Of course, all that power just begs to be abused. Power corrupts, as they say,<br />and hackers are nothing but a corrupt bunch: Almost as soon as Gmail was<br />launched, hackers were looking at ways to use those capabilities for other purposes.<br />They investigated the incredibly rich interface, and saw how much of the processing<br />is done on the user's own machine; they burrowed into the communication<br />between the browser and the server; and they developed a series of interfaces for<br />scripting languages to allow you to control Gmail from your own programs.<br /><br />Download:<br />http://fileml.com/0o5iv