Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Software

Images: ReadNotify’s tracking service

By Bill Detwiler September 28, 2006, 11:35 AM PDT on Twitter billdetwiler

Image
1
of 4

Screenshot
Screenshot
Images: ReadNotify’s tracking service

ReadNotify.com

During congressional hearings, Hewlett-Packard investigator Fred Adler specified how the company bugged the e-mail it sent to CNET News.com reporter Dawn Kawamoto. HP used the services of rnReadNotify.com, one of several online companies that let people plant bugs in e-mail messages and files. This is a screenshot of the rnReadNotify home page.

ReadNotify.com
Images: ReadNotify’s tracking service

This is a screenshot of the ReadNotify page that instructs users how to send a bugged e-mail. Users of the service register their e-mail rnaddresses with ReadNotify and then simply append “.readnotify.com” to any e-mail address they send mail to if they wish the message to be rntracked. Recipients won’t see this, but could tell from the e-mail headers that the message was relayed.rn

rnReadNotify also offers plug-ins for various e-mail clients, including Web-based e-mail, to make bugging a message easier.

Images: ReadNotify’s tracking service

Paying users of ReadNotify.com get the ability to add bugs to files, such as Office and PDF documents. This is a screenshot of the ReadNotify rnWeb page that will generate a document with an image. This image, a green check mark, can simply be dragged-and-dropped into the document rnthat needs to be traced. The check mark becomes transparent after it is dropped.

Images: ReadNotify’s tracking service

ReadNotify.com offers a detailed report of what happens with tracked e-mail messages or documents. The report includes details on rnwhen, where, on what type of PC, and for how long the traced information was viewed. It even includes a small map of where the individual who rnopened the mail or file is likely located, based on the Internet Protocol address of the computer.rn

rnAdditionally, if a message is forwarded, the report states the probable e-mail address of the individual it was sent on to. It also displays if a message is reopened by anyone.

  • Software
  • Account Information

    Share with Your Friends

    Images: ReadNotify’s tracking service

    Your email has been sent

Share: Images: ReadNotify's tracking service
Image of Bill Detwiler
By Bill Detwiler
Bill Detwiler is the Editor for Technical Content and Ecosystem at Celonis. He is the former Editor in Chief of TechRepublic and previous host of TechRepublic's Dynamic Developer podcast and Cracking Open, CNET and TechRepublic's popular online show.
  • Account Information

    Contact Bill Detwiler

    Your message has been sent

  • |
  • See all of Bill's content

TechRepublic Premium

  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to deploy an application with Kubernetes

    If you want to deploy applications into a Kubernetes cluster, be warned — it’s not the easiest task. There are a lot of moving pieces that go into these scalable containers. Don’t you wish you had a complete roadmap, from start to finish, to walk you through the process of deploying the Kubernetes cluster, deploying ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:51 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cross-training tool kit

    The more flexibility you can create in your technology workforce, the better you’ll be equipped to manage tomorrow, whatever the future brings. Too often, we focus on helping our teams become technical specialists who know volumes about a single technology, but quickly lose sight of how that technology connects with others. This makes their skills ...

    Downloads
    Published:  May 30, 2023, 4:00 PM EDT Modified:  May 31, 2023, 4:50 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice