Solved

sending e-mail

Posted on 2001-06-23
9
225 Views
Last Modified: 2010-04-06
I have read the question on "sending anonomus mail" and i agree that sending it WITH AN ATTACHMENT IS BAD!!!

But i would like to know how i can send anonomus e-mail WITHOUT any ATTACHMENTS. I think i am not the only one that agrees that everyone has a right to send anonomus mail whoever they are!

PLEASE PLEASE could someone send me a sample project on sending anonomus e-mail as i think everyone has a righ to!!!

If people can surf the net anonomusly, why can't we send e-mail the same way?

PLEASE send it too    neo_coder@hotmail.com

Thanx

ps My spelling is poor :-(
0
Comment
Question by:kevinward66
  • 4
  • 3
  • 2
9 Comments
 
LVL 1

Expert Comment

by:Dennis9
ID: 6222108
i'll send u one soon...

Dennis
0
 

Author Comment

by:kevinward66
ID: 6224667
Dennis,
Do u have a rough idea when u will have it done?
0
 
LVL 1

Expert Comment

by:Dennis9
ID: 6224913
sorry, i forgot it ;-)
I will go see what i ccan do.

Dennis
0
Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

 
LVL 1

Expert Comment

by:Dennis9
ID: 6225069
First i want to know what u will use it for.
Only things i know it can be used for are:
viruses, trojans or spam.

And all three I am against!

if u give me a good reason i will show u.

Dennis
0
 

Author Comment

by:kevinward66
ID: 6228987
It will be used to send mail anonously!! what i mean by this is that you can send mail to a person and they don't know who it came from.

Its a bit like Hushmail, if u send a mail from hushmail to another person in hushmail then it is sent anonously

And finally, everyone has a right to their privacy, ie they should be logged for everything they do!!!
0
 

Author Comment

by:kevinward66
ID: 6228990
woops i forgot to include "Should NOT" be logged...
0
 
LVL 1

Accepted Solution

by:
drnadeem earned 200 total points
ID: 6236839
This example should not be used to distribute viruses, trojans or any other harmful programs over the internet. This comment was for purely educational purposes.




procedure TMailF.NMSMTP1Connect(Sender: TObject);
begin
 NMSMTP1.SubType := mtPlain;
 with NMSMTP1.PostMessage do begin
    FromAddress := 'you@you.com'; //write anything here
    ToAddress.Add('valid email 1');
    ToAddress.Add('valid email 2');
    Subject := 'Subject';
    Body.Add(SubEd.Text); //body of the mail
  end;
  NMSMTP1.SendMail;
  NMSMTP1.disConnect;
end;

procedure TMailF.Button1Click(Sender: TObject);
begin
  NMSMTP1.Host := 'mail';
  NMSMTP1.Connect;
end;
0
 

Author Comment

by:kevinward66
ID: 6240780
does my IP Address go with the e-mail?  (I hope not)
0
 
LVL 1

Expert Comment

by:drnadeem
ID: 6241811
no it does not
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now