– iOS Mail marks mails in multiple accounts as read

I have two e-mail accounts. A common customer service @ … and a own username @ ….
For a better overview of what I have already read, I get all incoming mails in the customer service @ forwarded to myname @.

If I now read one of these mails in myname @ account, Apple Mail marks the same mail as well as read in customerservice @ 🙁

I have already tried to change To and X original To headers. No success.

I can imagine that it's a problem for Apple Mail to identify emails with the Message-ID header, which is bad because forwarding an email does not change the message ID set by the original sending mail server ,

Does anyone have any idea how to fix this? It's terrible when I read an email before customer service and they think it's already done!

Thanks in advance for any help.

P.S. It would be great if you kept the customerservice @ account in Apple Mail to be able to send emails through this account and track customer service progress. Deleting customerservice @ from the mail app fixes the problem, but that's not what I want to do.

magento2 – Quickly remove Magento 2 Spam customer accounts in the database

I have thousands of spam accounts in the customer database. Is there a way to remove them quickly?

I can not rush it in the admin section because it crashes the site when I try to delete them all at once. If I delete only 200 at a time, it takes a while very long time.

Is there a query that I can execute in SQL / phpMyAdmin? All spam accounts have the email address. Reseller – from $ 4.5 / month, SSD Raid10, unlimited accounts, 24/7/365 support

Webhosting1 – fast and reliable webhosting.

Common features for all reseller plans:

  • RAID 10 SSD hard drives
  • Unlimited accounts
  • Unlimited domains
  • Unlimited subdomains
  • Unlimited e-mail accounts
  • Unlimited MySQL databases
  • Unlimited FTP accounts

  • Control Panel – DirectAdmin
  • 99.9% availability guaranteed
  • 24/7/365 support
  • One-Click Script Installer
  • Free SSL Certificates
  • Daily backups
  • PHP 5.6 and PHP 7.1 versions
  • Free migration to our hosting
  • DDoS Protection
  • Server location: Europe, Poland

  • Accepted Payment Methods: PayPal, Bitcoins
  • 30-day money-back guarantee


Webhosting1st Reseller 10GB:

Storage space – 10 GB
Bandwidth – 100 GB

Price: $ 4.5 / month OR $ 45 / year
Order now

Webhosting1st Reseller 20GB:

Storage space – 20 GB
Bandwidth – 200 GB

Price: 6.75 USD / month OR 67.5 USD / year
Order now

Webhosting1st Reseller 30GB:

Hard disk space – 30 GB
Bandwidth – 300 GB

Price: $ 7.95 / mo OR $ 79.5 / yr
Order now

Webhosting1st Reseller 50GB:

Storage space – 50 GB
Bandwidth – 500 GB

Price: $ 11.25 / mo OR $ 112.5 / yr
Order now

Webhosting1st Reseller 100GB:

Hard disk space – 100 GB
Bandwidth – 1000 GB

Price: 22.5 USD / month OR 225 USD / year
Order now

Webhosting1st Reseller 200GB:

Hard disk space – 200 GB
Bandwidth – 2000 GB

Price: 45 USD / month OR 450 USD / year
Order now

Webhosting1st Reseller 300GB:

Hard disk space – 300 GB
Bandwidth – 3000 GB

Price: $ 67.5 / mo OR $ 675 / yr
Order now

Webhosting1st Reseller 500GB:

Hard disk space – 500 GB
Bandwidth – 5000 GB

Price: 112.5 USD / month OR 1125 USD / year
Order now

Contact us

Email: sales [at]

encryption – What can I hacker do if I publish my email and password 2FA on all of my accounts?

This depends on the kind of 2FA and of the service providers. If this is the case, then the physical device becomes vulnerable (U2F token or similar). If 2FA is instead just implemented using an app on a mobile phone the attacker might even try to target the phone itself. If 2FA is SMS based there are even more attack vectors.

It also depends on the second factor is bound to the domain you visit (as in WebAuthn) or not (SMS and others). In the second case of the attacker, you could trick it into a look-a-like phishing site instead of the real one.

And finally it depends on what processes are implemented at the service provider in the case of lost 2FA access. If the client still owns the original 2FA.