Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
Email – the most used, most long lived communications medium offered by networks of interconnected computers.
Relay servers pass email messages along from one email server to another. I’ll review why they exist, and why they might matter.
It’s tempting to want to reply to spam, telling the sender to stop it (or worse). Not only is that ineffective, it often makes things worse.
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
Your password protects your account from unauthorized access, but it doesn’t protect your email address from exposure.
When an email message comes back to you because of a problem, exactly who did or did not get the message depends on the error and where it happened.
Email can use complex methods to encode special (or even not-so-special) characters. Occasionally, those methods accidentally become visible.
Email is typically very fast, but there are several reasons it can be legitimately delayed for hours, or perhaps even days.
Outlook.com accounts are hacked into and lost every day. I’ll review a couple of techniques that ensure you won’t lose email or contacts if it happens to you.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.
Want an email address that won’t have to change for a long time? There’s really only one approach that’s completely in your control.
Edit a reply before sending it: clean up your message, remove email addresses, and more.
Two-factor authentication is an important security tool. To access those accounts in some software programs, though, you may need an app password.
Two-factor authentication is a powerful way to protect your account. We’ll enable two-factor and take an additional, critical, step to secure it.
BCC is good for many things. Sending to many people at once isn’t really one of them.
It used to be that simply viewing a malformed email could allow a virus to spread. Thankfully, that’s no longer the case with modern mail programs.
Challenge/Response is a spam-fighting technique that forces you to prove you’re human before your message will be delivered. It’s controversial, to say the least.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
“Spam” and “junk” mean the same thing when it comes to email. There’s a lot of confusion about how they, your email service, and your email program all interact.
Counting on email being almost instant is probably a bad idea. Email is designed to tolerate many delays, and delays do happen.
Free email services and accounts are convenient and ubiquitous, and can be used safely if – and only if – you take responsibility for that safety.
Terminology around email can be confusing, and lead to incorrect answers to misstated questions. I’ll review some common and important terms.
Surprisingly, you can still create a hotmail.com email address. I’ll show you how.
If your ISP goes out of business, typically you can no longer access data kept on their equipment. Prevention is really the only cure.
It’s surprisingly difficult to encrypt email. We’ll look at a practical solution that anyone can use, as well as the way things “should” work.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
A recovery code created in advance can help you avoid losing access to your Microsoft account. I’ll show you how to create a recovery code.
I tried to get locked out of my Microsoft account while travelling. I couldn’t. Why? I’d prepared. Prepare properly so you won’t get locked out.
Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.
While there are settings and services that claim to be able to determine if an email has been opened, they are notoriously unreliable and pointless.
Marking spam as spam is an important tool in the war against it, but exactly what happens when you do so is clouded in mystery.
Signatures are a great way to make composing email easier by including standard information at the bottom. I’ll show you where the settings are in three popular email interfaces.
If your account is ever part of a breach, secure your account to avoid further risk.
Simply emailing your entire contact list with a notice that you’ve changed your email address is NOT the way to change your email address.
Outlook.com is dropping support for Windows Live Mail 2012. I’ll look at what that really means, and outline some options Microsoft failed to mention.
People ask every day how they can reach someone at Microsoft to help with Hotmail and Outlook.com problems. You can’t phone, but there is on-line help.
Email account theft is rampant. If it happens to you, there are several steps you need to take, not only to recover your account, but to prevent it from being easily hacked again.
There is no support phone number for the major free email services. So what’s up with the phone numbers in search results?
If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.
It’s important to check in and possibly download your email from time to time so that you won’t lose email, or perhaps the entire account.
Being over quota means you’ve received or kept too much email. Dealing with an email quota requires understanding just where that email is being kept.
Delays happen for many reasons; it’s the nature of the email infrastructure. If you get a “Delivery Status Notification (Delay)”, your options are limited.
Many people receive spam that looks like it comes from someone they know, but is not from that person’s email address. I’ll take a look at what’s going on and what you need to pay attention to.
If someone threatens to mark your email as spam, don’t worry about it. Here’s why.
Both children and adults receive harassing or abusive email. Sadly, there’s no easy way to trace it back to a sender who doesn’t want to be found.
Email can bounce for many reasons. I’ll look at several of the most common mail bounce messages, and try to interpret what they really mean.
Once you hit that Send button, you must assume that there is no way to stop your email from being sent … even if it’s to the wrong person.
Email usually works, but it can fail to arrive for a number of reasons. Being blocked is only one, and it’s nearly impossible to tell which has happened.