{"id":1682,"date":"2011-05-01T18:02:00","date_gmt":"2011-05-01T22:02:00","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=1682"},"modified":"2011-05-01T18:02:00","modified_gmt":"2011-05-01T22:02:00","slug":"using-your-name-in-your-email-address-might-not-be-the-best-idea","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/using-your-name-in-your-email-address-might-not-be-the-best-idea\/","title":{"rendered":"Using your name in your email address might not be the best idea"},"content":{"rendered":"<p>Here\u2019s  a simple tip that will help you quickly identify spam emails  \t\t\t quickly. Many spammers use sophisticated software to extract your  \t\t\t name from your email address. For example, if your email address is \t\t\t<a rel=\"nofollow\" href=\"&#x6d;&#x61;&#x69;&#x6c;&#116;o:ca&#x74;&#x68;&#x65;&#x72;&#105;ne.s&#x6d;&#x69;&#x74;&#x68;&#54;2&#64;wh&#x61;&#x74;&#x65;&#x76;&#97;.com\" target=\"_blank\"> &#99;&#x61;t&#x68;e&#114;&#x69;n&#x65;.&#x73;m&#105;&#x74;h&#x36;2&#x40;&#x77;&#104;&#x61;t&#x65;v&#97;&#x2e;c&#x6f;m<\/a> , the software picks up your name  \t\t\tas Catherine. So when you open your email, you may be shocked to  \t\t\tsee:<\/p>\n<p><em>Dear Catherine,<\/em><\/p>\n<p><em> <\/em><\/p>\n<p><em>We have a great deal for you today. You can lose up to 3 pounds a  \t\t \tday on our new rutabagas diet! Eat all you want up to 30,000  \t\t\t calories a day and still lose weight. That\u2019s right, Catherine, you  \t\t\t can drink all the shakes you want, stuff down burgers, and eat  \t\t\t mountains of French fries and still lose 3 pounds a day.<\/em><\/p>\n<p><em>What\u2019s the secret? We\u2019re not going to tell you. This is valuable  \t\t\t information. So, Catherine, here\u2019s what we\u2019re going to do. We\u2019re  \t\t\t going to give you $10.00 off our great secret.<\/p>\n<p><\/em><\/p>\n<p><em>Interested, Catherine? You betcha!<br \/>\n<\/em><br \/>\n\u2026and yada, yada, yada.<\/p>\n<p>See? Putting your name in your email address isn\u2019t a really good  \t\t\tidea. What if, for example, your email address was \t\t\t<a rel=\"nofollow\" href=\"mailto:iamthewalrus&#64;whateva.com\" target=\"_blank\">&#x69;am&#x74;he&#x77;al&#x72;us&#x40;wh&#x61;te&#x76;&#97;.&#x63;&#111;m<\/a> . The email above would begin \u201cDear Iamthewalrus\u201d and you\u2019d know at  \t\t \ta glance that it didn\u2019t come from anyone you know. What friends  \t\t\t would call you Iamthewalrus?<\/p>\n<p>So, the next time you need to create an email address, avoid the  \t\t\t temptation to try to get something as close to your real name as you  \t\t \tcan \u2013 and go for something completely different than your real name.  \t \t\tYou\u2019ll be able to identify the scammers and spammers more quickly if   \t\t\tyour real name doesn\u2019t appear in your email address.<\/p>\n<p>This is a simple tip, but one that can save you time \u2014 and trouble.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s a simple tip that will help you quickly identify spam emails quickly. Many spammers use sophisticated software to extract your name from your email address. For example, if your email address is &#x63;&#97;th&#x65;&#x72;in&#x65;&#x2e;&#115;mi&#x74;&#104;62&#x40;&#x77;&#104;a&#x74;&#x65;&#118;a.&#x63;&#x6f;m , the software picks up your name as Catherine. So when you open your email, you may be shocked to see: Dear Catherine, We\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/using-your-name-in-your-email-address-might-not-be-the-best-idea\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[252,1061,1062],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1682"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=1682"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1682\/revisions"}],"predecessor-version":[{"id":1684,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/1682\/revisions\/1684"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=1682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=1682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=1682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}