3 Ethical Hacking tips every Data Scientist/Software Engineer should know about E-mail
You will agree with me that the tech space is very wide and challenging, it therefore behooves everyone to try as must as possible to learn, unlearn and re-learn. You will also agree with me that they are a lot of things which we are forced to do against our will while surfing the internet. In this article, I will explain three things you should know or be doing to save yourself from some limitations about emails.
1. Using one email on same website more :
If you have ever sign up for Udacity last year, and then you want to register during their promo period but then you have a problem of creating another email. Many people will definitely subscribed to creating new email. But then you have a way to play around it.
Let us say your present email is: abideen2020@gmail.com. If you want to register the same email on the same website as a new user, what you need to do is to put dot (.) anywhere around the email. For easy retrieval, it is advisable to put it at the beginning. Therefore, the above email will become: a.bideen2020@gmail.com. Guess what? You will be receiving the email as if you have put your proper email. The only difference is time.
What about if the origin email comes with dot like: abideen.muhammed@gmail.com? You don’t have problem, just insert another dot and you are fine. The above email with dot can then be a.bideen.muhammed@gmail.com
2. Temporary Email:
Another trick you need to be accustomed with is temporary email. What is temporary email? Disposable email — is a service that allows to receive email at a temporary address that self-destructed after a certain time elapses. It is also known by names like : tempmail, 10minutemail, throwaway email, fake-mail or trash-mail. Many forums, Wi-Fi owners, websites and blogs ask visitors to register before they can view content, post comments or download something. Temp-Mail — is most advanced throwaway email service that helps you avoid spam and stay safe. (https://temp-mail.org/en/)
Temporary email saves your original email from spamming. Let us say you want to access a particular solution to your ongoing project for just two hours and they required your email, the best thing is to register with temporary email. Here is how it work: type temporary email on google and click the site that suit you, or click here to the one I use.
Then copy the email and use to subscribe then download or access the content you need. If it requires verification, go back to the page where you copied the email, you will see any message sent to the email. Just click the message to verify. That is all. Enjoy it!
3. Use a VPN on your computer and your phone
Be anonymous by using a VPN to encrypt your internet connections. There’s no reason not to when it comes to protecting your personal information. While you’re at it, the VPN will make your browsing experience even better, with fewer ads, less tracking, and, of course, more peace of mind knowing you’re secure.