Category: Uncategorized

Reblog – Remove distraction of JunkMail arrival

This post 2 Steps to Auto Mark Junk Emails as Read is a godsend.   At my job I get a ton of unsolicited commercial email (UCE).   After I black list the domains of the companies that SPAM me, I still get distracted when new emails arrive because it makes the Junk Mail folder bold and a count gets incremented.

This article shows you how to silence both the count of unread emails and also automatically mark new junk emails as read.   You’ll never be distracted by unwanted SPAM again!

List of company domains that send UCE

The following is a list of company domains that send out opt-out SPAM / UCE.  These companies have no problem sending you daily SPAM, sometimes more than once a day, and then require you to fill out a form to opt-out.   I’ve also had instances where a year will go by and new salesman from the same company I’ve opted out start emailing me again, so I’ve stopped opting out and gone to domain blocking.  It’s GREAT!

Feel free to import this list into Outlook and make them invisible.   I’ve spent months curating this list.

@1440security.com
@accelq.com
@accusoft.com
@acquia.com
@actifio.com
@adaptivecomputing.com
@agilepremiere.com
@ahextechnologies.com
@amdtelecom.net
@analytixds.com
@appshark.com
@appshark.us
@apptimize.com
@arcserve.com
@aspiresys.com
@atlassyst.com
@atmecs.com
@authen2cate.ccsend.com
@authen2cate.com
@bairesdev.com
@bdionline.com
@beyond20.com
@bl.ink
@bmc.com
@bmsend.com
@bravesoft.com
@brightpattern.com
@business.samsungusa.com
@c10inc.com
@captiveeight.com
@centroid.com
@cesltd.com
@checkpoint.com
@cigniti.com
@circleci.com
@claimschmiede.com
@cloudscaleqa.com
@columninfosec.com
@corinium-intelligence.msgfocus.com
@corp.ovh.us
@corpdeliverybiz.com
@corpprossenders.com
@crm.learningneeds.net
@crosscode.com
@cxolyris.cxomedia.com
@cybytetech.com
@deftsoft.com
@dell.com
@demand.fortinet.com
@demandblue.com
@diamanti.com
@dincloud.com
@diversant.com
@dorgresearch.com
@drawmediaevent.com
@dropbox.com
@druva.com
@dyonyx.com
@e.magenic.com
@e.qasymphony.com
@ed-email.techtarget.com
@email.corpprossenders.com
@email.cybersecurity-dallas.com
@emtecinc.com
@engage.vmware.com
@enhops.com
@epcgroup.net
@erwin.com
@eventbrite.com
@exampmbok.com
@fatpipenetworks.net
@fortunesoftit.com
@fortworthitsymposium.com
@franklincovey.com
@freeitdata.com
@ggktech.com
@goisc.com
@hackerearth.com
@hashicorp.com
@idera.com
@in2ittech.com
@infolock.com
@infortechpro.com
@innetworktech.com
@instana.com
@interana.com
@isg-one.com
@itbiznessbook.com
@itechnodesk.com
@ivalua.com
@karyaservices.us
@knowbe4.com
@korcomptenz.us
@lead-forensics.msgfocus.com
@learningneeds.net
@lightbend.com
@limitlesscoffee.com
@liveperson.com
@looker.com
@lucidworks.com
@mail.nexenta.com
@mci-cyber.org
@memsql.com
@metzcloud.com
@microfocus.com
@miritech.com
@missioncriticalinstitute.org
@modis.com
@mosaicdatascience.com
@msgfocus.com
@mspworx.com
@mtm.com
@mybridgetech.com
@mytechtrends.com
@nadog.us
@neocol.com
@net2source.com
@netenrich.com
@netsuite.com
@newrelic.com
@news.melissa.com
@newtglobaldevops.com
@nexenta.com
@nimbledroid.com
@nodesource.com
@northpointsearchgroup.com
@numerify.com
@nuvemconsulting.com
@observeit.com
@onexte.com
@optimizely.com
@oracle.com
@panaya.com
@paviliondata.com
@pcm.com
@presidio.com
@promastercert.com
@proscorpresource.com
@psi-staffing.net
@pssclabs.com
@pulsesecure.net
@puppet.com
@qasymphony.com
@quickstart.com
@qwentic.com
@rapportit.com
@redislabs.com
@researchcorp.org
@rht.com
@richmondeventsinfo.com
@rightstar.com
@ringcentral.com
@rjbyrd.com
@routee.net
@rubrik.com
@salesforce.com
@sandstreamcontact.com
@sanganan.com
@selectgroup.com
@shi.com
@snowflake.net
@softiron.com
@softnice.com
@softura.com
@splitmetrics.com
@stackarmor.com
@stefanini.com
@storagecraft.com
@strafford.com
@sumologic.com
@syncrasytech.net
@t2mdev.com
@tailoredaerialpicsusa.com
@tcognition.com
@techtarget.com
@tekleaders.com
@testingxperts.com
@theacquiateam.com
@thebusinessupdates.com
@thedecorgroup.com
@thegreenrfp.com
@thetotalemaildelivery.com
@ticketmanager.co
@tpatechnews.com
@tpatechnologies.com
@trafficdrawmedia.com
@tripspecialnewestupdates.top
@t-systems.com
@unify.com
@us.fujitsu.com
@us.softnice.com
@vertexcs.com
@vistaitgroup.com
@vivo-comm.net
@vmware.com
@wallarm.com
@westlandhotelhydepark.com
@whitepaperlab.com
@xduce.com
@xentegra.com
@your_allnewscanupdates.rocks
@zendevlabs.com

Self-disciplined Surfing at Work

I found, given recent political developments, that I get tempted to access news sites, social media sites, and other non-work related websites at work more and more often lately.    I wondered what I could do to force myself to be more disciplined.

One day as I was rigging my hosts file to point to a particular webserver to do some testing, it occurred to me.    I should make it harder for me to access these sites by modifying the hosts file for this purpose!

What is a hosts file?   If you’re a computer newbie this might be a revelation to you.   The hosts file is a legacy system that has plenty of useful applications in today’s networked world.    I won’t go into them here, but for the purposes of this post, we want to edit the contents of the file.   On most computers, you will need elevated access (Administrator on Windows, root on MacOS) to save changes to this file.

The location of this file on Windows is in the \Windows\system32\drivers\etc folder.   It’s named “hosts” without a file extension.   This follows the UNIX convention, although years ago it was “hosts.txt”.

Normally this file is almost empty but usually has the “loopback” address there as a lonely entry:

127.0.0.1          localhost

You can leave that there.   On a new line, you can start making entries to start blocking access to websites.   Here’s a few of mine:

127.0.0.1 http://www.facebook.com

127.0.0.1 facebook.com

127.0.0.1 http://www.twitter.com

127.0.0.1 twitter.com

127.0.0.1 foxnews.com

127.0.0.1 http://www.foxnews.com

127.0.0.1 cnn.com

127.0.0.1 http://www.cnn.com

Make sure to save the file and close all open browser tabs and the browser itself.   Now when you access twitter in an impulsive moment, you’ll get a nice 404 message.

twitterFail

Note that this technique is also useful for blocking out ads without triggering the “You’re using an adblocker” warning from the website itself.   I recommend adding this in, too:

127.0.0.1 tpc.googlesyndication.com

127.0.0.1 googlesyndication.com

Bye-bye Google ads!

I’ve done this to my work computers several months ago and I’ve found myself to be tremendously more productive.   Now, if I want my internet fix I pull my phone out while getting coffee.   Hope it helps you too.