This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Email Etiquette – More Than Just Manners
by: Angela Nielsen
We all understand the importance of good “people skills” when it comes to our interpersonal communication – it helps us get the results we need. Our communication determines the opinion others have of us – knowledgeable or ignorant, pleasant or rude, professional or immature. Most of the time this is in face-to-face or telephone conversations where we have some control over the impression we make on others.

When it comes to netiquette (Network Etiquette), it’s not as easy to control how others perceive us, and yet it’s even more important. Why? Because what you write and how you use email can affect whether your email gets delivered, read, or responded to – and what that response is! In addition, there are numerous “technology traps” that are easy to fall into. Have you ever seen someone accidentally send an angry or sensitive response to a huge group of people by using the ”Reply All” key?

And before you say to yourself "I already know" and stop reading this article, realize that every single one of us could benefit from a few simple reminders on the proper use of email, not just from a personal view but also from a business standpoint. If you're doing business on the internet – and using email to communicate with your customers – then this article is a must read for you! You may already know many of these tips, but even the most experienced user will find a few rules you were not aware of or have fallen into the habit of breaking.

Think, write, and think again.
Email is a static, one-way channel – unlike live communication, there’s no way to get immediate feedback (from facial expressions or voice responses) to know if we are being effective or even understood. So think twice before hitting the send key. Is there ANY chance that the recipient might misinterpret what you want them to understand? Do your thoughts come across as abrupt or angry? Could this email accidentally affect your reputation? The hastily written word may lack feelings and the true emotion you intended. You might be smiling as you type, but your note could come across as sarcastic or mean-spirited. Remember – there’s a person on the other end, not just a computer.

Use a meaningful subject line.
This is the first thing your reader will see, so use the space to help them understand the contents of the email even before they open it. Using the same rule from above, type in a subject that relates to the message you're sending, rather than leaving the subject blank. Without a subject line your note will probably be seen as another piece of junk mail – not everyone will recognize who you are just from your email address. Many internet service providers (ISP’s) filter out suspicious looking email, and a blank subject is a big red flag. Also, try to avoid generic words like "Hi" or "Check This Out" to avoid having the recipients spam or virus software delete your message!

The beginning, and the end.
Always use a salutation, even if it’s short. Start your message with "Hi", or "Hello", or "Dear", whatever works best for the intended recipient, and whatever reflects your personality. Think about this: when you call someone on the telephone, don't you say "Hello" before telling them what you want? Email messages should be no different. At a minimum, address the email to the person.

Don't forget the end of your message too! Always sign your messages with your name, and say "Thank You", or "Sincerely", or something else appropriate. You can even setup a signature in your email program that will automatically display your information at the bottom of every email message you send. For directions, use your email programs help file and do a search for signature.

Protect your recipient’s identity – use “To:”, “CC:” and “BC:” properly.
There are a few simple netiquette rules for using the address fields in email.

If your email is being sent to just one person or email address, place it in the "To:" field. This should be the person who is responsible for sending you a reply.

When your email is being sent to more than one person and all the recipients truly need to know who else is receiving it, put all the addresses in the “CC:” field.

For email sent to multiple recipients who have no real reason to know the names and email addresses of everyone else to whom it is being sent, put all the addresses in the “BCC:” field.

(Some email software requires at least one address to be placed in the “To:” field. Put your own email address in the “To:” section if this is required.)

By default, not every email program has the BCC field available for viewing. If you cannot see the Bcc field in your program, check your programs help file for directions.

Give memory a helping hand.
When replying to emails, include a copy of the prior notes you’ve traded with the person on the topic, don't just send a new one. I may receive 50 emails a day that need a reply and it’s not always possible to remember every single 'conversation' with every single person. Please don’t make your reader go looking through their ‘sent items’ folder or email ‘recycle bin’ to refresh their memory!

Use the ‘Read Receipt’ sparingly.
In some cases, it's crucial for both parties to know that a message was received. However, in normal day-to-day activities you should not request a read receipt for every single message you send. It's annoying to the recipient to have to click that pop up box every time they get your email. And it is an invasion of privacy. Don't forget – just because they have received it doesn't mean they have necessarily read it, so receiving a read receipt doesn't actually prove anything other than that the message was received. And for day to day communications, is that really necessary?

URGENT!
The boy who cried wolf. Do not send all your messages as URGENT, or HIGH PRIORITY. If your recipients keep receiving messages marked that way, then eventually the red exclamation point loses it's effectiveness – except to reinforce how important YOU think you are. Reserve these messages for those that are of utmost importance!

Avoid special formatting.
For your day-to-day messages, don't use colored email backgrounds, colored fonts, special fonts, images or other "pretty" type of formatting to your messages. Keep them clean – this makes it easier for the intended recipient to read them and reply. It's best to send messages in plain text to ensure everyone will be able to read them, since not everyone has their email set to receive html emails. You would be amazed at how bad your note may look to someone viewing their email on a handheld device or an older computer. By keeping your emails clean, they will also load much faster for the recipient!

Don’t SHOUT!
If you type in all capital letters, your reader will see this as yelling, or they will think that you were just too lazy to use proper text formatting. It’s also hard on the eyes – did you know that it takes longer to read something written in all caps than it does to read something that is properly formatted?

Proof, spell-check, and use proper formatting.
Poor writing skills are a direct reflection on you! And the reader never forgets the person who writes an undecipherable message. Spell checking will prevent most misspelled words, but you should always proof your email in case you've written the incorrect word (that was spelled correctly). For example, month and moth, where and were, all look correct to a spell-check program. Use proper capitalization, punctuation and formatting. Break your paragraphs when the subject changes, or if they become too long. Don't use excessive formatting (too much bold, too many exclamation points and question marks, etc.) Too much of anything will make your message harder to read. You want to make your message easily readable, as well as understandable. Proofread it to ensure it make sense, and never assume the reader knows what you mean, always spell it out for them. The time it takes to proof and spell check is minimal compared to the lasting impression you will make if you don't take the time.

Take the time to send a reply.
Even when someone emails you something that doesn't need a direct response, follow up with them in a timely manner just to let them know you received their message. It’s amazing how often people will ask for advice, and not even reply with a short “Thank you” when they receive their answer. A simple message telling the sender is sufficient. And this lets them know you did receive it, that it didn't just get stuck in cyberspace somewhere.

If they didn't request it, don't send it!
No matter what you think may be acceptable, you cannot email someone about your product/service without their permission. Unless they request that you send them an email, or you have previously done business with them, then it is illegal to send them an email, period. Any recipient can easily forward your email to their ISP and report you for sending unsolicited email messages (SPAM).

This report would result in the immediate removal of all your websites/email address from most servers. You would then join a list of “prohibited senders” meaning that servers would not allow any messages attached to your domain name to be received by their customers - the people you are sending your messages to.

You might be thinking, “but I get emails every day about products/services that I didn't request information about.” Sending unsolicited email messages (SPAM), is kind of like speeding. Lot's of people do it, but it is against the law, and no matter how long you may get away with it, you are bound to get caught!

Compress, Compress, Compress!
If you are sending an email with several large attachments, it is often better to send them in a few separate emails, so that you don’t send a document that is too large to even open. Or, you can try compressing your messages into a zipped file. It doesn’t reduce the size of images or pictures very much, but it works great for text, spreadsheet and program files. This is very easy to do, and will make your file size much smaller, and make the recipient much happier. Check out www.winzip.com (for those on pc).

Hoaxes as helpful hints.
If it sounds too good to be true, it probably is. Do not forward everything that gets sent to you. We've all seen them – the chain-letter emails that promise if you forward to x number of people you'll get paid, or you'll win something, or you will be lucky forever. It's all a hoax, a scam, and the only result is huge numbers of email transmissions that slow down servers all across the country. If you receive one of these emails from a friend, reply to them (in a very nice way) and explain to them why this isn't true, or ask them to stop forwarding them to you.

Virus, or virus advice?
Many viruses are spread by email masquerading as warnings about – a virus! If someone forwards you a virus warning, which usually contains instructions for removing a virus from your computer... check google.com for that virus BEFORE doing anything. Chances are, it's also a hoax, and if you do remove that "bad file" from your computer, you're actually removing a necessary component crucial to your system!

Wow, that was a lot of information to take in at one time, but I congratulate you for sticking it out and reading the entire article. Please share it with your family, friends and colleagues.

About the author:
Angela Nielsen is President of NIC Media Group, an award-winning web development company located in San Diego, California. To find out more about Angela Nielsen, and NIC Media, visit http://www.nicmedia.comor call them direct at 888 NIC Media. Copyright 2005 by Angela Nielsen and NIC Media Group


Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

Spam Blocking Information

Read Articles:

11 Proven Methods For Maximizing Your...
What Is Spyware - An Overview Of Spy ...
The 10 Most Important Questions To As...
9 Steps to Protect your MS Windows Sy...
The Top Twelve Threats No Computer Us...
Tops in toolbars?
Does Your PC Have Worms?
So, Is It Possible To Earn Free Money...
How to protect yourself from online a...
The email blues
Tiscali Broadband
Anatomy Of A Reciprocal Linking Campaign
Do I Need an RSS Feed?
Banned By Google And Back Again.
My Top 10 Favorite Internet Tools
5 Good Reasons For Using Yahoogroups ...
What’s with all this fraud and theft ...
Predicting The Future Online
Amazing Explosive Ways To Turbo-Boost...
Are You A Spam Zombie?
What are the best strategies or ideas...
5 Linking Strategies that Work
The Money Keyword List - Superchrage ...
Honesty and the Internet
Simple Identity Theft Prevention
Niche Software Steals Microsoft's Thu...
Web Summary Authoring
The End of Spyware?
7 Great Tips on Driving Targeted Traf...
Your computer is infected with Spywar...
Increase in Customer Sales = Increase...
How to Avoid Problems and Errors of S...
Why offline advertising is so importa...
Keeping your pc healthy at little or ...
Finding An Internet Access Provider T...
5 Ways To Drive Visitors Away From Yo...
Internet ISP's
Spyware: What It Is and How to Combat...
Top 10 Tips for WinXP Users
How to Choose a Web Hosting Company?
Take back control of your inbox. Elim...
Malware: Computing's Dirty Dozen
Money Doubler Madness
M-Commerce Twice the Cash Value of E-...
Understanding the power of viral mark...
How To Use Spyware Elimination Software
Are Surf For Money Ventures For You?
BT Internet Broadband
Search Engine Placement - Most Overlo...
Simple Search Engine Optimization
Adware And The Case Against Bundled S...
An quick guide in Payment Processing ...
What is the Robot Text File?
Search Engine Optimization History
Reclaim Your PC from the Internet Spies
SEO And The Outsourcing Of Inbound Li...
Top Paying Keywords: How to Increase ...
Creating Online Communities
Professional Traffic Building Tips
Internet Scams 101 -- Attacking You T...
Uncle Sam Cracks Down Online!
What are doorway pages?
IT Support Services in London
5 Tips For An Unbreakable Password
Building Links To Your Site
Spyware Protection - The Only Way To ...
Registry Cleaner: Protection for Your PC
Shocking Facts about Updating Your PC...
Buying a laptop that you can use as a...
What To Look For In A Web Host

More Article Pages 1 - 2 - 3

Winning the War On Spam

For years I didn't worry much about spam.

But lately it's got out of control. Over half of my email is now spam, and it was growing by the week - until I took action.

This article shows you some strategies for winning the war on spam.

------------------------------------------------

How Do They Get Your Address?

------------------------------------------------

In the old days, spammers got their addresses mainly from Newsgroups - if you didn't post to Newsgroups, you were reasonably safe. But they're now using a much more efficient method to build their lists - email harvesters.

Email harvesters are robots that roam the Internet collecting email addresses from web pages. Examples are EmailSiphon, Cherry Picker, Web Weasel, Web Bandit and Email Wolf, to name just a few.

How can you protect yourself from email harvesters?

By 'munging' (mung = 'mash until no good') or cloaking your email address.

There are many ways of munging your address - the easiest technique is to use ASCII code for the punctuation in your email address (instead of symbols).

For the colon after mailto use : and for the @ symbol use @ and for the period use . . With this method, your email address would become:

mailto:yourname@yourdomain.com

but it will display as:

mailto:yourname@yourdomain.com

Your email address will appear exactly as it did before, and it will still be 'clickable', but email harvesters will ignore it and move on.

There are also JavaScript's that you can insert into your web page that will make your email address visible to humans but invisible to harvesting programs. Here's one that works very well: http://pointlessprocess.com/JavaScripts/anti-spam.htm

-----------------------------

How To Fight Spam

-----------------------------

The most important thing is never, ever, reply to spam.

Most spam contains an innocent-looking 'remove me' email address. Do not use it. Here's why:

Spammers typically buy a CD containing a million or so email addresses, but they have no idea how many of those addresses are active. So before beginning their marketing campaign in earnest, they send out a 'test message' to the entire list.

The test message contains an email address for removing yourself. When you reply to that address, it confirms to the spammer that your address is active and therefore worth spamming.

Worse still, the spammer may be distilling from that CD a list of confirmed active addresses that he will then sell to another spammer.

The key to dealing with spam is to report it to a 3rd party: (1) the affiliate program that the spammer is advertising, (2) the spammer's web host, or (3) the ISP the spammer used to connect to the Internet.

When you report spam to a 3rd party, remember to be polite - they didn't send the spam and they're probably just as anti-spam as you are.

(1) Reporting to Affiliate Programs

Many spammers are affiliates advertising someone else's products or services. So look for a website address that contains an affiliate link, something like this: www.affiliateprogramdomain/841526

Then just send an email to the affiliate program (abuse@affiliateprogramdomain.com), informing them that you are receiving spam from one of their affiliates.

Most affiliate programs have zero tolerance for spamming and will remove an affiliate spammer without warning.

Now, affiliate spammers don't want you to see their affiliate link, so many of them send their email as HTML. All you see in the message are the words 'Click Here and Order Now'.

But in your browser just click on 'View Source Code' and search for the letters 'http'. That will take you to the spammer's affiliate link.

(2) Reporting to Web Hosts

If the spam doesn't contain an affiliate link, it's likely that it is coming from the owner of the domain name. In that case you'll have to report it to the spammer's web host or their ISP.

To make a report to the spammer's web host just go to Whois, the directory of registered domain names: http://www.netsol.com/cgi-bin/whois/whois

Type in the spammer's domain (the website address that appears in the spam) together with the extension (.com, .org, .net etc).

The host for that domain will usually be listed as the Technical Contact in the Whois record and there will be an email address for contacting them.

(3) Reporting to ISPs

To report a spammer to his Internet Service Provider, you'll have to look at the spam's 'extended headers'.

Extended headers show the servers that the message passed through in order to get to you. The instructions for viewing extended headers will vary depending on what email client you are using.

=> In Pegasus Mail, open the offending message and then

right-click and choose 'Show raw message data'.

=> In Eudora Light, click on 'Tools' in the top menu

bar, and then 'Options', and then select the

checkbox option that says 'Show all headers (even

the ugly ones)' and click OK.

=> In Outlook Express, open the offending message,

select 'Properties' from the File menu and then

click the 'Details' tab.

Reading and understanding extended headers is quite a detailed subject. Here's an excellent free tutorial on how to decipher extended headers: http://www.doughnut.demon.co.uk/SpamTracking101.html

As an alternative to these reporting techniques, you could use a web-based spam reporting service such as SpamCop (www.spamcop.net). SpamCop deciphers the spam's message headers and traces the mail back to its source.

Wishing you every success in the fight against spam!

------------------------------------------------------------
Michael Southon has been writing for the Internet for over 3
years. He has shown hundreds of webmasters how to use this
simple technique to build a successful online business. Click
here to find out more: http://ezine-writer.com/
------------------------------------------------------------


 



©2005 - All Rights Reserved

JV Blogs Visit free hit counter