How to automatically generate and email computer statistics

No help available.

This data type lets you generate a column of data that has repeating values from row to row. Here’s a couple of examples to give you an idea of how this works.

  • If you’d like to provide the value “1” for every row, you can enter “1” in the Value(s) field and any value (>0) in the Loop Count field.
  • If you’d like to have 100 rows of the string “Male” followed by 100 rows of the string “Female” and repeat, you can enter “100” in the Loop Count field and “Male|Female” in the Value(s) field.
  • If you’d like 5 rows of 1 through 10, enter “5” for the Loop Count field, and “1|2|3|4|5|6|7|8|9|10” in the Value(s) field.

Try tinkering around with it. You’ll get the idea.

The Composite data type lets you combine the data from any other row or rows, and manipulate it, change it, combine the information and more. The content should be entered in the Smarty templating language.

To output the value from any row, just use the placeholders , , etc. You cannot refer to the current row – that would either melt the server and/or make the universe implode.

Here are a few examples:

  • Display a value from row 6:
  • Assuming row 1 and row 2 contain random numbers, the following are examples of some simple math:
    • – subtraction
    • – multiplication
    • <$ROW2/$ROW1> – division
  • If row 1 contains the number 5, display “N/A”, otherwise just display the number. N/A

Please see the Smarty website for more information on the syntax.

This data type lets you generate tree-like data in which every row is a child of another row – except the very first row, which is the trunk of the tree. This data type must be used in conjunction with the Auto-Increment data type: that ensures that every row has a unique numeric value, which this data type uses to reference the parent rows.

The options let you specify which of your form fields is the appropriate auto-increment field and the maximum number of children a node may have.

Enter a list of items, separated by a pipe | character. Then select whether you want Exactly X number of items, or At most X items from the list. Multiple items are returned in a comma-delimited list in the results. If you want your data set to include empty values, just add one or more pipe characters at the end – the more pipes you enter, the greater the probability of an empty value being generated.

The Computed Data Type gives you access to the metadata about fields in the row to let you generate whatever output you want based on that information. If you just need to access the generated string value from another field (i.e. what you see in the output), see the Composite Data Type. This field type gives you much more access to each field.

, etc. contain everything available about that particular row. The content changes based on the row’s Data Type and what has been generated, but high-level it contains the following properties:

  • – whatever options were entered in the interface/API call for the row
  • – any additional metadata returned for the Data Type
  • – the actual generated random content for this field (always in a “display” property) plus any other information about the generated content
  • – a handy JSON-serialization of everything in the row, so you can see what’s available. Just run it through a JSON formatter.


  • – will output the gender (“male”, “female” or “unknown”) of the generated content of a Names Data Type field (be sure to replace “1” with the right row number!). If you used FemaleName as the placeholder string this variable will return “female” every time. If you entered “Name”, the value returned will depend on the generated string. If you entered a placeholder string with multiple formats, it will return “unknown” if it contained both genders, or no genders (e.g. a surname without a first name).

De-nied. In order to share this Data Set with other people, you need to save it first.

I understand that to share this Data Set, I need to make it public.

Before you begin, open a blank document in Word and type the body of the email message you want to send.

To send an email, a MAPI-compatible email program like Outlook or Gmail needs to be installed.

Step 1: Prepare your main document

Go to Mailings > Start Mail Merge > E-mail Messages.

How to automatically generate and email computer statistics

Step 2: Set up your mailing list

The mailing list is your data source. For more info, see Data sources you can use for a mail merge.

If you don’t have a mailing list, you can create one during mail merge.

If you’re using an Excel spreadsheet, format the ZIP Codes or postal codes column as text to preserve any zeros. For more info see Format mail merge numbers, dates, and other values in Excel.

If you want to use your Outlook contacts, make sure Outlook is your default email program and the same versions as Word.

Make sure your data source has a column for email addresses and that there’s an email address for everyone you’re sending email to.

Go to Mailings > Select Recipients.

Choose a data source. For more info, see Data sources you can use for a mail merge.

Choose File > Save.

If you need to edit, sort, or filter your mailing list, see Mail merge: Edit recipients.

Go to Mailings > Greeting Line.

Choose the format you want to use.

Choose OK to insert the merge field.

Choose File > Save .

You can add other fields from your data source to your email message. For more information, see Insert mail merge fields.

Note: You’ll need to format your email manually after inserting fields.

If any part of your address or other fields are missing, see Mail merge: Match Fields to fix.

To change the font, size, or spacing of the merged content, select the merge field name and make the changes you want.

Choose Preview Results, and then choose Next or Previous to see the names and addresses in the body of your letter.

Choose Finish & Merge > Send E-mail Messages.

How to automatically generate and email computer statistics

In the To box, choose the email address column or field from your mailing list.

Note: Word sends an individual message to each email address. You can’t Cc or Bcc other recipients. You can include links, but you can’t add attachments to the email.

In the Subject line box, type a subject line for the message.

In the Mail format box, choose HTML (the default setting) or Plain text to send the document as the body of the email message.

Under Send records, use one of the following:

All records (default).

Current record only the record viewable on your screen is sent the message.

From and To send only a range of records.

Choose OK to run mail merge.

Go to File > Save. When you save the main document, you also save its connection to the data source. To reuse, open the document and answer Yes when prompted to keep the connection to the data source.

See also

Before you begin, open a blank document in Word and type the body of the email message you want to send.

To send an email, a MAPI-compatible email program like Outlook or Gmail needs to be installed.

Step 1: Create a main document in Word

Go to Mailings > Start Mail Merge > Email Messages.

How to automatically generate and email computer statistics

In Word, type the email message you want to send.

Step 2: Set up your mailing list

The mailing list is your data source. For more info, see Data sources you can use for a mail merge.

If you don’t have a mailing list, you can create one during mail merge.

If you’re using an Excel spreadsheet, format the ZIP Codes or postal codes column as text to preserve any zeros. For more info see Format mail merge numbers, dates, and other values in Excel.

If you want to use your Outlook contacts, make sure Outlook is your default email program and is the same version as Word.

Make sure your data source has a column for email addresses and that there’s an email address for everyone you’re sending email to.

Go to Mailings > Select Recipients.

Choose a data source. For more info, see Data sources you can use for a mail merge.

Choose File > Save.

If you need to edit, sort, or filter your mailing list, see Mail merge: Edit recipients.

Go to Mailings > Insert Merge Field, and then choose the fields to add.

In your main document, select Drag fields into this box or type text, and click or tap the text to remove it.

Add and format the fields you want to be included in the email message, and choose OK.

Go to Mailings > Preview Results to see how the email messages look.

Use the left and right arrow buttons on the Mailings tab, to scroll through each email message.

Select Preview Results again to add or remove merge fields.

When ready, go to Mailings > Finish & Merge > Merge to E-Mail.

Merge to E-Mail is unavailable if you have not selected your default email program.

Choose the To merge field, the subject, and whether to send as text, HTML, or as an attachment. When you send as an attachment, the email has no body text, but the message is sent as an attached document.

Find out who’s emailed you the most and more

Just about every corporate email account is using Outlook and Exchange server to handle user email and there is an awful lot of data stored in those PST files. My own work PST file for Outlook is close to 2 Gb, which is why I wrote a post on how to optimize your PST file so that Outlooks runs faster.

Before switching to Gmail completely, my personal email file was over 10 GB! Now that’s huge! It was basically 8 years worth of emails. Even though Outlook lets you organize your email into folders, etc., it really has no statistics about your email usage.

Who is the person you have written the most emails to? Who is the person you have received the most emails from? Who has ended up sending you the most data via email? What was the first and last message you received from a particular person?

How to automatically generate and email computer statistics

That’s where you need third party programs to analyze your PST file and tell you all kinds of useful statistics. Previously, I had written about how you can search your emails by size, date, sender, etc., but it’s a lot of work.

Searching is really useful for finding emails, attachments, etc. from particular people. If you want some basic statistics on your email, check out a program called OutlookStatView from Nirsoft.

OutlookStatView – Stats for Outlook

OutlookStatView is a simple program that scans your Outlook PST file and gives you some basic statistics about the people you communicate with.

How to automatically generate and email computer statistics

Basically, for every person that you have ever emailed or that has emailed you, you get the following set of information:

  • Number of outgoing emails that you sent to the person broken down by TO/CC/BCC
  • Number of incoming emails that the person sent to you
  • Total size of all emails sent to you by the person
  • The email client that was used by the person
  • The time range that you sent/received emails from the person

The cool thing about the program is that you don’t have to install OutlookStatView into Outlook as an add-on. It’s a standalone program that will automatically scan your PST file whether Outlook is open or not.

If you have several Outlook profiles, make sure to log into the one you want scanned before starting OutlookStatView. You can also export the whole thing as a HTML report for later viewing.

It doesn’t take the program very long to scan a very large email box either, about 2 minutes for a 1.5 GB file. Not bad! Overall, it’s fairly simplistic, but it’s useful if you want to learn about who you communicate most often with via email.

If you are interested in even more analytical data about your email, there are several additional paid add-ins that can generate graphs and give you a lot more metrics.

I haven’t used any of these, but after reviewing their websites, they all seem to be good options. Hopefully, that’ll give you enough stats about your email! Enjoy!

Founder of Help Desk Geek and managing editor. He began blogging in 2007 and quit his job in 2010 to blog full-time. He has over 15 years of industry experience in IT and holds several technical certifications. Read Aseem’s Full Bio

Technical Level : Basic

Would you like to create a new, free email account using Microsoft Here’s how you can open a new email account. You will be asked to “Open a Microsoft Account”, you can use this same web page to create a new email account.

To create a new email account on

1. Connect to Microsoft, using this link .

a. Note: This link will lead you to the Microsoft Account page.
You will use this page to create a new email account.
Don’t let the page title throw you off. You are on the right page!

2. Add your name (and a few more fields), then add the email name you’d like to use.

a. Note: The site will let you know if this email name is available or if by chance,

someone else has already selected this same email name.

If someone else already is using it, select a new, unique email name.

3. Add the other requested information.

a. Tip: You will be requested to add 2 ways Microsoft can to get ahold of you,

so think of an alternate email account and phone number to provide.

4. After you complete the steps, a new email address will be created.
You will automatically be connected to your new email account,
and you can send your first email.

5. You can check your email: from anywhere, by connecting to: .

a. Note: If you are using the same computer you used when you created your new email, you won’t have to enter your password. When you use a different computer, laptop, tablet, or phone – you can easily check your email by entering your email address and password. Enjoy emailing.

How to automatically generate and email computer statistics

Computers generate random number for everything from cryptography to video games and gambling. There are two categories of random numbers — “true” random numbers and pseudorandom numbers — and the difference is important for the security of encryption systems.

Computers can generate truly random numbers by observing some outside data, like mouse movements or fan noise, which is not predictable, and creating data from it. This is known as entropy. Other times, they generate “pseudorandom” numbers by using an algorithm so the results appear random, even though they aren’t.

This topic has become more controversial recently, with many people questioning whether Intel’s built-in hardware random number generator chip is trustworthy. To understand why it might not be trustworthy, you’ll have to understand how random numbers are generated in the first place, and what they’re used for.

What Random Numbers Are Used For

Random numbers have been used for many thousands of years. Whether it’s flipping a coin or rolling a dice, the goal is to leave the end result up to random chance. Random number generators in a computer are similar — they’re an attempt to achieve an unpredictable, random result.

Random number generators are useful for many different purposes. Aside from obvious applications like generating random numbers for the purposes of gambling or creating unpredictable results in a computer game, randomness is important for cryptography.

Cryptography requires numbers that attackers can’t guess. We can’t just use the same numbers over and over. We want to generate these numbers in a very unpredictable way so attackers can’t guess them. These random numbers are essential for secure encryption, whether you’re encrypting your own files or just using an HTTPS website on the Internet.

How to automatically generate and email computer statistics

True Random Numbers

You may be wondering how a computer can actually generate a random number. Where does this “randomness” come from. If it’s just a piece of computer code, isn’t it possible the numbers the computer generates could be predictable?

We generally group the random numbers computers generate into two types, depending on how they’re generated: “True” random numbers and pseudo-random numbers.

To generate a “true” random number, the computer measures some type of physical phenomenon that takes place outside of the computer. For example, the computer could measure the radioactive decay of an atom. According to quantum theory, there’s no way to know for sure when radioactive decay will occur, so this is essentially “pure randomness” from the universe. An attacker wouldn’t be able to predict when radioactive decay would occur, so they wouldn’t know the random value.

For a more day-to-day example, the computer could rely on atmospheric noise or simply use the exact time you press keys on your keyboard as a source of unpredictable data, or entropy. For example, your computer might notice that you pressed a key at exactly 0.23423523 seconds after 2 p.m.. Grab enough of the specific times associated with these key presses and you’ll have a source of entropy you can use to generate a “true” random number. You’re not a predictable machine, so an attacker can’t guess the precise moment when you press these keys. The /dev/random device on Linux, which generates random numbers, “blocks” and doesn’t return a result until it gathers enough entropy to return a truly random number.

How to automatically generate and email computer statistics

Pseudorandom Numbers

Pseudorandom numbers are an alternative to “true” random numbers. A computer could use a seed value and an algorithm to generate numbers that appear to be random, but that are in fact predictable. The computer doesn’t gather any random data from the environment.

This isn’t necessarily a bad thing in every situation. For example, if you’re playing a video game, it doesn’t really matter whether the events that occur in that game are caused by “true” random numbers or pseudorandom numbers. On the other hand, if you’re using encryption, you don’t want to use pseudorandom numbers that an attacker could guess.

For example, let’s say an attacker knows the algorithm and seed value a pseudorandom number generator uses. And let’s say an encryption algorithm gets a pseudorandom number from this algorithm and uses it to generate an encryption key without adding any additional randomness. If an attacker knows enough, they could work backwards and determine the pseudorandom number the encryption algorithm must have chosen in that case, breaking the encryption.

How to automatically generate and email computer statistics

The NSA and Intel’s Hardware Random Number Generator

To make things easier for developers and help generate secure random numbers, Intel chips include a hardware-based random number generator known as RdRand. This chip uses an entropy source on the processor and provides random numbers to software when the software requests them.

The problem here is that the random number generator is essentially a black box and we don’t know what’s going on inside it. If RdRand contained an NSA backdoor, the government would be able to break encryption keys that were generated with only data supplied by that random number generator.

This is a serious concern. In December 2013, FreeBSD’s developers removed support for using RdRand directly as a source of randomness, saying they couldn’t trust it. [Source] The output of the RdRand device would be fed into another algorithm that adds additional entropy, ensuring that any backdoors in the random number generator wouldn’t matter. Linux already worked in this way, further randomizing the random data coming from RdRand so that it wouldn’t be predictable even if there was a backdoor. [Source] In a recent AMA (“Ask Me Anything”) on Reddit, Intel CEO Brian Krzanich did not answer questions about these concerns. [Source]

Of course, this likely isn’t just a problem with Intel chips. FreeBSD’s developers called out Via’s chips by name, too. This controversy shows why generating random numbers that are truly random and aren’t predictable is so important.

How to automatically generate and email computer statistics

To generate “true” random numbers, random number generators gather “entropy,” or seemingly random data from the physical world around them. For random numbers that don’t really need to be random, they may just use an algorithm and a seed value.

In this article, I shall show you how to pull / extract or get data from a website into Excel automatically. This is one of the most used Excel features for those who use Excel for their data analysis job. If you are working for a financial analyst company, you might need to get or import daily stock prices from a website to your Excel workbook for analysis.

So, let’s learn the technique…

Extracting data (data collection and update) automatically from a web page to your Excel worksheet might be important for some jobs. Excel gives you the opportunity to collect data from a web page.

Yes, Excel is awesome like that!!

Let’s dive into the process of helping you out.

But first, a word of caution: the web page must have data in collectible formats like Table or Pre-data format. Otherwise, it would be another battle to convert it to a readable or excel-able format. You see text to columns feature isn’t always your best friend.

So, we shall assume your life is easy like that and you have a website that has data in a compatible excel-able format.

Extract Data from Google Finance Page to Excel Automatically

We will be using Excel’s From Web Command in the Data ribbon to collect data from the web. Say, I want to collect data from this page.

How to automatically generate and email computer statistics

It is Google’s finance-related web page.

In the Excel worksheet, open the Data ribbon and click on the From Web command.

How to automatically generate and email computer statistics

New Web Query dialog box appears.

In the address bar, I paste the address of Google’s finance web page: Then I click on the Go button, placed right after the address bar.

How to automatically generate and email computer statistics

The same web page comes in the query dialog box. Now spot the yellow arrows near the query box.

How to automatically generate and email computer statistics

Move your mouse pointer over the yellow arrows. You see a zone is highlighted with a blue border and the yellow arrow becomes green.

How to automatically generate and email computer statistics

[click on the image to get a full view]

How to automatically generate and email computer statistics

[Click on the image to get a full view]

Now I click on the Import button. Import Data dialog box appears. It asks me about the location. Currently, I am planning to save it in cell A1, you can save it anywhere and everywhere.

You might see a cryptic message or two when you hit OK. Relax those aren’t aliens trying to contact you, just your worksheet is populating data.

How to automatically generate and email computer statistics

You see the data is inserted into the worksheet.

Now let me show you where Excel did the flip. I scroll down and find this column blank.

How to automatically generate and email computer statistics

When I checked the website I found that there was a chart there which Excel was not able to pull. So, you have to be careful about what you are taking from a web page.

Now, you have got the data and can begin working and manipulating it.

The most important/interesting thing to note here is: you don’t have to pull the updated data from time to time.

How to Refresh Excel Data for Any Update

You can manually or automatically refresh the data. How? Say Abracadabra! No, am just kidding. (But it’s almost like magic).

Click on the drop-down part of the Refresh All command.

How to automatically generate and email computer statistics

You can click on Refresh if you think you have only one data and you can click on Refresh All if you think you have more than one data to be refreshed.

How to automatically generate and email computer statistics

You can even set a time period for refreshing data automatically. Click on this Connection Properties option from the list.

How to automatically generate and email computer statistics

Connection Properties dialog box appears.

How to automatically generate and email computer statistics

You can name the connection. Add a description to it.

Under Refresh Control, you get a command Refresh Every (by default 60 minutes), you can change it.

Or you can choose the option Refresh Data when opening the file. I click OK. So, the data of this worksheet will be updated when I will open the worksheet.

Read More:

So, this is how you can pull data from a web page, manipulate the data in your own way, and then you can set when the data will be updated automatically.

We have explained why random allocation of treatments is a required feature of controlled trials.1 Here we consider how to generate a random allocation sequence.

Almost always patients enter a trial in sequence over a prolonged period. In the simplest procedure, simple randomisation, we determine each patient’s treatment at random independently with no constraints. With equal allocation to two treatment groups this is equivalent to tossing a coin, although in practice coins are rarely used. Instead we use computer generated random numbers. Suitable tables can be found in most statistics textbooks. The table shows an example2: the numbers can be considered as either random digits from 0 to 9 or random integers from 0 to 99.

For equal allocation to two treatments we could take odd and even numbers to indicate treatments A and B respectively. We must then choose an arbitrary place to start and also the direction in which to read the table. The first 10 two digit numbers from a starting place in column 2 are 85 80 62 36 96 56 17 17 23 87, which translate into the sequence A B B B B B A A A A for the first 10 patients. We could instead have taken each digit on its own, or numbers 00 to 49 for A and 50 to 99 for B. There are countless possible strategies; it makes no difference which is used.

We can easily generalise the approach. With three groups we could use 01 to 33 for A, 34 to 66 for B, and 67 to 99 for C (00 is ignored). We could allocate treatments A and B in proportions 2 to 1 by using 01 to 66 for A and 67 to 99 for B.

At any point in the sequence the numbers of patients allocated to each treatment will probably differ, as in the above example. But sometimes we want to keep the numbers in each group very close at all times. Block randomisation (also called restricted randomisation) is used for this purpose. For example, if we consider subjects in blocks of four at a time there are only six ways in which two get A and two get B:

1: A A B B 2: A B A B 3: A B B A 4: B B A A 5: B A B A 6: B A A B

We choose blocks at random to create the allocation sequence. Using the single digits of the previous random sequence and omitting numbers outside the range 1 to 6 we get 5 6 2 3 6 6 5 6 1 1. From these we can construct the block allocation sequence B A B A / B A A B / A B A B / A B B A / B A A B, and so on. The numbers in the two groups at any time can never differ by more than half the block length. Block size is normally a multiple of the number of treatments. Large blocks are best avoided as they control balance less well. It is possible to vary the block length, again at random, perhaps using a mixture of blocks of size 2, 4 or 6.

Excerpt from a table of random digits. 2 The numbers used in the example are shown in bold

While simple randomisation removes bias from the allocation procedure, it does not guarantee, for example, that the individuals in each group have a similar age distribution. In small studies especially some chance imbalance will probably occur, which might complicate the interpretation of results. We can use stratified randomisation to achieve approximate balance of important characteristics without sacrificing the advantages of randomisation. The method is to produce a separate block randomisation list for each subgroup (stratum). For example, in a study to compare two alternative treatments for breast cancer it might be important to stratify by menopausal status. Separate lists of random numbers should then be constructed for premenopausal and postmenopausal women. It is essential that stratified treatment allocation is based on block randomisation within each stratum rather than simple randomisation; otherwise there will be no control of balance of treatments within strata, so the object of stratification will be defeated.

Stratified randomisation can be extended to two or more stratifying variables. For example, we might want to extend the stratification in the breast cancer trial to tumour size and number of positive nodes. A separate randomisation list is needed for each combination of categories. If we had two tumour size groups (say ≤4 and >4cm) and three groups for node involvement (0, 1-4, >4) as well as menopausal status, then we have 2×3×2=12 strata, which may exceed the limit of what is practical. Also with multiple strata some of the combinations of categories may be rare, so the intended treatment balance is not achieved.

In a multicentre study the patients within each centre will need to be randomised separately unless there is a central coordinated randomising service. Thus “centre” is a stratifying variable, and there may be other stratifying variables as well.

In small studies it is not practical to stratify on more than one or perhaps two variables, as the number of strata can quickly approach the number of subjects. When it is really important to achieve close similarity between treatment groups for several variables minimisation can be used—we discuss this method in a separate Statistics note.3

We have described the generation of a random sequence in some detail so that the principles are clear. In practice, for many trials the process will be done by computer. Suitable software is available at

We shall also consider in a subsequent note the practicalities of using a random sequence to allocate treatments to patients.

Today we are almost entirely dependent on hackable technology. Your phone, your computers, your car, your bank and credit card purchases, even your smart home devices and alarm systems (IoT) can be hacked into.

In fact, a hacker attack takes place worldwide every 39 seconds, affecting one in three Americans each year.

In the following article, you’ll get a chance to see some cybercrime statistics from a variety of dependable sources that will help you understand the real threat you’re facing as a business, a person, and an employee.

You’ll also learn a bit about how you can protect yourself. We offer the most recent info from 2018 and 2019, and some comparisons with the crime/security from recent history.

Cybercrime is almost constant, committed by professionals and often extremely well-organized groups. As you will see, it’s also increasing in scope, sophistication, and cost.

9 Key Cybercrime Stats (Editor’s Choice)

  • Cybercrime generates around $1.5 trillion per year
  • A hack occurs every 39 seconds
  • Global cybercrime damages are estimated to cost $6 trillion per year by 2021
  • Hackers earn around $30,000 per job, whilst their managers can make up to $2 million
  • 60% of fraud goes through mobile devices, 80% of which are generated from mobile apps
  • $1,077 is the average cash amount attackers demand
  • 81% of the US population has a social media account
  • Chinese cyber attacks accounted for over 20% of cyber attacks in 2017
  • $80 billion held in cryptocurrency is laundered annually

General Cybercrime Statistics , Scope and Frequency

1. In 2018, almost 700 million people were victims of some type of cybercrime.

That’s in 20 countries, many of which have outdated or even no cybercrime laws. In some cases, you won’t even be aware that you were targeted. For example, your computer might have come a part of a bot network without you noticing. In other cases, you might even have to face financial losses.

2. Cybercriminals generate revenues of $1.5 TRILLION annually.

The people behind recent cybercrimes no longer fit the stereotypical idea of a kid in a hoodie operating from his mom’s basement…at least not entirely. Today, we are up against organized crime, a professionalized underground industry that pays off big time.

3. Cybercrime will cost $6 trillion annually by 2021.

As if the previous information wasn’t bad enough, it appears that the damage and thus security demands on a global scale are only going to continue to grow, according to the Official 2019 Annual Cybercrime Report by Cybersecurity Ventures .

4. Businesses face attacks as many as 16,856 times per year.

A natural person is not the only victim of cybercrime – many companies, usually small to midsized ones, have to face up to increasing data breach or denial of service risks. This can answer questions about how many cybercrimes are committed each year. Companies can lose a significant amount of money in lawsuits and permanently damage their clients’ trust.

5. At least 1.7 times per week, cybercrimes work and damage targets.

Cyber criminals know that not all attacks get through, so they will often play the numbers, even the ones who do more research and commit more targeted crimes. This seemingly small percentage of successful hacks still generates a large amount of disruption. As cybercrime is becoming more sophisticated, targeted attacks are more and more common, and the success rates are rising.

6. 46 attacks are suffered per day, or two every hour.

The type of attacks in this stat vary a great deal. We’re talking about malware, viruses, attempts at identity theft, and even hijacking computers. These attacks also vary depending on the country, so answering the question of how many cyber attacks happen per day is no easy task.

7. It takes 196 days, on average, for a company to even realize it’s been hacked.

That’s one of the most frightening cybersecurity statistics in 2018 , since criminals can mess around with your confidential data for months on end before you even notice something’s wrong, and start fixing the damage.

8. 57.24% of computers in China are infected by malware.

China is the country with the highest rate of infected computers in the world, which does suggest to a degree that China is primarily the victim, not the perpetrator of cybercrime.

9. Taiwan has a 49.19% of malware-ridden PC victims.

For Taiwan, the second country in the world most affected by attacks, this undeniable threat is both increasingly dangerous, and a good opportunity for building new lines of business.

10. Turkey is the second runner-up, with 42.52% of computers infected.

A champion of malware statistics in Europe, the number of compromised computers has risen by 3% in 2018, and it is only getting worse.

The Nodemailer Module

The Nodemailer module makes it easy to send emails from your computer.

The Nodemailer module can be downloaded and installed using npm:

After you have downloaded the Nodemailer module, you can include the module in any application:

Send an Email

Now you are ready to send emails from your server.

Use the username and password from your selected email provider to send an email. This tutorial will show you how to use your Gmail account to send an email:


var nodemailer = require(‘nodemailer’);

var transporter = nodemailer.createTransport( <
service: ‘gmail’,
auth: <
user: ‘[email protected]‘,
pass: ‘yourpassword

var mailOptions = <
from: ‘[email protected]‘,
to: ‘[email protected]‘,
subject: ‘Sending Email using Node.js’,
text: ‘That was easy!’

transporter.sendMail(mailOptions, function(error, info) <
if (error) <
> else <
console.log(‘Email sent: ‘ + info.response);

And that’s it! Now your server is able to send emails.

Multiple Receivers

To send an email to more than one receiver, add them to the “to” property of the mailOptions object, separated by commas:


Send email to more than one address:


To send HTML formatted text in your email, use the “html” property instead of the “text” property: