A recovery code created in advance can help you avoid losing access to your Microsoft account. I’ll show you how to create a recovery code.
Email – the most used, most long lived communications medium offered by networks of interconnected computers.
I tried to get locked out of my Microsoft account while travelling. I couldn’t. Why? I’d prepared. Prepare properly so you won’t get locked out.
Even though they share similar names and do similar things, Outlook and Outlook.com are actually not related at all.
Marking spam as spam is an important tool in the war against it, but exactly what happens when you do so is clouded in mystery.
Signatures are a great way to make composing email easier by including standard information at the bottom. I’ll show you where the settings are in three popular email interfaces.
If your account is ever part of a breach, secure your account to avoid further risk.
Simply emailing your entire contact list with a notice that you’ve changed your email address is NOT the way to change your email address.
Outlook.com is dropping support for Windows Live Mail 2012. I’ll look at what that really means, and outline some options Microsoft failed to mention.
People ask every day how they can reach someone at Microsoft to help with Hotmail and Outlook.com problems. There is help.
There is no support phone number for the major free email services. So what’s up with the phone numbers in search results?
If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.
It’s important to check in and possibly download your email from time to time so that you won’t lose email, or perhaps the entire account.
Being over quota means you’ve received or kept too much email. Dealing with an email quota requires understanding just where that email is being kept.
Delays happen for many reasons; it’s the nature of the email infrastructure. If you get a “Delivery Status Notification (Delay)”, your options are limited.
Many people receive spam that looks like it comes from someone they know, but is not from that person’s email address. I’ll take a look at what’s going on and what you need to pay attention to.
If someone threatens to mark your email as spam, don’t worry about it. Here’s why.
Both children and adults receive harassing or abusive email. Sadly, there’s no easy way to trace it back to a sender who doesn’t want to be found.
Email can bounce for many reasons. I’ll look at several of the most common mail bounce messages, and try to interpret what they really mean.
Email usually works, but it can fail to arrive for a number of reasons. Being blocked is only one, and it’s nearly impossible to tell which has happened.
Spam filters can be incredibly sophisticated or very simple. I’ll look at some of the characteristics of email that spam filters can check.
“I want to close my Hotmail account” is a knee-jerk reaction to many account problems. It’s easy, and I’ll show you how, but it also may be pointless or even harmful.
It’s very common to want confirmation that an email has been opened, delivered, or read. In the age of spam, it’s simply not possible with any accuracy.
Email attachments are useful, ubiquitous, and convenient. They’re also abused, dangerous, and responsible for many infections and data breaches.
Mobile numbers are an important component of Hotmail and Outlook.com security. I’ll review how to change the mobile number and keep it up to date.
You can end up with email marked as spam for many different reasons, usually involving reputation – and not only yours.
Sending emails with attachments to many BCC’d recipients directly from your Hotmail account looks like you’re sending spam. I’ll talk about why, and suggest alternatives.
There is no Hotmail support number. If you find one in search results, it’s not Microsoft. Whether it’s legitimate is up for debate.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
Computers use email addresses to route email. Angle brackets are used when a more human-readable name is also included.
Email comes with its own set of somewhat confusing terminology. I’ll review the differences between an email address, email account, and email domain.
Gmail can be used to handle email for almost any email address. I’ll show you how to route your email through Gmail, and why it’s worth considering.
IMAP is a protocol that your email program may use to access your email. Among other features, it makes dealing with email on multiple devices much easier.
Email programs commonly block remote images. I’ll look at why, and how spammers and others use remote images for good and evil.
Getting spam from yourself? We all do. I’ll look at why it happens; what, if anything, you can do about it; and something unlikely but important to check.
Depending on what email program or service you use, deleted emails may or may not be really deleted. It’s surprisingly hard to tell for certain.
There are many reasons you might find pictures not showing in email. I’ll review the complex world that is email, and some of the things that can go wrong.
Sometimes you may want to explicitly keep someone from contacting you. Ignoring them is often simplest, but there are tools to help as well.
Gmail labels are similar to folders, but with a couple of important differences if you also use a desktop email program to access Gmail.
Outlook.com, like most email services, tries hard to keep spam out of your inbox by placing it in a junk mail folder. Sometimes it gets a little too aggressive. I’ll look at how to tame it.
When adding another device to access your email, it’s easy to run into a situation where email seems to disappear. I’ll look at the most common reason and what to do about it.
Phishing is a way that internet scammers trick you into providing your personal and financial details. Phishing opens the door to identity theft, and more.
Relying on free email services can be an unnecessary risk. Fortunately it’s possible, even easy, to back up Gmail.
Outlook.com has added the concept of email address aliases. They serve as a good solution when you want to change your email address.
It can be extremely difficult to find the email address of someone you want to contact. To begin with, they must want to be found.
Closing an email account is many people’s first reaction to getting hacked and seeing spam sent from the account. It rarely helps, if even possible. I’ll explain.
If you don’t have access to your account recovery phone number or alternate email address, there is a process you can go through to regain access to your account – maybe.
After an online account is deleted, the ID or email address is eventually made available for re-use. It’s the same name but a different owner, and that can confuse people.
ZIP files are incredibly useful for compressing files and containing collections of files. Unfortunately they’re also useful to hackers, spammers and scammers.
It’s not necessarily obvious where Google/Gmail hides the “Change Password” functionality. I’ll walk you through it.
You are exactly right: you are being punished for the actions of others. To understand who those “others” are, we need to look at how email makes it off of your computer to its destination.