Welcome to Hacking Gmail. Thanks for buying this book. If you haven’t bought it,
you should. It’s very good, and once you buy it you can stop loitering around the
bookstore stacks. Go on: Buy it, sit down, have a coffee. See? Comfier isn’t it? Ah.
Hacking Gmail. It’s a manly hobby, and this book will tell you how. Sorry? What’s
Gmail, you ask? Well, let me tell you . . .
March 31, 2004. A watershed in human history. Google’s web-based e-mail service, still now at the time of this writing in Beta, and available only to people
invited by other existing users, was launched. Offering a gigabyte of storage, an
Gmail was an instant hit among those who could get access to the system. Today,
more than a year later, Gmail is proving to be one of the flagship applications on
the web—a truly rich application within the browser, combined with the serverbased power of the world’s leading search engine.
Of course, all that power just begs to be abused. Power corrupts, as they say,
and hackers are nothing but a corrupt bunch: Almost as soon as Gmail was
launched, hackers were looking at ways to use those capabilities for other purposes.
They investigated the incredibly rich interface, and saw how much of the processing is done on the user’s own machine; they burrowed into the communication
between the browser and the server; and they developed a series of interfaces for
scripting languages to allow you to control Gmail from your own programs.
This book shows what they did, how to do it yourself, and what to do after you’ve
mastered the techniques. Meanwhile, you’ll also learn all about Ajax, the terribly
topics for the price of one!
What’s in This Book?
There are three parts to this book, each lovingly crafted to bring you, young Jedi,
to the peak of Gmailing excellence. much much more…