Images Events Premium Services Media Kit Network Map E-mail Offers Vendor Solutions Webcasts
Search EarthWeb Network

& save on:
Compare Prices:

Be a Commerce Partner
Home Equity Loans
Domain Registration
Domain registration
PDA Phones & Cases
Cheap Plasma TVs
Web Hosting
Promotional Gifts
Promotional Pen Items
Corporate Gifts
Auto Insurance Quote
Promotional Items
Cell Phone Plans
Ecommerce Hosting

Travel Ideas:
 Los Angeles Hotels
 New York City Hotels
 Fort Lauderdale
 Kauai Hotels
 Disney Vacations
 San Francisco Hotels
 Miami Hotels
Panama City Beach
IT Management : Columns : Executive Tech: Your Own 24-Hour E-Mail Address

Symantec Data Management Solutions
Whitepaper: The Benefit of Continuous Data Protection
Data volume continues to grow at nearly 40% to 50% each year, making back up of mission critical data very difficult. For any organization looking to manage data growth, improve reliability, and speed data recovery, continuous data protection provides the avenue to address the challenges in a method that will improve overall data protection without weighing down IT with costly solutions.
Register Now to Download.
Whitepaper: Breaking Through the Dissimilar Hardware Restore Challenge
This paper discusses recovery to virtual computer environments, hardware migration strategies, hardware repurposing for optimal resource utilization, meeting recovery time objectives, and increasing disaster tolerance.
Register Now to Download.
Whitepaper: Converging System and Data Protection
From resilience against threats to efficient restoration of normal operations, Symantec can help keep your business up, running, and growing—no matter what happens.
Register Now to Download.
Webcast: Symantec Brings Disk-based Data Protection and Advanced System Recovery Together
Symantec Backup Exec™ and Symantec LiveState Recovery™ allow rapid and easy backup and recovery of virtually any Windows data and Windows system.
Join us for an informative Webcast to learn how to:
  • Create backups and restore to specific system recovery points
  • Maintain data availability and minimize server downtime
  • Eliminate backup windows, improving increased system reliability
  • Dramatically minimize downtime by rapidly recovering entire systems to dissimilar hardware platforms or even to virtual environments
Register Now to Watch.

Related Articles
Shushing a Noisy PC -- on a Budget
Building a PC That's Totally Silent
The State of the Silent PC
The Business of Specialized Search
- ITSMWatch Newsletter -
IT Focus
Wireless in the Enterprise

Wireless technology continues to make great inroads into networks. But IT pros still must contend with a number of issues such as security, access and integration.

Ready? Set. Go!

Mobile Workers Never Looked So Thin

The Incredible Hidden Wireless Connection

Product Watch
Determina VPS - Vulnerability Protection Suite
CLARiiON - Disk Based Mid-Tier Arrays From 3 To 240 Drives
LSI SAS Switch - Links Multiple Servers To One Or More SAS Arrays
CommuniMail - Mailing List Manager Script
Trilent FTP Proxy - Firewall-Friendly FTP Proxy

more products >>

Datamation Definitions
data mining
grid computing
network appliance
FREE Tech Newsletters

Whitepaper: Converging System and Data Protection. From resilience against threats to efficient restoration of normal operations, Symantec can help keep your business up, running, and growing.

Your Own 24-Hour E-Mail Address
April 4, 2006
By Brian Livingston

Brian Livingston Spam has gotten so out of control that some companies are not only deleting all the spam they receive every day, they're deleting their own e-mail address every day, too.

One entrepreneurial Web site operator thinks he's come up with an inventive solution for e-tailers who want a "click here to e-mail us" link on their home pages. It's called Dodgemail. The system makes up a different e-mail address for every site visitor -- an address that's good for only 24 hours.

That's long enough for a potential customer to ask a question of the e-commerce site, and the company to send back a reply containing a permanent e-mail address. But it's not long enough for the temporary address to be exploited by spammers who use "harvester" software. Such software is programmed to grab data from any site foolish enough to post an e-mail address as plain text.

Hiding Your Addresses from Harvesters

I've written several times about harvesters. For example, I wrote on Feb. 1, 2005, that one of the few strong features of the U.S. CAN-SPAM Act is an absolute prohibition, with stiff fines, against copying e-mail addresses from Web pages.

If your Web site needs to provide a way for visitors to communicate with you, my preferred approach to keeping your e-mail addresses out of the hands of spammers is threefold:

Forms. Use a Web form that allows a visitor to type in his or her e-mail address, followed by the text to send.

Images. Display your company's e-mail address as an image. Harvesters are only profitable if they scan millions of pages as quickly as possible. They aren't programmed, therefore, to stop and perform optical character recognition on every image on the Web on the off-chance that an e-mail address might be found.

JavaScript. If you must have a clickable link that says, "Click here to e-mail us," encrypt it using a simple routine, such as the free Enkoder. You paste the resulting line of JavaScript wherever you want the link to appear in the HTML of your Web page. All browsers can decipher the code, but (as with images) harvesters don't stop to decrypt all the JavaScript on the Web. (For the 5 percent of Web users who've turned JavaScript off, the clickable link doesn't appear, so your contact page also needs to display method 1 or 2.)

These tricks work well enough that I've written a short e-book about "spam-proofing" the e-mail addresses on your Web site, using the techniques shown above and others.

The 24-Hour Solution

But something about Dodgemail strikes me as the grain of an idea. I called its inventor, Ian Maddox, and inquired about the system's internal workings. (Disclosure: Maddox was employed by me briefly in 2005.)

As Maddox explains it, the steps to create an e-mail address that only works for 24 hours are as follows:

Sign up. You enter your e-mail address -- both the part before the @ sign and the part after -- into the home page of Dodgemail. (At this early stage of development, the site is pure minimalism and offers no documentation or help of any kind.)

Verify. The service sends an e-mail to your address, requiring you to verify yourself. It also displays two lines of JavaScript for you to paste into your Web pages, with clickable text saying, "Click here to e-mail me" or whatever you like.

Self-destructing addresses. Every time someone clicks your "E-mail me" link, a different e-mail address is generated. These addresses begin with a long, case-sensitive string, such as:

4WxzvZvVivOY07c7g7Dodgemail9XK3c0D2XK @

Forwarding. Messages your visitors send are received by the Dodgemail server and forwarded to your real address. After 24 hours, messages sent to self-destructing addresses are simply deleted. Before then, you've presumably sent a response to your interested customer explaining your real address.

For companies that don't wish to use JavaScript syndication, Dodgemail offers the world's simplest API. You change email.js in the 2-line JavaScript code to api.php. You then fetch each new e-mail address using curl or some other utility.

In the future, Maddox says, users will be able to specify a lifetime of X messages or Y hours, rather than defining the lifetime of all addresses as 24 hours.

Dodgemail is so new that it's hard to find any sites that are using this approach. I did find a few participating blogs, such as When you click this site's "Mail" link, a new mail message opens with a Dodgemail address in the "To" line.

More Fun with PHP

Most companies that are larger than a single blog page will understandably be reluctant to route their incoming e-mail through a little-known Web service. I'm describing Dodgemail in this column because it's an intriguing kludge that businesses may be able to adapt to their own situations.

Maddox says, "I've thought about having the person who owns a domain set up a subdomain of their own and configure their MX record to let Dodgemail handle the mail." This would allow the e-mail addresses to bear the company's own domain name in the addresses instead of

The business model for Dodgemail won't involve placing ads, Maddox says. "They bring in only pennies." Instead, he believes offering premium services, where users pay a periodic fee, is a more promising source of revenue.

In the meantime, he isn't putting all of his eggs in the Dodgemail basket. He offers several fascinating online services at his personal Web site, (The name is a derivative of Snoopy, the dog in Peanuts, and is an old school nickname.) All the services are free:

Package-tracking mashup. You can enter any UPS, FedEx, USPS, or DHL/AirBorne tracking number and not only get an RSS feed to follow your parcel's progress, but also a Google map showing the route it's taking.

Convention-travel estimator. For an upcoming conference, Maddox programmed a routine to find the cheapest city for several people to fly to, using current airline prices. It's general enough that anyone can use it. The service is so new that it isn't even linked to from iSnoop's home page, so here's the URL: Costimator.

Coming to a theatre near you. You enter your city name or ZIP code and receive a list of RSS feeds that provide show times for movies in theatres near you. The raw data is provided by Google.

Maddox was briefly known for his late, great Gmail Invite Spooler. This free service opened in mid-2004, when people who wanted a Gmail account had to be invited by someone who already had one. Maddox's spooler allowed people with Gmail accounts to contribute their unused invitations into a pool for others who wanted to sign up.

At one point, the spooler was receiving 100,000 visitors a day. But, after almost a year of operation, Maddox shut down the service after Google blocked it in June 2005, as he explains in a blog entry.

Today, of course, Gmail accounts can be obtained by anyone. But the now-disabled spooler page is still the most-visited part of the iSnoop site. 87 percent of the page's visitors are Web surfers from outside the U.S. who are apparently just now hearing about the spooler via word of mouse. So Maddox added a 31-line machine-translation script (surprise, based on Google Translate) so non-English-speaking visitors can better understand why the service ended.

None of these applets may ever make Maddox any real money. But it's encouraging to see that inventiveness is still alive and kicking on the Internet.

Brian Livingston is the editor of and the coauthor of "Windows Me Secrets" and nine other books. Send story ideas to him via his contact page. To subscribe free and receive Executive Tech via e-mail, visit our signup page.

Executive Tech Archives

JupiterWeb networks:

Search JupiterWeb:

Jupitermedia Corporation has two divisions:

Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | E-mail Offers