Showing posts with label email. Show all posts
Showing posts with label email. Show all posts

Sunday, February 1, 2009

Making a mail list from all mailing addresses lying around

I was recently on a project of spreading words about my new magazine, for which I was not getting contributors. The best idea I could think of, was to mail people and let them know about it. So, I got out all mail addresses from my orkut account, my address book, and some mail list that used to email all recipients in one go, from which I got most of the addresses. Now, the problem was that, I could not make it typing 1070 email addresses in the To field of my email client. I had to get them in one csv (comma separated value) list. This article would rather be a how to on this topic. I wrote programs for that, whose source code is freely available here along with makefiles and a readme file.

  1. The first thing was to get the list in a file in some format. The mail list was the first target, which had many addresses. So, I had them in space (' ') separated format. So, I wrote a program eliminateduplication, which will also eliminate the duplication of email addresses, that is two addresses in the same list, and give the output in another file in csv format.
  2. The second source of addresses was Orkut. I pulled out all contacts in csv format. But, this time it had the names as well. So, I had to open it in a spreadsheet program. Although I used Open Office, Microsoft Excel will do fine. Then all I did, was copy the specific column containing the email addresses, and pasted in a file, where the addresses got separated by Enter. For this, I used the program crlf_to_space, which will take input from the file maillist.13 and put it in a space separated file maillist, which can be later put in maillist.csv.
  3. The last thing I did, was open the maillist.csv file in a text editor (kwrite, gedit and notepad are examples), and copied the whole list to the To field. The problem was solved.
The programs are made with standard C functions. So, the program should compile with any gnu compatible compiler, like gcc in Linux and mingw in Windows. Other compilers will also work, but one will have to compile the individual files, because the Makefile is GNU compatible.

Instructions:
  • Do not delete the maillist file, because any later additions can be done to it, and eliminateduplications will just write those in csv format to maillist.csv, overwriting any existing addresses.
  • Download your gmail contacts in csv, and copy email addresses as instructed earlier. Then use crlf_to_space, to append those addresses to the maillist file. This will not overwrite the already existing addresses in that file.
  • After this, use the eliminateduplications program to save the space separated email addresses in maillist to maillist.csv in csv format.
Application:
  • These programs can be useful in gathering various email addresses from different locations, and using them all in one go, without having to type the individual messages.
Download The Mailing List Project:

Tuesday, May 6, 2008

Encryption to the rescue


Privacy has been the prime requirement for the modern day man. We ofter hear - Privacy is dead. Is it? To some extent though it is, but the reason is not those that made it die, but those that left their privacy wide open to all. Privacy is there, as long as you let it be.

Today's cyber world is filled with prying eyes, with people trying to know about you. The information they will try to gather ranges from your email id, passwords, your emails etc. This post will try and concentrate on the email privacy stuff.

Email privacy has been a concern, ever since email became reality. Emails started back in the eighties. The thing that concerns us is that whenever we send mail, it passes through a number of routers, that come in between the smtp server and the pop server. Many routers will make a local copy of these data, and store them for further retrieval. In many places, in cyber cafes, keyloggers would be common, that not only log your passwords, but whatever you type in the keyboard. In short, it will monitor your site visits, your passwords, your emails and what not. Most of this is done due to Government implementations, others for private misuse purposes. But we can actually prevent all this, if we take certain measures.

Email encryption has been around for a long time now, but still there are many that would prefer to send unencrypted messages, unknowing that they can be sniffed in between, used for various other purposes like privacy theft, identity theft etc. But with 4096 bits encryption around, if the misuser does not possess a set of a few supercomputers, there is no way to break the encryption.

One can use the various applications for the encryption and then use a mailer to send the mails through smtp servers. In present date, most mail servers are free and most of them won't allow pop access to mails, unless you upgrade to premium accounts, for which you'd have to pay. Gmail is the only provider, that I know, provides POP as well as IMAP access for free. As for the encryption application, one can use GNU's Privacy Guard the GNUpg and for the mailer application, one can use the MS Outlook, if one uses windows, or the Mozilla Thunderbird or Sea Monkey. I'd suggest Thunderbird, for it's free and it has less bugs as compared to the "MICROSOFT" Outlook. If using Thunderbird, one can use the Enigma Add-On, available on mozilla's site (www.mozilla.org).

All the encryption algorithms will have two keys. One will be the Private key, and the other will be the Public key. While they are generated, the application may ask you to move your mouse or type random things on the keyboard or surf the internet or do disk intensive tasks. This is, so that it can generate random key, that is hard to guess. The public key is used to encrypt the message and the private key is used to decrypt it. After the generation, you will need to distribute the public key, or store it in some website or something. Keep the Private key secure with you.

If you have any problem regarding the setting up of the mailer or regarding the encryption algorithms, mail me and I'd be more than happy to help.

If you have some sensitive mail, that may harm mine or your privacy, consider encrypting your message using my public key available here.