TCF 389: Computer-Mediated Communication (CMC)
One-to-One CMC
E-Mail Basics: @'s, Smileys, Angle Brackets, and Sigs
Tracking Down E-Mail (and Other) Addresses
Paddling Through the Patois: Net Jargon
-
E-mail is a strange, hybrid form of communication taking its literal form
from written language, but incorporating a tone that is closer to speech.
-
E-mail communications are often less formal than written ones. Encouraging
this informality are abbreviations, typographic conventions, and computer-speak
patois that facilitate discourse among the initiated, but can be perplexing
to the clueless newbie (as new Internet users are inevitably tagged).
Some of the most common abbreviations you'll see in e-mail (typically done
all in caps) are:
BTW By The Way LOL Laughing Out Loud
GD&R Grinning, Ducking, and Running L8R [see you] Later
IMHO In My Humble Opinion FAQ Frequently Asked Questions
ROTFL Rolling On The Floor Laughing RTFM Read the Fucking Manual
Smileys or emoticons
Emoticons are punctuation marks that, when viewed sideways, resemble little
smiley faces
:)
Here are a few to get you started. Dave Barry lists some similar ones and
comes up with a
bunch
of his own for his book, Dave Barry in Cyberspace.
:-) smiley with a nose :-O shock
Q:-) smiley with a beret :( sadness, disappointment
;) irony or flirtation (a wink) :] goofiness
:-p derision (tongue sticking out) 8-) smiley with glasses
Angle brackets (the greater-than/less-than signs: <>) to indicate something
akin to stage directions in a play.
E.g., humility might be suggested like this:
<digging toe in sand>
Thank you for the kind words in your last message.
Or, the thrill of discovery might be indicated like this:
<slapping forehead>
I think it would be fun to run a newspaper!
Internet equivalents to underlining, italics, boldface, superscripts, or
other common typographic conventions:
_Putting an underscore before/after a phase equals underlining._
Asterisks before/after a word indicate *emphasis* (as if it were
italicized or bolded).
ALL CAPITALS also signifies EMPHASIS, but USING ALL CAPS ALL THE
TIME IS LIKE SHOUTING AND IS DISCOURAGED IN E-MAIL.
Sign Your Messages with a "Sig"
E-mail messages all have return addresses on them, but often they tell you
little about the human identity of the message sender. For this reason, it
is a good idea to identify yourself at the end of each message.
-
Many e-mail systems will automatically append a signature (or sig) to every
message. Usually this is done by creating a small text file (no underlining
or other formatting) that the e-mail program stamps onto your messages.
-
These should be short (no more than five lines) and about 70 characters (or
less) wide. Indeed, some e-mail processors will strip a sig from a message
if it is over five lines long. And the reason for the 70-character width
is so that your sig doesn't get rearranged by some funky word-wrap set-up
on the receiving computer.
My own sig flirts with these limitations:
Jeremy Butler
jbutler@ua.edu
ScreenSite http://www.tcf.ua.edu/ScreenSite/
Telecommunication & Film/University of Alabama/Tuscaloosa
Quoting a Message
-
When replying, good to quote a small portion of a msg to give the context
of your reply
-
Don't quote more than is necessary
-
Often > signs ("angle brackets" or "greater-than signs") are used to signify
quoted material
>Tried to run NS Nav 3 on my office's Mac computer. Someone else did the
>installation. It crashes the entire machine when you load it.
KER-blooey!
> Any idea what the prob is?
How e-mail works
-
Networked computers exchange messages--actually just data in packets
-
The information at the top of the message, before the body of it, is known
as the header
-
Hidden in some e-mail systems
-
In Pine, HdrMode reveals the full headers
-
Which indicates the route the message took to get from one point to another
as well as other information about how the message should be handled
-
E.g., the header from a message from Mary Beth Haralovich, chair of Media
Arts, to my mailbox in Alabama--which we may dissect line-by-line
-
Received: from SpoolDir by TCF_NET (Mercury 1.30); 15 Jul 97 10:07:11 CST
-
Return-path: <mbharalo@U.Arizona.EDU>
-
Received: from nevis.u.arizona.edu by tcf.ua.edu (Mercury 1.30) with SMTP;
15 Jul 97 10:07:08 CST
-
Received: from localhost (mbharalo@localhost) by nevis.u.arizona.edu
(8.8.5/8.8.5) with SMTP id IAA41376 for <jbutler@ua.edu>; Tue, 15
Jul 1997 08:58:04 -0700
-
Date: Tue, 15 Jul 1997 08:58:03 -0700 (MST)
-
From: Mary Beth Haralovich <mbharalo@U.Arizona.EDU>
-
To: Jeremy Butler <jbutler@ua.edu>
-
Subject: Lunch for Guests?
-
Message-ID:
<Pine.A32.3.93.970715085510.29142K-100000@nevis.u.arizona.edu>
-
MIME-Version: 1.0
-
Content-Type: TEXT/PLAIN; charset=US-ASCII
-
MIME = Multipurpose Internet Mail Extensions
-
SMTP = Simple Mail Transfer Protocol
-
ASCII (pronounced "ass-key") = American Standard Code for Information
Interchange
-
Messages are stored on these computers and may be accessed two ways:
-
User connects (dial-up or over the Internet) his/her local, client
computer (the one sitting in front of them) to the storing or host
or server computer and reads the messages that are stored
there--while maintaining the connection between the two. (Much
of the Internet is based on the client-server model.)
-
Messages remained physically stored on the host computer (until the user
deletes them).
-
E.g., using Telnet client to read your bama.ua.edu mail using
Pine; which is actually running on the distant machine and is just
being shown to you.
-
User connects to the message-storing computer, transfers the messages
to his/her client computer from the host and then breaks the connection.
-
He/she may then read, respond, and/or compose new messages while disconnected.
-
Although there are several ways to do this, the most common is POP3
(Post Office Protocol Version
3)
-
An e-mail client contacts a POP server and moves the messages from the distant
machine to the local one (the one sitting in front of the user)
-
But, this only works for receiving messages, to send them out
you must use a different type of server computer--one that provides SMTP
(Simple Mail Transfer Protocol)
-
An e-mail client contacts such an SMTP server and moves the messages from
the local machine to the distant one, which then takes care of distributing
them across the Internet.
-
User connect to message-storing computer, and the user chooses either
to transfer msgs or not!
-
IMAP (Internet Message Access Protocol)
-
"Allowing a client to access and manipulate electronic mail messages on a
server. It permits manipulation of remote message folders (mailboxes), in
a way that is functionally equivalent to local mailboxes."
(Free On-line Dictionary
of Computing)
-
E.g., bama.ua.edu
Attachments and Related Problems
-
Attachments are files attached to the main part of the message
-
Can be, e.g., word processing documents or images or sounds or whatever
-
Materials sent through e-mail protocols must be totally, only ASCII
-
Which makes attachments and non-English characters (like,
ñ ) problematic
-
But many e-mail clients have automated the whole process
-
E.g., Netscape's mail program
-
Pine, however, has not
-
HTML Mail
-
E-mail used to not allow any formating of text (e.g., italics, boldface)
-
More recent e-mail client software, however, uses HTML code to do so
-
E.g., NS Messenger, Eudora Pro (version 3+), MS Outlook
-
Not only can text be formatted, but images can be included
Many-to-Many CMC: Listserving and Newsgrouping
Clerical Robots: LISTSERV, Listprocessor, Maiser, and Majordomo
-
An e-mail discussion list takes the basic principle of cc'ing and automates
it.
-
Instead of a single human keeping a list of individual addresses and sending
e-mail to each of them, a discussion list is run by a computer a clerical
robot
-
e.g., LISTSERV, Listprocessor, Maiser, and Majordomo
-
'Bot compiles the addresses and automates the distribution of messages. Or,
in other words, this clerical robot serves messages to a list of addresses.
It is thus a listserver.
-
Listserving functions:
-
Subscription: The user has his/her e-mail address added to the list
through some sort of automated subscription process.
-
Distribution: After subscribing, the user receives every message sent
to the group. If a user wishes to send or post a message to the group, he/she
mails it in and the clerical robot automatically distributes it to every
address on the list. If the user does not wish to post messages, he/she may
just lurk around the list reading without posting.
-
Discussion threads: When a user replies to a list message, it also
is nabbed by the robot and distributed to every address on the list. Thus,
ongoing discussions, referred to as threads, on particular topics develop.
(Be careful when hitting that reply key to respond to a message from a list.
It's easy to send personal mail to the entire group by mistake. Remember:
replies to list messages typically go automatically to the entire group.)
-
Un-subscription: If the user becomes weary of receiving e-mail from
the robot, he/she tells it to unsubscribe him/her; and the robot takes his/her
address off the list.
-
Two separate functions with separate addresses:
-
The listserving robot named Maiser, LISTSERV, Listprocessor, Majordomo, etc.
-
The group of subscribers.
New Internet users often have trouble getting off of discussion lists. Suddenly,
their mailboxes are crammed with 50 messages a day from, say, SHY-K9S (discussion
of problems with shy and fearful dogs; I'm not making this up) and they can't
remember how to control this e-mail flood. Fortunately, almost all listserving
robots respond to the same method of unsubscribing. Just send e-mail to the
robot's address and not to the entire group, remember and put the following
in the first line of the message:
unsubscribe listname
In the case of SCREEN-L, for instance, you would e-mail LISTSERV@UA1VM.UA.EDU
and put unsubscribe SCREEN-L in the first line of your message.
One final note about discussion lists and the crush of mail they may generate:
Indexes and Digests
Most discussion lists allow you to receive their messages in a digest or
index format. A digest compiles the messages from a single day (or week),
creates a list of the day's messages, and then sends the list and the messages
themselves to the user in a single e-mail package rather than message by
message. This can be very handy for users who are charged for e-mail by the
number of messages.
An index takes the digest notion one step further. It consists solely of
the list of messages for each day (or week) usually with their subject headings
and posters' names and does not include the messages themselves. Users who
receive a list's index may then request the specific messages in which they're
interested.
Sample index:
There are 21 messages totalling 1009 lines in this issue.
Topics of the day:
1. 'Contact' and virtual people -- beating an illusory horse ?
2. fwd: film and media studies position at UC Riverside
3. Chair's Report
4. Trailer ethics (4)
5. Super 8 on the big screen (2)
Worldwide LISTSERV®
statistics
(Wed, 20 May 1998)
|
Number of public lists |
18,452 |
Number of local lists |
61,130 |
Total number of lists |
79,582 |
Total membership (public+local) |
29,748,499 |
Total messages delivered today |
26,397,893 |
Total delivered using
LSMTP |
13,877,964
(52.6% of total) |
Finding Lists
-
CataList, the official
catalog of LISTSERV® lists
-
Browse any of the 18,452 public
LISTSERV® lists on the Internet
-
The List of
Lists
-
Search through bazillions more lists--including ones that are not run on
LISTSERV®
-
ScreenSite's listing of
film/TV-related
discussion groups
Required Lists for TCF389
-
Eupage
-
E-mail listproc@educom.unc.edu with the message subscribe edupage
YourName
-
TCF389@tcf.ua.edu
-
E-mail maiser@tcf.ua.edu with the message subscribe TCF389
-
Internet Tourbus
-
Email LISTSERV@LISTSERV.AOL.COM with the message SUBSCRIBE TOURBUS
YourName
Usenet: It's Kind of Like E-Mail, But Not Really
Usenet doesn't work quite like regular e-mail though. Instead of sending
messages to your e-mail box, Usenet functions more like bulletin boards in
a (very busy) hallway with many corridors connecting to it. On one bulletin
board are notices and comments about film, while another might contain comments
on Seinfeld, and a third might have suggestions for ways to execute Barney
(the dinosaur).
In Usenet, the electronic equivalent of these bulletin boards is called a
newsgroup (though they have little to do with the news), and, just
as with a cork bulletin board, the messages in a newsgroup don't come to
you, you must go find them. To read newsgroups, you must first connect your
computer to another computer that stores Usenet messages. Many universities'
computers provide Usenet access, as do commercial information services such
as America Online and Prodigy. These central computers all connect with one
another and share the messages that are posted to newsgroups.
Usenet Pointers
-
Use a newsreader program or Netscape Navigator to access newsgroups
-
Newsgroups are arranged in hierarchies
-
Read the FAQ's (Frequently Asked Questions) before posting
-
Binary files and images may be attached to msgs using UUENCODE
-
NS Nav and MS Internet Explorer encode/decode attachments for you
-
Many Usenet resources have been collected at
http://www.duke.edu/~mg/usenet/
Official Usenet Primer:
Source: news.newusers.questions, archived at
http://crew.umich.edu/~chymes/Hoaxes/newusers/Usenet_Guidelines
-
Never forget that the person on the other side is human.
-
Don't blame system admins for their users' behavior.
-
Never assume that a person is speaking for their organization.
-
Be careful what you say about others.
-
Be brief.
-
Your postings reflect upon you; be proud of them.
-
Use descriptive [subject heading] titles
-
Think about your audience.
-
Be careful with humor and sarcasm.
-
Only post a message once.
-
Please rotate material with questionable content.
-
Summarize what you are following up.
-
Use mail, don't post a follow-up.
-
Read all follow-ups and don't repeat what has already been said.
-
Double-check follow-up newsgroups and distributions.
-
Be careful about copyrights and licenses.
-
Cite appropriate references.
-
When summarizing, summarize.
-
Mark or rotate answers or spoilers.
-
Spelling flames considered harmful.
-
Don't overdo signatures.
-
Limit line length and avoid control characters.
-
Please do not use Usenet as a resource for homework assignments.
-
Please do not use Usenet as an advertising medium.
-
Avoid posting to multiple newsgroups.
A few film/TV newsgroups:
Cult movies alt.cult-movies
Stanley Kubrick alt.movies.kubrick
Steven Spielberg alt.movies.spielberg
SFX alt.movies.visual-effects
Martin Scorsese alt.movies.scorsese
Silent film alt.movies.silent
David Letterman alt.fan.letterman
Quentin Tarantino alt.fan.quentin-tarantino
The Simpsons alt.tv.simpsons
Mystery Science Theater 3000 alt.tv.mst3k
Film production rec.arts.movies.production
Science fiction movies rec.arts.sf.movies
Television rec.arts.tv
Instantaneous ("Real-Time") CMC
-
Chat Rooms and Channels
-
"Internet Phone": Audio Over the Internet
-
CU-SeeMe: Chat With Sound & Pictures
-
Real-Time Audio/Video (one-way, streaming)
CMC Hazards
1. E-mail (In)Security
-
At most locations, the computer system administrator or postmaster can read
any mail stored on that system.
-
Moreover, as your mail travels an electronic route it can be read by just
about any system administrator along the way.
-
Employers own company e-mail.
-
Hackers/crackers may sniff for keywords like "VISA" or "password"
-
Protect yourself with encryption
-
Scramble your message using a specific key that you and your addressee both
know. When he/she receives the message, he/she uses the key to decrypt it.
-
Pretty Good Privacy (PGP)
2. Guard Your Own Privacy With Little Common Sense
As the Internet grows, its population becomes more and more diverse. This
makes for greater opportunities to contact persons outside your social circle,
but it also means that there are more chuckleheads out there as well.
Consequently, just as one wouldn't post one's phone number or other personal
information on a lamppost on a busy street corner, so one should think twice
before posting such items to a discussion group or a Usenet newsgroup.
Also, it is inevitable that somewhere along your Internet travels you'll
encounter individuals who say rude or offensive things. In computer patois
this is known as a flame, which may be used as a verb as well as a noun:
"Man, I can't believe that that chump flamed me just because I said Hugo
Haas made better films than Peter Greenaway."
In my experience, the best treatment for flames is to extinguish them with
the delete key. To engage the enemy typically leads to a flame war, in which
there are few winners.
3. E-Mail Fraud: Fake or Anonymous Messages
Every e-mail message you receive will have a return address on it so that
you can be assured of the message's author, but this assurance is actually
false. It is quite simple to fake a message's return address. So, if you
receive a message ostensibly from bclinton@whitehouse.gov that contains an
attack on your erudite analysis, "Discursive Strategies in The Jetsons:
Jane, Stop This Crazy Thing,'" you might pause for a second before engaging
our Chief Executive Officer in a flame war.
Also, there is a controversial device on the Internet for erasing return
addresses from messages, and thus making them anonymous. Anonymous re-mailers
accept messages, remove any identifying markers from them, and then re-mail
them to an address.
I feel a bit ambivalent about this service. On the one hand I can see how
it would be helpful to those participating in anonymous, 12-step programs,
but on the other it seems to encourage irresponsible e-mailing.
If you'd like to explore your own ambivalences about anonymous re-mailers,
you can get further information by e-mailing help@anon.penet.fi and putting
the word help in the first line of your message (leave the subject line blank).
Examining the message headers can often tell you where the message
really came from.
E.g., the header from a spam I received today (7/16/97):
Fake address:
Return-Path: <ted@INTERNET.NET>
Received: from UA1VM (NJE origin V2SMTP-O@UA1VM) by UA1VM.UA.EDU (LMail
V1.2a/1.8a) with BSMTP id 8697; Mon, 14 Jul 1997 19:17:30 -0500
Real location:
Received: from phyleus.interlinx.qc.ca (206.116.184.6) by UA1VM.UA.EDU
(IBM VM SMTP V2R3) with TCP; Mon, 14 Jul 97 19:17:28 CDT
Real location:
Received: from rr (slpp-149.interlinx.qc.ca [207.134.144.169]) by
phyleus.interlinx.qc.ca (8.8.6/8.8.6) with SMTP id NAA07473; Mon, 14 Jul
1997 13:03:34 -0400
Real message ID:
Message-Id: <199707141703.NAA07473@phyleus.interlinx.qc.ca>
Fake address:
To: random7@internet.net
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Priority: normal
X-mailer: Pegasus Mail for Win32 (v2.52)
Date: Mon, 14 Jul 1997 13:02:07 -0400
Fake address (one that appeared in "From" line in my mailer)
From: ted@internet.net
Subject: $50,000 IN THREE MONTHS -- READ THIS TWICE!!
How to deal with spammers
-
E-mail the real mailer's postmaster or abuse person
-
E.g., postmaster@interlinx.qc.ca
-
E.g., abuse@aol.net or abuse@aol.com
-
Look up real name of the company and contact them
-
Through InterNIC:
http://rs.internic.net/cgi-bin/whois
-
E.g., internet.net is
-
Internet Shopping Network, Inc. INTERNET51-DOM
-
3475 Deer Creek Road
-
Palo Alto, CA 94304
-
Domain Name: INTERNET.NET
-
Administrative Contact, Technical Contact, Zone Contact:
-
Davis, Eric [Senior Network Engineer] ED18 ericd@CYBERFARM.COM
-
408-335-3508 408-541-4100 (FAX) 408-335-3508
-
Billing Contact:
-
Finance Department FD89-ORG finance@ISN.COM
-
415-842-7400
-
Fax- 415-842-7415
-
Doesn't always work
-
Do not reply to the fake address with a complaint
-
Usually it'll just bounce back
-
Sometimes spammers pick a real person's name as a way to harass them
-
Some spammers use responses as as cofirmation that your address works and
increase the spam
-
Some even ask for a reply, promising to take your name off their list, but
then just use it as a confirmation!
-
Filter your e-mail
-
Many e-mail clients will automatically delete messages with particular subjects
-
E.g., "!!!!!!!!" or "Sex" or "Make Money Fast"
-
Or from particular locations
-
E.g., Cyberpromotions--which is now (1998) out of business
4. E-Mail Obesity: Keeping Your Mailbox Lean and Mean
With an e-mail account, one's mailbox need never be empty. Indeed, it's easy
to be overwhelmed by the amount of e-mail one receives. If you subscribed
to all of the film/TV discussion lists, you'd receive several hundred pieces
of mail every day. The amount of mail, or traffic, on lists varies
considerably. CINEMA-L averages about 30-40 messages per day, while SCREEN-L
averages only a dozen (though it can go as high as 50), and smaller lists
might distribute just one message every day or two.
To avoid a congested mailbox:
-
Squirrel away a copy of the list's instructions so that you might unsubscribe
quickly. It's a good idea to start a folder containing list instructions.
-
If the volume of a list is too great, switch to a digest or index version
of it.
-
Don't subscribe to more than one list at a time. Get a sense of how busy
a new list is before you add new ones.
-
Review the list's archives to see how many messages are in it. SCREEN-L and
many other lists have archives that are available via e-mail, Gopher, and/or
the World Wide Web.
-
Every list has a human somewhere that maintains it some more actively than
others. This human's address will be contained in the list instructions or
may be obtained by sending the command review listname to the listserving
robot. If you are having trouble with the robot, contact the human; but make
an effort to resolve the problem on your own first. Otherwise, depending
on how harried the human is, you may be told RTFM.
-
Sample the list's Usenet newsgroup (if one exists) to see how busy it is.
5. E-Mail Viruses and Other Hoaxes
Computer viruses are a real and significant problem, but they are not
transmitted in e-mail messages.
Every once in a while there will be a scare that viruses are somehow being
distributed in e-mail. These scares invariably turn out to be deliberate
hoaxes (as was a recent one involving America Online) or mistakes by well-meaning
novices. To date there are no documented cases of viruses being transmitted
via e-mail (to my knowledge). There are technical reasons why e-mail is virtually
virus-proof, but suffice to say that viruses must be transmitted through
the exchanging of infected disks and/or the execution of virus-laden software.
Thus, it is important to frequently check your hard disk for viruses (I scan
mine every day), but one need not worry about an e-mail virus wreaking havoc
on your system.
BUT e-mail attachments may contain files with viruses in them.
E.g., there are several MS Word macro viruses (e.g., "wazoo") out there.
It's launched when you open a Word document attached to a message.
You can separate the hoaxes from the real threats by visiting:
Sexual (And Other) Harassment in CMC
-
Chat rooms and other instantaneous CMC can attract chowderheads whose sole
interest is to harass women. Some caution is advisable.
-
Use a gender-neutral name
-
Use the "bozo filtering" capabilities of your client software
-
Most CMC software allows you to block messages from specific persons
-
Last revised: May 21, 1998