Today we see three techniques to show the images in the HTML body of the body of an email. These procedures are not always indicated, and I recommend its use only for the composition of the newsletter and a few other cases. But we see the techniques in detail. CID Embedded Images A me, he Content-ID (the Read more…
Last year, in this period between the pages of this blog there was talk of “Prey” (official website), un software open source (which is not common among the tracking programs) Multiplatform able (if installed) of track the location of your computer if it is stolen. Among the features are already implemented in each report: photo by webcam, screenshot Instant, IP address public and private, and in addition to geolocation using the IP address Prey is able to triangulate its position according to the distance of the closest wi-fi networks. After trying it I personally find that the detected position is disconcertingly accurate. (more…)
Today we speak of a small but very useful service that I use for several years and which I use often: “10 minute mail“.
As the name “10 minute mail” is an email address to 10 minutes, valid ie the time to register in a site that we do not trust the way down and wait for address verification to certify that the registration email is actually our property. (more…)