Articles in Category: Email
Email – the most used, most long lived communications medium offered by networks of interconnected computers.
Outlook.com, Hotmail, and Microsoft account compromise and loss happens. How to get your account back varies based on just what was stolen. I’ll review different scenarios.
If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.
Determining the IP address of an email sender is difficult at best, and usually impossible. Sometimes you get lucky.
Getting spam from yourself? We all do. I’ll look at why it happens; what little you can do about it; and something unlikely but important to check.
Phishing is a way scammers trick you into providing your personal and financial details. Phishing opens the door to identity theft, and more.
Even though they share similar names and do similar things, Outlook and Outlook.com are not related at all.
It can be surprisingly hard to tell if an email account has been hacked, especially when hackers cover their tracks. I’ll show you a couple of possible signs.
A scam claims your email account has been hacked, possibly even including a password you’ve used. Don’t be fooled.
If you don’t have access to your account recovery phone number or alternate email address, there is a process you can go through to regain access to your account — maybe.
Reporting spam in your email program with the spam button is critical. Reporting it by forwarding it somewhere isn’t going to do any good.
We are all under constant attack. I’ll show you how to look at your Outlook.com recent activity and review why it might be full of failed login attempts.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
If Microsoft detects a login attempt to your account from a country other than yours, additional security information may be required. You need to be prepared to provide it.
Even though most of us might never fall for it, the reason there’s so much spam is simple: spam works.
Emailing attachments — particularly large files — is getting more and more difficult as ISPs limit size and scan for malware.
Changing an email address involves changing more than just the address. I’ll look at common scenarios and a few additional approaches.
There are many reasons pictures don’t show up in email. I’ll review the complex world that is email, and some of the things that can go wrong.
The rule is, never click on links unless you are 100% certain that they are from who you think they are. The question is, how can you be certain?
Email attachments are useful, ubiquitous, and convenient. They’re also abused, dangerous, and responsible for infections and data breaches.
When replying to email, many programs include the original text with some indication that it is the original. We’ll look at configuring that.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
Occasionally, security software examines links in email and alerts you if something is suspicious. Frequently, it’s totally benign.
A closed email account is either waiting for you to reactivate it, or is closed for good. The only way to tell is to try.
Occasionally, you’re asked to enter the email address you want to unsubscribe. With today’s technology, there’s no excuse for that.
People often send email to the wrong address by mistake. But what happens if the email address is invalid?
To unsubscribe or not to unsubscribe, that is the question. The answer depends on how you got there.
It’s no fun to write a long email and lose it. Here’s how that happens and a few ways to avoid it.
People ask every day how they can reach someone at Microsoft to help with Hotmail and Outlook.com problems. There is help.
Someone’s sending spam that looks like an Ask Leo! recommendation. It’s not, and it gives us clues to keep in mind when evaluating any email message.
Once you hit that Send button, assume there is no way to stop your email from being sent … even if it’s to the wrong person.
While there are settings and services that claim to know if an email has been opened, they are notoriously unreliable and pointless.
Over-aggressive spam filtering can cause email messages to fail to appear in your inbox. We’ll look at approaches to deal with it.
“Mailbox unavailable” is a common email bounce message that actually says very little. I’ll review some of the more common causes of “mailbox unavailable”.
Email account theft is rampant. If it happens to you, there are several steps you need to take — not only to recover your account, but to prevent it from being easily hacked again.
“Relaying denied” is an error you may receive in a bounce reply to an email message you sent. I’ll look at what relaying is, and why it might be denied.
When your email program starts repeatedly asking you for your password, it’s a sign of a problem. Most of the time, it’s a simple problem.
Out-of-office replies can ricochet through email lists like spam and even put you in harm’s way. Are they evil?
There are emails from which you should certainly unsubscribe when you no longer want them. However, there are emails that you absolutely should never unsubscribe from. I’ll review the differences.
Email spoofing is rampant. Spammers often send email that looks like it came from you, and there’s little that you can do about it.
The default mail program is used to send email at the request of other programs on your computer or links on web page. If you use a web interface, however, things get tricky.
The list of BCC’ed recipients is not included with emails, so there is no way of determining if or who else the email was sent to.
Spam prevention measures have made getting email delivered more difficult. We’ll look at ways to maximize the chances your email will make it through.
Web-based and downloaded email both have significant advantages and disadvantages. Which is right for you depends on many things.
Free email services and accounts are convenient and ubiquitous, and can be used safely, if and only if you take responsibility for that safety.
Using a desktop email program to back up your email is a very good way to avoid potential data loss. I’ll show you how to backup your email easily, using Outlook.com and Thunderbird as my examples.
Don’t send anonymous email from work or home. It’s going to take some extra steps to keep from being traced.
Gmail offers a “confidential mode”. It is and it isn’t; learn how it works before you use it.
Like many Microsoft products, Hotmail’s name has changed a time or two and caused a great deal of confusion. I’ll try to make sense of it all.
If you’re not getting spam now, you will soon — and probably lots of it. What can you do? There’s no magic answer, but there are various things you can do to help.