Whenever you send an email, the process would not be possible without the SMTP protocol. It’s used by mail servers to relay outgoing email messages from the senders and to the recipients. Unfortunately, spammers started abusing a loophole in the protocol – until SMTP authentication put a stop to this trick.
more
This year the mail.com blog covered so many exciting topics, from new product features to email life hacks and deep dives into IT history. Afraid you missed one of our popular explainers? Never fear: It’s time for our traditional year-end recap of reader favorites.
more
Have you ever wondered what happens with your email after you hit Send? Email is something we use every day, but most of us don’t know what happens behind the scenes to transmit our message from point A to point B. mail.com explains the steps your email takes along the way – and don’t worry, we promise not to get too technical!
more
Have you thought about deactivating your Twitter account? No matter if you are sure you want to leave Twitter, want to delete that old Twitter account you never use, or are just curious about your options – including how to archive your data – we have put together a handy explainer to help you make this important decision.
more
Your friend writes that a first date “…could not have gone better”. She even posts a status update saying “my date is absolutely fantastic.” Was it true love or a fiasco? If you can’t tell, you are not alone. Sarcasm is hard to interpret in written form and even sometimes in person. mail.com explains why - and helps you do better.
more
Are ecards still a thing? They may seem like a relic belonging to the early days of the internet, but last year the New York Times reported a pandemic-related resurgence in ecards. Ecards are not just sent as email attachments anymore – there are also versions to send by text message or on social media platforms.
more
Are you sending an important email and want to make sure that the recipient actually opened and read it? One way to make sure is by requesting a read receipt. But are they always the best choice? Learn how and when to request a read receipt, and your alternatives for getting an email confirmation.
more
Ever saw one of those cute little moving photos that just seems to capture the expressions perfectly? Those, my friend, are GIFs and they are so fun to create and use! Whether you’re trying to relate to the grandkids, become a GIF connoisseur, or just want to learn a new skill, we will give you the inside scoop on how to create a GIF for those moments that words alone cannot express.
more
Black Friday is high season for internet bargain hunters. Wherever a lot of money is being spent online, however, cybercriminals are often not far behind. Email provider mail.com sees an increase in spam and phishing during the bargain holidays, with fake vouchers and shipping scams topping the list of scammers’ tricks.
more
A friend tells you they’ve received a strange email from your address, but there’s no sign of suspicious emails in your sent mail folder. Your caller ID shows a number you recognize, but there’s a strange voice on the other end of the line. Both of these are examples of spoofing, or communications under a faked name.
more