“Mailbox unavailable” is a common email bounce message that actually says very little. I’ll review some of the more common causes of “mailbox unavailable”.
Email – the most used, most long lived communications medium offered by networks of interconnected computers.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
“Relaying denied” is an error you may receive in a bounce reply to an email message you sent. I’ll look at what relaying is, and why it might be denied.
When your email program starts repeatedly asking you for your password, it’s a sign of a problem. Most of the time, it’s a simple problem.
Out-of-office replies can ricochet through email lists like spam and even put you in harm’s way. Are they evil?
There are emails from which you should certainly unsubscribe when you no longer want them. However, there are emails that you absolutely should never unsubscribe from. I’ll review the differences.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
A scam claims your email account has been hacked, possibly even including a password you’ve used. Don’t be fooled.
The default mail program is used to send email at the request of other programs on your computer or links on web page. If you use a web interface, however, things get tricky.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
Web-based and downloaded email both have significant advantages and disadvantages. Which is right for you depends on many things.
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.
Using a desktop email program to back up your email is a very good way to avoid potential data loss. I’ll show you how to backup your email easily, using Outlook.com and Thunderbird as my examples.
Don’t send anonymous email from work or home. It’s going to take some extra steps to keep from being traced.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
Gmail offers a “confidential mode”. It is and it isn’t; learn how it works before you use it.
Like many Microsoft products, Hotmail’s name has changed a time or two and caused a great deal of confusion. I’ll try to make sense of it all.
If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
An error caused my newsletter to come “From” the wrong address. Flooded with challenge/response mails, I wonder: what other messages are you missing?
Email reputation for your home IP address probably doesn’t matter, and having it characterized as “poor” might even be a good thing.
Most email programs can block email from a specific address. Unfortunately, blocking email from a sender is ineffective when it comes to spam.
Relay servers pass email messages along from one email server to another. I’ll review why they exist, and why they might matter.
It’s tempting to want to reply to spam, telling the sender to stop it (or worse). Not only is that ineffective, it often makes things worse.
Phishing is epidemic. Legitimate-looking emails asking for sensitive information are often bogus. Phishing is on the rise, and you need to be aware.
Your password protects your account from unauthorized access, but it doesn’t protect your email address from exposure.
When an email message comes back to you because of a problem, exactly who did or did not get the message depends on the error and where it happened.
Email can use complex methods to encode special (or even not-so-special) characters. Occasionally, those methods accidentally become visible.
Email is typically very fast, but there are several reasons it can be legitimately delayed for hours, or perhaps even days.
Outlook.com accounts are hacked into and lost every day. I’ll review a couple of techniques that ensure you won’t lose email or contacts if it happens to you.
POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.
Want an email address that won’t have to change for a long time? There’s really only one approach that’s completely in your control.
Edit a reply before sending it: clean up your message, remove email addresses, and more.
Two-factor authentication is an important security tool. To access those accounts in some software programs, though, you may need an app password.
Two-factor authentication is a powerful way to protect your account. We’ll enable two-factor and take an additional, critical, step to secure it.
BCC is good for many things. Sending to many people at once isn’t really one of them.
It used to be that simply viewing a malformed email could allow a virus to spread. Thankfully, that’s no longer the case with modern mail programs.
Challenge/Response is a spam-fighting technique that forces you to prove you’re human before your message will be delivered. It’s controversial, to say the least.
“Spam” and “junk” mean the same thing when it comes to email. There’s a lot of confusion about how they, your email service, and your email program all interact.
Counting on email being almost instant is probably a bad idea. Email is designed to tolerate many delays, and delays do happen.
Terminology around email can be confusing, and lead to incorrect answers to misstated questions. I’ll review some common and important terms.
Surprisingly, you can still create a hotmail.com email address. I’ll show you how.
If your ISP goes out of business, typically you can no longer access data kept on their equipment. Prevention is really the only cure.
It’s surprisingly difficult to encrypt email. We’ll look at a practical solution that anyone can use, as well as the way things “should” work.
A recovery code created in advance can help you avoid losing access to your Microsoft account. I’ll show you how to create a recovery code.
I tried to get locked out of my Microsoft account while travelling. I couldn’t. Why? I’d prepared. Prepare properly so you won’t get locked out.
Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.