Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Using imacro

Posted on 2011-03-17
2
Medium Priority
?
483 Views
Last Modified: 2013-12-07
I just wondered how the true "experts" do this.

I just found out about imacro and love it, but what is the proper way to do this?  Say I want to go to my gmail inbox.  If I'm logged in I can just go to mail.google.com and I'm there.  If I'm not logged in, I could have imacro log me in and then go to my inbox.

But, I want it to work 100% of the time.  So do I have imacro make sure I'm logged out of gmail, log me in to gmail, and then go to the inbox?  It seems like many wasted steps.

What I'd like to do is:

If (I'm not logged into gmail)
      Log in to gmail
Endif
Go to inbox

0
Comment
Question by:hrolsons
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
mish33 earned 2000 total points
ID: 35176146
One way to write greasemonkey script and assign it to login page, so when it detects the login page, it'll fill name/password and send, so gmail will redirect you in.
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
What do responsible coders do? They don't take detrimental shortcuts. They do take reasonable security precautions, create important automation, implement sufficient logging, fix things they break, and care about users.
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
Six Sigma Control Plans

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question