Articles in Category: Email
Email – the most used, most long lived communications medium offered by networks of interconnected computers.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
If Microsoft detects a login attempt to your account from a country other than yours, additional security information may be required. You need to be prepared to provide it.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
Emailing attachments — particularly large files — is getting more and more difficult as ISPs limit size and scan for malware.
Changing an email address involves changing more than just the address. I’ll look at common scenarios and a few additional approaches.
There are many reasons pictures don’t show up in email. I’ll review the complex world that is email, and some of the things that can go wrong.
The rule is, never click on links unless you are 100% certain that they are from who you think they are. The question is, how can you be certain?
Email attachments are useful, ubiquitous, and convenient. They’re also abused, dangerous, and responsible for infections and data breaches.
Outlook.com, Hotmail, and Microsoft account compromise and loss happens. How to get your account back varies based on just what was stolen. I’ll review different scenarios.
When replying to email, many programs include the original text with some indication that it is the original. We’ll look at configuring that.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
Occasionally, security software examines links in email and alerts you if something is suspicious. Frequently, it’s totally benign.
A closed email account is either waiting for you to reactivate it, or is closed for good. The only way to tell is to try.
A scam claims your email account has been hacked, possibly even including a password you’ve used. Don’t be fooled.
Occasionally, you’re asked to enter the email address you want to unsubscribe. With today’s technology, there’s no excuse for that.
People often send email to the wrong address by mistake. But what happens if the email address is invalid?
To unsubscribe or not to unsubscribe, that is the question. The answer depends on how you got there.
It’s no fun to write a long email and lose it. Here’s how that happens and a few ways to avoid it.
People ask every day how they can reach someone at Microsoft to help with Hotmail and Outlook.com problems. There is help.
Someone’s sending spam that looks like an Ask Leo! recommendation. It’s not, and it gives us clues to keep in mind when evaluating any email message.
Once you hit that Send button, assume there is no way to stop your email from being sent … even if it’s to the wrong person.
While there are settings and services that claim to know if an email has been opened, they are notoriously unreliable and pointless.
Over-aggressive spam filtering can cause email messages to fail to appear in your inbox. We’ll look at approaches to deal with it.
“Mailbox unavailable” is a common email bounce message that actually says very little. I’ll review some of the more common causes of “mailbox unavailable”.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
“Relaying denied” is an error you may receive in a bounce reply to an email message you sent. I’ll look at what relaying is, and why it might be denied.
When your email program starts repeatedly asking you for your password, it’s a sign of a problem. Most of the time, it’s a simple problem.
Out-of-office replies can ricochet through email lists like spam and even put you in harm’s way. Are they evil?
There are emails from which you should certainly unsubscribe when you no longer want them. However, there are emails that you absolutely should never unsubscribe from. I’ll review the differences.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
The default mail program is used to send email at the request of other programs on your computer or links on web page. If you use a web interface, however, things get tricky.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
Web-based and downloaded email both have significant advantages and disadvantages. Which is right for you depends on many things.
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.
Using a desktop email program to back up your email is a very good way to avoid potential data loss. I’ll show you how to backup your email easily, using Outlook.com and Thunderbird as my examples.
Don’t send anonymous email from work or home. It’s going to take some extra steps to keep from being traced.
Gmail offers a “confidential mode”. It is and it isn’t; learn how it works before you use it.
Like many Microsoft products, Hotmail’s name has changed a time or two and caused a great deal of confusion. I’ll try to make sense of it all.
If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
An error caused my newsletter to come “From” the wrong address. Flooded with challenge/response mails, I wonder: what other messages are you missing?
Email reputation for your home IP address probably doesn’t matter, and having it characterized as “poor” might even be a good thing.
Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
Relay servers pass email messages along from one email server to another. I’ll review why they exist, and why they might matter.
It’s tempting to want to reply to spam, telling the sender to stop it (or worse). Not only is that ineffective, it often makes things worse.
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
Your password protects your account from unauthorized access, but it doesn’t protect your email address from exposure.
When an email message comes back to you because of a problem, exactly who did or did not get the message depends on the error and where it happened.