Jeff writes, "Filtered is a new free/open source IMAP mail filtering application which provides automated routing of email based on per sender settings. You can train Filtered via its web UI or by dragging and dropping email to folders in your email account. Filtered can also learn from the contents of your existing folders."
Filtered's advanced module also brings new kinds of features to mail:
* Quiet hours. Shut down your inbox during specific hours like weekday evenings and weekends while allowing specific senders emails e.g. family to come through
* Privacy folder. Drag emails to your secure folder and Filter will encrypt them to its server, then delete them from your NSA-browsable gmail account.
* Whitelisting. Automatically send challenge emails to unknown senders to require them to verify their identity before the message appears in your inbox. Unverified senders are held in a review folder.
* Smartphone alerts. Filtered can send notifications to your phone when messages from specific senders or with specific keywords arrive.
* Manage anonymous email accounts. Filtered makes it easier to route inbound mail from catch-all email addresses. This is useful for registering with companies using anonymous addresses to minimize data mining.
The coolest thing about Filtered is that it's a platform for reading, analyzing, routing and managing your email -- possibilities abound. Filtered is essentially a programmable playground for "hacking" your own email.
Filtered is written in PHP, in the Yii Framework. An installation guide is provided for typical GNU/Linux configurations. There is also a community support forum and a feature request board.
Filtered – Open Source IMAP Mail Filtering Software for PHP
The Shuttleworth Fellowships hand millions directly to people starting out on a journey to radically transform the world to make it more open; this year, I’m Honourary Steward, meaning I’ll help pick the grantees.
The Dirty Cow vulnerability dates back to code included in the Linux kernel in 2007, and it can be trivially weaponized into an easy-to-run exploit that allows user-space programs to execute as root, meaning that attackers can take over the entire device by getting their targets to run apps without administrator privileges.
Veracrypt was created to fill the vacuum left by the implosion of disk-encryption tool Truecrypt, which mysteriously vanished in 2014, along with a “suicide note” (possibly containing a hidden message) that many interpreted as a warning that an intelligence agency had inserted a backdoor into the code, or was attempting to force Truecrypt’s anonymous creators […]
With Xamarin, coders can develop native apps for both iOS and Android without learning two different programming languages. Obviously, hiring one programmer rather than two is beneficial for companies and makes Xamarin experts highly in demand.You can easily learn Xamarin online with this Xamarin Cross-Platform Development Bundle. It will teach you to use Xamarin and code […]
TV antennas are making a comeback, and the Ghost Indoor HDTV antenna is a great example of why. Unlike the old bunny ear-style antennas, this compact antenna is barely noticeable and picks up channels easily. Plus with the addition of streaming services like Netflix, we find ourselves with plenty to watch without a pricey monthly cable bill. The Ghost […]
I’ve never really felt the need to purchase a smartwatch because a lot of them aren’t very functional, but at just shy of $30, the Martian Notifier Smartwatch was worth checking out. For that low of a price, it actually does feature an impressive amount of functionality, and comes in handy when you don’t want to be carrying around your […]