How to Send Anonymous Email Attachments

laptop image by Dušan Zidar from Fotolia.com

Knowing how to send an anonymous email and attachment could come in handy. Play an April Fool's day prank on a friend. Send someone an anonymous love letter or funny picture. You can even use an online anonymous email tool when you don't wish to remain anonymous. Because the programs are completely web driven, you can log onto these sites anywhere you have an Internet connection. You can send documents to coworkers from any computer. Some anonymous email programs log IP addresses, so don't use these programs if you are doing anything that would get you into trouble.

Knowing how to send an anonymous email and attachment could come in handy. Play an April Fool’s day prank on a friend. Send someone an anonymous love letter or funny picture. You can even use an online anonymous email tool when you don’t wish to remain anonymous. Because the programs are completely web driven, you can log onto these sites anywhere you have an Internet connection. You can send documents to coworkers from any computer. Some anonymous email programs log IP addresses, so don’t use these programs if you are doing anything that would get you into trouble.

Log into an anonymous email program. There are a large variety of choices online. Send-email.org and Anonymouse.org are only two of the choices.

Type the recipient’s email address in the "To" field.

Fill in the subject line and the body of the email. Do not give away any personal information if you wish to remain anonymous.

Click on the link to add an attachment. Select the attachment from the drop down list. Wait until the attachment has been uploaded by the program.

Click "Send." Depending on the type of anonymous email program, the email will either be sent immediately or after a random period of time. Some programs offer increased security by sending the email after six to 12 hours. Some programs, like Anonymousspeech, claim that they do not register IP addresses.

Tips

  • It is difficult to know whether a program will truly eliminate IP address information from the email transmission. The IP address identifies the specific computer from which the email was sent.

References

About the Author

Lisa East Hunter is a consultant and freelance writer in Phoenix. Her background in marketing and technology led her to explore all avenues of writing. She is currently dividing her time between freelance writing and her consulting business. Hunter has a Bachelor of Science in management information systems and marketing.

Photo Credits