloud AJAX email app) may be
_part_ of the answer. But, given that they all store multi-gigabytes
of prior emails, I can't imagine why he would still want to go to the
hassle of copying and pasting into Word
Tom didn't mention that a firewire connection is best between the
computer and the external hard drive. Since your wife's new machine is
a laptop, it will be necessary for her to connect the back-up drive
from time to time, in order for Time Machine to do its job. I just got
a new MacBook
Why is WinVista ignoring my hosts file? As a test I've added
www.yahoo.com to the end (behind all the Spybot entries), but despite
reboots and disabling the DNS service, I can still ping and browse to
the site. I can also ping the sites entered by Spybot. TIA
Vista Home Premium SP1
NM. I finally stumbled blindly into the solution. If you can describe
today's last 6 hours as a blind stumble. :)
My hosts file at noon today when I started:
---
127.0.0.1 localhost
::1 localhost
# Start of entries inserted by Spybot - Search Destroy
On Fri, 5 Dec 2008, Tony B wrote:
NM. I finally stumbled blindly into the solution. If you can describe
today's last 6 hours as a blind stumble. :)
My hosts file at noon today when I started:
---
127.0.0.1 localhost
::1 localhost
# Start of entries inserted
Uh-oh. I wonder if this could be trouble in the future? But what the
heck am I supposed to do except delete it? And doesn't anyone else
have this in their Vista hosts file?
On Fri, Dec 5, 2008 at 11:11 PM, Vicky Staubly [EMAIL PROTECTED] wrote:
::1 is the IPv6 equivalent to 127.0.0.1, always the
20 matches
Mail list logo