Articles tagged: email
If your email is hacked, there are several steps you need to take to fix it and prevent it from being hacked again.
It can be extremely difficult to find the email address of someone you want to contact. To begin with, they must want to be found.
Is There an Email Service that Doesn’t Require a Phone Number? My Recommended Approach, and Alternatives
There are legitimate reasons for not wanting to give your phone number to an email service. Let’s look at alternatives.
“From” spoofing is how spammers send email that looks like it comes from you that you had nothing at all to do with. I’ll look at how it’s done.
Being over quota means you’ve received or kept too much email. To deal with it, you need to understand where that email is being kept.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
Emailing attachments — particularly large files — is getting more and more difficult as ISPs limit size and scan for malware.
Changing an email address involves changing more than just the address. I’ll look at common scenarios and a few additional approaches.
There are many reasons pictures don’t show up in email. I’ll review the complex world that is email, and some of the things that can go wrong.
It’s no fun to write a long email and lose it. Here’s how that happens and a few ways to avoid it.
“Mailbox unavailable” is a common email bounce message that actually says very little. I’ll review some of the more common causes of “mailbox unavailable”.
Entering your email address incorrectly might just be a typo, but it can have surprising ramifications.
POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
Edit a reply before sending it: clean up your message, remove email addresses, and more.
Free email is popular, ubiquitous … and risky. Free email accounts are lost regularly with no hope of recovery. I’ll review how you can use free email accounts safely.
Computers use email addresses to route email. Angle brackets are used when a more human-readable name is also included.
IMAP is a protocol that your email program may use to access your email. Among other features, it makes dealing with email on multiple devices much easier.
Depending on what email program or service you use, deleted emails may or may not be really deleted. It’s surprisingly hard to tell for certain.
The holiday season brings with it a flood of email. That’s a great opportunity to evaluate, and unsubscribe from things you no longer need.
Some have said that email is dead. My take is completely opposite: email is one of the most effective communication methods we have.
You are exactly right: you are being punished for the actions of others. To understand who those “others” are, we need to look at how email makes it off of your computer to its destination.
People often use free email providers for critical data only to lose everything when a problem occurs. So what do you look for in an email provider?
One of the problems with Outlook Express is difficulty in exporting data. Your best bet is to find a more recent software to help with the migration.
There are various options to access one email account from multiple computers, and there are pros and cons to each.
As 2013 draws to a close, I review which articles on Ask Leo! were the most popular and briefly discuss what trends that I feel they reveal.
There are many steps between your email and it’s journey out of the “Outbox.” Any one of those steps could be slowing you down.
There are several ways to share email accounts across computers. The best ones have to be set up before you need them.
Figuring out what is what with emails and email accounts can be quite confusing. But when all is said and done, you only need to change a simple configuration.
Emailing large attachments is typically a bad idea as your mail is likely to not be delivered. We’ll look into alternatives.
It’s frightening, on the server side, to watch the constant attempts being made to slowly brute force a way into email accounts. So it’s safe to assume that if Google notified you – someone got in!
There is little that you or I can do when a website goes away except to use online tools to try to trace it, or find some other way to replicate the service.
Ninety-nine percent of the time when links aren’t clickable the problem is on the receiving end. It’s usually because their email program is trying to protect them from something that looks suspicious.
Once an email is sent it, and the attachments it might include, are copied to a sequence of servers until they reach the destination inbox. Most importantly, once it leaves your machine, it leaves your control.
Email is ubiquitous and convenient, yet surprisingly not very secure. I’ll look at why that is and when you should worry.
I’ll show you how to move from Outlook Express to Windows Live Mail on Windows 7 (the easiest moving option), step by annoying step.
Thunderbird is a robust and powerful email program that can meet the needs of both light and power users. I use it all day every day.