Arghhh what am i doing, Im going look at the answers some of the other students are posting in order to get some idea of how to go about this task. At first all i could glean from the message i sent to myself from Yahoo was my email address, the subject of the message, and its content, but after reading the blog from Lin http://net11lwade.blogspot.com/2008/12/email-task.html it was revealed to me that there is a greater depth of information to be discovered. I opened my email in Office Outlook right clicked and chose message options. Wow!! low and behold there at the bottom under Internet headers was the mother load as you can see below I managed to glean some new facts concerning my email.
Return-Path: <dpr211267@yahoo.com>Received: from nskntingx01p.mx.bigpond.com ([98.136.44.36]) by nskntmtas02p.mx.bigpond.com with ESMTP id <20090103031347.XXWK24984.nskntmtas02p.mx.bigpond.com@nskntingx01p.mx.bigpond.com> for <dre12342@bigpond.net.au>; Sat, 3 Jan 2009 03:13:47 +0000Received: from n71.bullet.mail.sp1.yahoo.com ([98.136.44.36]) by nskntingx01p.mx.bigpond.com with SMTP id <20090103031346.XMRL23721.nskntingx01p.mx.bigpond.com@n71.bullet.mail.sp1.yahoo.com> for <dre12342@bigpond.net.au>; Sat, 3 Jan 2009 03:13:46 +0000Received: from [69.147.65.172] by n71.bullet.mail.sp1.yahoo.com with NNFMP; 03 Jan 2009 03:13:44 -0000Received: from [69.147.65.163] by t14.bullet.mail.sp1.yahoo.com with NNFMP; 03 Jan 2009 03:13:44 -0000Received: from [127.0.0.1] by omp408.mail.sp1.yahoo.com with NNFMP; 03 Jan 2009 03:13:44 -0000X-Yahoo-Newman-Property: ymail-3X-Yahoo-Newman-Id: 828093.32569.bm@omp408.mail.sp1.yahoo.comReceived: (qmail 22741 invoked by uid 60001); 3 Jan 2009 03:13:44 -0000DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Message-ID; b=qFn2BvK1T5EiD0Jxzqr39LIF0FCCM9W7B0ovwwgbetynoR1/451Itfwo/Q6PL/IkbK0eEm7TIM4vtER6bWp7hPwuZBoO70+A6Dqi5eOog7jUp6cBfuj2HZH3CU/ud9SBOm4aFmaqe2gYf9ywrV8ztMsnadGFGp/baljAzebaEfk=;X-YMail-OSG: SUFwRfIVM1mwT0bdby2MDFjSNlDqESUevnBrYwCrlRsAlAzq0snon_U3m7b2PwCxLWfm0owQlKmpVt4HXWbNiYmcWEwGJrob56to6ptZCnzreCH26.Is0G0npPjW91E4_h1gGihTsRLWK3fWHp5r2rzCN57HOKUYEdS6TiC8hYrbhm6dz0mazMh1IH5pbIXH8.cYv1w-Received: from [121.222.134.237] by web45603.mail.sp1.yahoo.com via HTTP; Fri, 02 Jan 2009 19:13:44 PSTX-Mailer: YahooMailWebService/0.7.260.1Date: Fri, 2 Jan 2009 19:13:44 -0800 (PST)From: Douglas Reynolds <dpr211267@yahoo.com>Subject: Email taskTo: dre12342@bigpond.net.auMIME-Version: 1.0Message-ID: <653616.22581.qm@web45603.mail.sp1.yahoo.com>X-RPD-ScanID: Class unknown; VirusThreatLevel unknown, RefID str=0001.0A150202.495ED7EB.0073,ss=1,fgs=0X-Antivirus: AVG for E-mail 8.0.176 [270.10.2/1872]Content-Type: multipart/mixed; boundary="=======AVGMAIL-495ED7F20000======="
A lot of this is absolute gobbledy gook to me, but I am able to ascertain that the email was sent from YahooMailWebService at 19:13:44 on Fri 2nd January 2009 PST, and passed through a number of servers to finally arrive at my outlook application on Sat, 3rd Jan 2009 03:14:37, now considering that it is actually 1:42 pm which would translate to 13:42:00 maybe the final time given is in GMT. One concern I have about posting this information on this blog is am I actually making myself vulnerable to a breech of my computer system. Hopefully I'm not being overly paranoid.
Question 2
I am am not a very social creature and rarely if ever have I had the opportunity to use these functions but of the top of my head I would probably use the cc and bcc if I had to send the same document,image or other such message to more than 1 individual. As for the reply to all function hmmm lets see, if a number of emails required the same response, an example would be in the movie Bruce Almighty where Bruce answered all emails "yes" using the reply all function.
Question 3
There are a number of ways to ensure that the recipient of an attachment to an email is able to open it. Firstly through an explanation in the body of the email explaining which application opens the attachment. Secondly by sending the attachment in a format that that is widely accepted by most operating systems e.g an rtf file. Thirdly through correspondance with the recipient learning what applications their system uses and sending your attachments to suit.Question 4
My email is an absolute mess, I have no rules or filters set up. But after reading this part of the course that is something that I will be rectifying. The first and foremost will be to filter out the spam and have correspondance from the Uni redirected to my Uni folder, and highlight certain emails to quickly ascertain who they are from.
Question 5
The folder structure of my email is not very complex I have the standard in,out,deleted,drafts and junk folders and i have added a Uni folder for University correspondance to keep it seperated. As I have a number of email accounts I think its time to drag myself out of the stoneage and put some order into my electronic mail.
No comments:
Post a Comment