How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?
When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?
Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?
Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...
StartTLS initiates encryption of an e-mail based on the TLS protocol. For this purpose, the server is pinged without encryption first of all, and StartTLS support is requested. The encryption method can be used when the answer is positive. StartTLS is handy, as e-mails are encrypted automatically once the method has been accepted. You don't need to contact a dedicated port, StartTLS can simply be...
The Outlook address book is an important tool for many computer users who regularly send and receive messages via Microsoft's e-mail service. To restore the contact list from a backup file after a version change or data loss, or simply to add new contact information, there is this import function. We'll show you how to easily import Outlook contacts to update your address book.
With Outlook, you have all your email inboxes in view. The software makes it easy to manage multiple accounts. Not only different Microsoft accounts, but also other email service accounts can be integrated. If required, you can delete the account with just a few clicks. We’ll show you how.
The network protocol CalDAV allows you to synchronize calendar data such as appointments and meetings on your PC, smartphone or tablet. The events are then displayed presentably in iCalender format and managed in a WebDAV environment. We’ll explain what CalDAV is exactly and how you can use it yourself.
The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?
The Domain Name System provides functions that enable internet communication in the first place. The MX record, for example, deals with the disclosure of mail servers. In order to find out where your email must be sent to begin with, the mail server performs an MX record check: It inquires after the specific address. To illustrate this concept, we explain MX records to you with the help of an...
IONOS E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.