473,413 Members | 1,757 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,413 software developers and data experts.

reading emails and being accused of hacking

1
Hi, Does anyone think that if you get someone's password and read their email is hacking??
May 18 '07 #1
2 897
bartonc
6,596 Expert 4TB
Hi, Does anyone think that if you get someone's password and read their email is hacking??
Well, if you "get" the password by evil means, then yes it's hacking.
If you are given a password for some other reason and use it to view things that you weren't given permission to view, then it just bad manners and I hope that you are filled with remorse about the incident.
May 18 '07 #2
pbmods
5,821 Expert 4TB
A friend of mine (we'll call him "Jeff") one time guessed his friend's ("Greg") voicemail password and was listening to the guy's messages for about a year before he finally told him.

Greg was so pissed with Jeff that he walked out of the house and started to drive away. Greg had to physically throw himself in front of the car to keep Jeff from leaving.

It took Greg a LONG time to get past it.

So if you happen to acquire a friend's email password, my recommendation is to:
  • Tell him about it so he can change his password, or
  • Forget about it.

But under no circumstances should you violate your friend's privacy. After all, if your friend discovered your email password, you wouldn't want him looking at your email.
May 19 '07 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

10
by: Simon Wigzell | last post by:
A client of mine has long used HTML format emails to promote his business, always to existing clients and contacts, not as spam. They have become more sophisticated over time adding javascript most...
1
by: chi | last post by:
Hi, Does anyone know web site describing techniques to read source codes written in C language (or any other languages) ? I would like to know systematized procedures of source hacking. ...
1
by: Richard Browne | last post by:
I have been developing a program that takes a database of email bodies and then displays them to the user in a similar way to Outlook Express would. The problem I'm having is showing only the...
2
by: martintillbrook | last post by:
I am using the simple mail() fucntion in a php script but the emails that are being generated and being trapped by Microsoft Exchange server 2003 Inteligent message filter as having an SCL rating...
0
by: James | last post by:
Using XML and the HttpWebRequest object, I'm easily able to authenticate an exchange user behind the scenes and retrieve a list of emails and the corresponding fields. For whatever sets of...
4
by: shmick30 | last post by:
Hi There, I am looping through and reading the body contents of a mail box with over 200 emails in it. The script is running very slow and timing out after 180 seconds, only getting through...
10
by: crazycooter | last post by:
I found an old thread on this (http://groups.google.com/group/alt.php/ browse_thread/thread/751edb9c723316c4/ea9bf92a9c6b807c?lnk=gst&q=mail() +duplicate&rnum=7#ea9bf92a9c6b807c), but there didnt...
0
by: =?Utf-8?B?Q2hhcmxlcw==?= | last post by:
Like many people, I normally use Yahoo! Mail via the web and like to keep all my emails stored on the Yahoo! server. However sometimes I can’t get access to a PC/the web and I download my emails...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.