slider

Recent

Powered by Blogger.

Featured post

Share Blog Posts Automatically on Facebook,Twiiter and other Social Networks

If you think writing a blog post is over when you hit the publish button, Hello I think you should take a shower. Blog posts, (no matter h...

Search This Blog

Blog Archive

My Blog List

Text Widget

1
2
3
Navigation

What Is E-Mail ? | How To Protect Your Self From Spam and Junk Emails ?

What Is E-Mail ? | How To Protect Your Self From Spam and Junk Emails ?

•    E-mail messages are passed through the internet by using a protocol called simple mail transfer protocol.
•    The incoming messages are received in an e-mail mailbox that resides on a mail server.
•    Mail servers receive and store e-mail messages in mailboxes by using a protocol called Post office Protocol or IMAP.
•    To read e-mail, a mail client is needed.
•    We can write e-mail messages by using e-mail application,
•    The messages are transferred to an SMTP server- a mail server that accepts e-mail.

Ways Of accessing E-mail

•    We may use a mail client. Eg: Eudora, Outlook, Outlook express, Netscape Messenger etc.
•    We may use a web-based e-mail service.
•    We may use an online service, such as America online, which has its own mail program.
•    We may get e-mail through a LAN, a common system at large organizations. The e-mail arrives in the company’s POP or IMAP server.

E-mail Addressing

•    Internet e-mail addresses consists of two parts joined by @ sign.
•    User name – It contains characters other than letters-they can contain numbers, underscores, periods, and some other special characters. They can’t contain commas or parantheses.
What Is E-Mail ? | How To Protect Your Self From Spam and Junk Emails ?
What Is E-Mail ? | How To Protect Your Self From Spam and Junk Emails ?
•    Host or domain name – It provides the internet location of the mailbox, usually the name of a company or internet service.

Formatted E-mail

•    HTML – This is formatted with HTML tags, just like web pages. It includes text formatting, numbering, bullets, alignment, horizontal lines, backgrounds, hyperlinks. It is actually sent using the MIME protocol.
•    Rich Text Format – This format can be read by most word processing applications. Documents in this format are also called RTF files.
•    MIME (Multipurpose Internet Mail Extensions) – It is used for attachments. Formatting includes text formatting, pictures, video and sound.

Web-Based E-mail

•    Using web based email we can access the web as well as read our mail.
•    Most web-based e-mail is free.
•    We can read two kinds of messages on the web :
o    Messages sent to a web-only account
o    Messages stored in the POP mailbox

Sending and Receiving Files by E-mail

 Attachments

•    An attachment is a file that has been encoded as text so that it can be included in an e-mail message.
•    The three common ways to encode e-mail attachments are :
o    MIME - Multi purpose Internet Mail Extension is the standard method.
o    Uencoding – This method is supported by some older e-mail applications.
o    BinHex- Used by some Mac e-mail programs.

Sending Attachments

•    To send a file by e-mail, create a message to which the file is to be attached.
•    Address the mail as usual and type the subject. If needed type the text in the body of the message.
•    Now attach the file by choosing a menu command or by clicking a toolbar button.
•    Large files can be compressed, so that the sending and downloading time can be minimized.

Receiving Attachments

•    Most e-mail applications store the attachments in the mail message.
•    First, open the message and then open or save the attachment.
•    When the message with an attachment is deleted, the attachment is also deleted.
•    To use the attachment later, it has to be saved.

Attaching files to a Microsoft Outlook e-mail

•    To attach files to a Microsoft Outlook, follow the below steps.
1.    Open Microsoft Outlook.
2.    Reply to an existing e-mail, or compose a new e-mail by clicking on the New icon in the top left portion of the window.
3.    In the e-mail, click on the 'Insert file' icon that looks like a small paperclip, or click on Insert at the top of the window and choose file.
4.    Browse to the location that contains your file and double-click it insert it.
If successfully attached you should see an icon of the attachment in your   e-mail.
Below is an alternative method of attaching a file into an e-mail.
1.    Open My computer or Windows explorer and browse to the location of where your pictures are located.
2.    Highlight and copy the picture you wish to send in an e-mail.
3.    Open a new e-mail or the e-mail you're replying to that you wish to attach the file into, right-click in the message portion of the e-mail and click paste.
Fighting Spam, Sorting Mail, and Avoiding Email Viruses

Reducing Spam

•    The term "spam" is Internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).
•    Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US Mail.
•     Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise.
•     The most commonly seen spam includes the following:
o    Foreign bank scams or advance fee fraud schemes
o    Phishing scams, a very popular and dangerous form of email fraud
o    Pyramid schemes, including multilevel marketing (MLM)
o    Other "Get Rich Quick" or "Make Money Fast" (MMF) schemes
o    Quack health products and remedies
o    Ads for pornographic web sites
o    Offers of software for collecting email addresses and sending UCE
o    Offers of bulk emailing services for sending UCE
o    Chain letters (for more information, see About chain mail)
o    Illegally pirated software

Avoid receiving spam email

•    Spam has increasingly become a problem on the Internet. While every Internet user receives some spam email, certain behaviors on the Internet will cause you to receive even more than average.
•     In fact, the Federal Trade Commission and the Center for Democracy and Technology have performed studies to determine how spammers can obtain your email address.
•    They found that email addresses posted to web sites or in newsgroups attract the most spam.
•    Chat rooms are also fertile places for spammers to obtain email addresses.
•    Some tips on Internet behavior that will help reduce the amount of spam you receive:
o    On October 17, 2006, UITS implemented enhanced email filtering services at Indiana University. The spam quarantine service now analyzes all mail delivered to IU Cyrus/Webmail and Exchange accounts.
o     Any spam messages you receive are quarantined for five days in a Spam (Cyrus/Webmail) or Junk E-mail (Exchange) folder in your account. After five days, the spam service deletes these messages automatically.
o    Every time you communicate on the Internet or browse a web site, there are opportunities for spammers to intercept your communications to obtain your email address.
o     In particular, if you post to a Usenet newsgroup, list your email address on a web site, or fill out insecure forms on the web, your address can be collected by spammers.
o     They collect lists of email addresses and even share or sell these lists to other spammers. Even otherwise reputable companies may sell or exchange your email address with other companies, and this information may inadvertently find its way to a spammer.
o     At worst, spammers will use automated programs to bombard these lists of email addresses with spam.
Share
Banner

Newstechcafe

Post A Comment:

0 comments: