Grab Those Emails! – 11 Key Ways to Get Your Visitors to Hand Over Their Email Addresses

Written by Leah West

Continued from page 1

6. Give away something for signing up. People love free stuff. Give away an ebook, a t-shirt, consulting services, whatever you want.

7. Have visitors fill out a survey on your website. Offer a free gift as an incentive to completerepparttar form.

8. Offer a free online service from your website. They have to sign up to receiverepparttar 105289 service.

9. Host free classifieds. Grab their e-mail address, then let them post their ad.

10. Offer a free training course via email. They gotta sign up if they wantrepparttar 105290 course.

11. Let their voices be heard. When they sign up, give them access to a forum, chat room, or guestbook.

Make sure to provide a privacy link where they can click and read that their email address is safe with you and you won’t sell it to anyone. Also include that they can opt-out at anytime they don’t want to receive your emails anymore. Most people won’t read throughrepparttar 105291 entire privacy policy, but they will look to see if it’s their before giving out their info.

Getting your visitors to leave you their email address is not hard to do if done right. If people think they will getrepparttar 105292 information they are looking for, then they will most likely hand overrepparttar 105293 goods.

Leah West Providing complete search engine optimized website design and internet marketing services for your small business success. Sign up for my Fr*ee ezine at

Sending anonymous email

Written by eblivion

Continued from page 1

Fake Mail Commands Generally,repparttar following commands will work fine: helo mail from: rcpt to: data content of email . quit Entering those commands when connected via telnet to a Sendmail daemon will send an email containing “content of email” from In some cases, you might need to type “helo” atrepparttar 105286 beginning ( beingrepparttar 105287 domain ofrepparttar 105288 return address) to get this to work. The return and to addresses, as well asrepparttar 105289 content ofrepparttar 105290 e-mail, can be modified as much as you want. If it doesn’t work,repparttar 105291 daemon might need authentication, orrepparttar 105292 syntax might be different (try adding <>s on either side ofrepparttar 105293 email addresses). And, backspace does not work, even though it looks like that. If you mess up in typing a command and press backspace,repparttar 105294 command is void. Inrepparttar 105295 contents ofrepparttar 105296 e-mail, backspaces will show up as boxes when read byrepparttar 105297 receiver. This is an invaluable social engineering technique. Imagine sending an email to an AOL customer, fakingrepparttar 105298 return address as a system administrator, with contents something like “We are debuggingrepparttar 105299 system lost all our user data for your area. We require you to send your name, date of birth, address, username, password, credit card number, and credit card expiration date.” They would happily comply, thinking you were someone you weren’t. You are not completely anonymous when using this technique. Anyone who is serious about safety should know about email “headers,” or information included inrepparttar 105300 email. If you have pop3 enabled with your email (you do if you have gmail) then just open uprepparttar 105301 mail with Thunderbird (of Outlook, ugg) and tell it to displayrepparttar 105302 headers. I will not go in depth on this, but a search onrepparttar 105303 internet will show you what you need to know to spot fake mail.

eblivion -- Mike Vollmer

    <Back to Page 1 © 2005
Terms of Use