SlideShare a Scribd company logo
   This application was developed for a intranet
    project, and would be usefull for any small to
    medium sized organisation who use a Windows
    NT Server, or even just a Networked Windows
    95   solution   running   the   personal   web
    server, and who want an e-mail system, but
    don't want the associated costs.
   This system could also be used for a
    community based website, as to allow
    members only to send email to other
    members.
   Alice enters email and sends through the Internet to an SMTP server
   The SMTP Server sends the email to the POP3 server associated with Bob's
    address
   Bob retrieves the mail from his POP3 Post Office Protocol server.
   Speed

   Reach and Penetration

   Ease and Efficiency

   Low Cost

   Targeted
   Email (or e-mail) is electronic mail that
    "works"    quite     like   conventional
    correspondence.

   There is a sender and a recipient and the
    contents are called the message of the
    email.
   In addition to textual content, email
    allows you to send photographs, video
    or sound clips in digital form or files.
   When you create an email account, you
    get an email address to which people
    "write" to you.


   Each    email     address   is   unique   which
    means no two people in the world can have
    the same email address.
   Just like your postal address, which is one
    of its kind, your email address belongs
    only to you - unless of course you share it
    with people.
   Typically, you access your email account
    with a username (also called a login
    name) and a password.
   In    order    to       keep    your   email
    communication secure from others, you
    have to make sure that your login details
    and    known     only    to    you   and   the
    password is complex enough to make it
    difficult for people to guess it.
   Having   a   good    strong   convoluted
    password is the first step in making your
    account secure.



   The password to your email account is
    akin to the key to the door of your postal
    address (your house?).
   The easiest way to create your email
    account    and   get   your   first   email
    address is to use a free online service.
    The only thing you need is a web
    browser.
   Gmail (run by Google),

   Windows Live Hotmail (owned by
    Microsoft),

   AOL and

   Yahoo!Mail.
   Everyone, except those living under
    rocks for the past decade, know about
    Google and their free web based email
    called Gmail. The service was launched
    with great fanfare and was 100% free
    from the start but one could only create
    a Gmail account through special invites.
   To create your Gmail account you only
    need a web browser.
   Once you click on the signup link, you
    shall   be   shown   the   Create   an
    Account form with several fields that
    need your inputs
   Choosing a login name is part art and
    part common sense. And because it
    determines what your email address will
    be,
   Since, email addresses need to be
    unique which means no two people in
    the world can have the same address.
   Your login name needs to be catchy and
    at the same time describe you so people
    are able to recall it without much difficulty
    and associate it with you. For instance, if
    you are a docile accountant from a small
    town, choosing "hells-angels" as the login
    name would be unwise.
   Securing your Gmail email account with
    a strong> password is imperative.
   Now that everything is set, you can go
    through the Terms of Service and click on
    the "I accept. Create my account."
    button which will create your very own
    free   Gmail   account!    Hurrah   and
    congratulations.
   Capacity
        Google’s Gmail online, storage clocks
    in at seven gigabytes of space.

   Available Anywhere
       available on literally any computer
    that has an internet connection.
   Password Recovery
      The only thing you need to enter into
    your Gmail account and retrieve your
    online files is a password.

   Internet-Based
   Online email account provider
   Yahoo is one of the Web's most reliable
    and long-standing email providers. This
    service is free and it's fast and easy to set
    up your own email account at Yahoo.
   Then select "Create New Account".
   Remember that you can use numbers
    and letters and even a single dot.
 Accessibility
 Access other email accounts
 Multiple yahoo addresses
 Choose your ‘from’ address
 Folders
 Attach Large Files
 Unlimited storage
 All your favorite apps
 Email tabs
 Yahoo Mail Plus
   Online email account provider
   The sign-up option is on the left of the
    page next to "Don't have a Windows Live
    ID?"
   This is where you'll decide what your
    email address will be, as well as entering
    personal and security information.
   You can use hotmail.com or live.com.
   At the bottom of the page, there are
    two blue links to Microsoft's terms of
    service and privacy policy documents.
    You don't have to read these to set up
    an account, but you do have to agree
    to them. Click "I agree" at the bottom of
    the page to complete the process.
   . Visit the Hotmail website again to log
    into the email account you just created.
 Like most email services, the biggest
  advantage of using Hotmail is having
  instant communication access
 friends
 Family
 Business across the globe
 Own address book
 Lots of storage space
 Connect you account to your Microsoft
  Outlook email
   Few and it is highly-rated service.
There are various email providers across
the web and each person has the
favorite.   Before   signing   up   to   your
account, take the time to research
providers and decide which one suits
you best.
You have the choice to pick one you like.

More Related Content

What's hot

Electronic mail
Electronic mailElectronic mail
Electronic mail
Ahmad Zahid
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
kundana
 
Beginner's guide to gmail
Beginner's guide to gmailBeginner's guide to gmail
Beginner's guide to gmailMonique Ross
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
GunjanSharma211
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
ruledbyrobotics2080
 
Email basics
Email basicsEmail basics
Email basics
Seth Porter, MA, MLIS
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
sameera.moparty
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
Halimaton Sa'adiah
 
Mail merge
Mail mergeMail merge
Mail merge
Urna Marie Baranda
 
Creating a gmail account
Creating a gmail accountCreating a gmail account
Creating a gmail account
MaritaShiels
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
Dooremoore
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
Seth Porter, MA, MLIS
 
An introduction to Windows 10
An introduction to Windows 10 An introduction to Windows 10
An introduction to Windows 10
Cynoteck Technology Solutions Private Limited
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
Made Aditya
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321)
ghayour abbas
 
How to create an Email Account
How to create an Email AccountHow to create an Email Account
How to create an Email AccountJoie Ocon
 
Internet
InternetInternet

What's hot (20)

Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 
Beginner's guide to gmail
Beginner's guide to gmailBeginner's guide to gmail
Beginner's guide to gmail
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Email basics
Email basicsEmail basics
Email basics
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
Mail merge
Mail mergeMail merge
Mail merge
 
Creating a gmail account
Creating a gmail accountCreating a gmail account
Creating a gmail account
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Create gmail account
Create gmail accountCreate gmail account
Create gmail account
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
 
An introduction to Windows 10
An introduction to Windows 10 An introduction to Windows 10
An introduction to Windows 10
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321)
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
How to create an Email Account
How to create an Email AccountHow to create an Email Account
How to create an Email Account
 
Internet
InternetInternet
Internet
 

Similar to Selection of email system and creating an email account

Create a Hotmail Account
Create a Hotmail AccountCreate a Hotmail Account
Create a Hotmail Account
HowToSignin
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
jatin batra
 
Tutorial power point
Tutorial power pointTutorial power point
Tutorial power point
Johnson & Wales University
 
Email Basics
Email BasicsEmail Basics
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
PranaviVerma
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
PranaviVerma
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Excellence Foundation for South Sudan
 
Email Curriculum
Email CurriculumEmail Curriculum
Email Curriculum
Dawn Pendergast
 
How to send email
How to send email  How to send email
How to send email
Mary Rah
 
Config and use internetUnit 3.pptx
Config and use internetUnit 3.pptxConfig and use internetUnit 3.pptx
Config and use internetUnit 3.pptx
mtsedey2013
 
Top email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdfTop email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdf
WebMaxy
 
Top email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdfTop email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdf
Amruta Relekar
 
Emailbasicsclass
EmailbasicsclassEmailbasicsclass
Emailbasicsclass
Robin E. Beavers
 
Email
EmailEmail
Session 2: Opening an email account
Session 2: Opening an email accountSession 2: Opening an email account
Session 2: Opening an email accountEmma Meow
 
How to use Email - Heidi McLaughlin
How to use Email - Heidi McLaughlin How to use Email - Heidi McLaughlin
How to use Email - Heidi McLaughlin
17mclah
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahooLisa Lindsay
 
Introduction to Gmail - Instructions
Introduction to Gmail - InstructionsIntroduction to Gmail - Instructions
Introduction to Gmail - Instructions
Baldwin Public Library
 

Similar to Selection of email system and creating an email account (20)

Create a Hotmail Account
Create a Hotmail AccountCreate a Hotmail Account
Create a Hotmail Account
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Presentation1
Presentation1Presentation1
Presentation1
 
Tutorial power point
Tutorial power pointTutorial power point
Tutorial power point
 
Email Basics
Email BasicsEmail Basics
Email Basics
 
Pranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentationPranavi verma-it 402 class ix-unit 11_presentation
Pranavi verma-it 402 class ix-unit 11_presentation
 
Pranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messagingPranavi verma-class-9-email-messaging
Pranavi verma-class-9-email-messaging
 
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptxOnline Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
Online Safety Data Privacy and Email Basics Digital Literacy Fundamentals.pptx
 
Email Curriculum
Email CurriculumEmail Curriculum
Email Curriculum
 
How to send email
How to send email  How to send email
How to send email
 
Config and use internetUnit 3.pptx
Config and use internetUnit 3.pptxConfig and use internetUnit 3.pptx
Config and use internetUnit 3.pptx
 
Top email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdfTop email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdf
 
Top email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdfTop email services providers to streamline your communication.pdf
Top email services providers to streamline your communication.pdf
 
Emailbasicsclass
EmailbasicsclassEmailbasicsclass
Emailbasicsclass
 
Email
EmailEmail
Email
 
Email
EmailEmail
Email
 
Session 2: Opening an email account
Session 2: Opening an email accountSession 2: Opening an email account
Session 2: Opening an email account
 
How to use Email - Heidi McLaughlin
How to use Email - Heidi McLaughlin How to use Email - Heidi McLaughlin
How to use Email - Heidi McLaughlin
 
email basics for yahoo
email basics for yahooemail basics for yahoo
email basics for yahoo
 
Introduction to Gmail - Instructions
Introduction to Gmail - InstructionsIntroduction to Gmail - Instructions
Introduction to Gmail - Instructions
 

More from Mary May Porto

Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systemsMary May Porto
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Mary May Porto
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
Mary May Porto
 
Library orientation
Library orientationLibrary orientation
Library orientation
Mary May Porto
 
Information literacy model
Information literacy modelInformation literacy model
Information literacy model
Mary May Porto
 
Degrees of data abstraction
Degrees of data abstractionDegrees of data abstraction
Degrees of data abstractionMary May Porto
 
Database Proposal
Database ProposalDatabase Proposal
Database Proposal
Mary May Porto
 

More from Mary May Porto (7)

Types, purposes and applications of information systems
Types, purposes and applications of information systemsTypes, purposes and applications of information systems
Types, purposes and applications of information systems
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
 
Library orientation
Library orientationLibrary orientation
Library orientation
 
Information literacy model
Information literacy modelInformation literacy model
Information literacy model
 
Degrees of data abstraction
Degrees of data abstractionDegrees of data abstraction
Degrees of data abstraction
 
Database Proposal
Database ProposalDatabase Proposal
Database Proposal
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Selection of email system and creating an email account

  • 1.
  • 2. This application was developed for a intranet project, and would be usefull for any small to medium sized organisation who use a Windows NT Server, or even just a Networked Windows 95 solution running the personal web server, and who want an e-mail system, but don't want the associated costs.
  • 3. This system could also be used for a community based website, as to allow members only to send email to other members.
  • 4. Alice enters email and sends through the Internet to an SMTP server  The SMTP Server sends the email to the POP3 server associated with Bob's address  Bob retrieves the mail from his POP3 Post Office Protocol server.
  • 5. Speed  Reach and Penetration  Ease and Efficiency  Low Cost  Targeted
  • 6. Email (or e-mail) is electronic mail that "works" quite like conventional correspondence.  There is a sender and a recipient and the contents are called the message of the email.
  • 7. In addition to textual content, email allows you to send photographs, video or sound clips in digital form or files.
  • 8. When you create an email account, you get an email address to which people "write" to you.  Each email address is unique which means no two people in the world can have the same email address.
  • 9. Just like your postal address, which is one of its kind, your email address belongs only to you - unless of course you share it with people.
  • 10. Typically, you access your email account with a username (also called a login name) and a password.
  • 11. In order to keep your email communication secure from others, you have to make sure that your login details and known only to you and the password is complex enough to make it difficult for people to guess it.
  • 12. Having a good strong convoluted password is the first step in making your account secure.  The password to your email account is akin to the key to the door of your postal address (your house?).
  • 13. The easiest way to create your email account and get your first email address is to use a free online service. The only thing you need is a web browser.
  • 14. Gmail (run by Google),  Windows Live Hotmail (owned by Microsoft),  AOL and  Yahoo!Mail.
  • 15. Everyone, except those living under rocks for the past decade, know about Google and their free web based email called Gmail. The service was launched with great fanfare and was 100% free from the start but one could only create a Gmail account through special invites.
  • 16.
  • 17.
  • 18. To create your Gmail account you only need a web browser.
  • 19.
  • 20. Once you click on the signup link, you shall be shown the Create an Account form with several fields that need your inputs
  • 21.
  • 22. Choosing a login name is part art and part common sense. And because it determines what your email address will be,
  • 23. Since, email addresses need to be unique which means no two people in the world can have the same address.
  • 24. Your login name needs to be catchy and at the same time describe you so people are able to recall it without much difficulty and associate it with you. For instance, if you are a docile accountant from a small town, choosing "hells-angels" as the login name would be unwise.
  • 25.
  • 26. Securing your Gmail email account with a strong> password is imperative.
  • 27.
  • 28. Now that everything is set, you can go through the Terms of Service and click on the "I accept. Create my account." button which will create your very own free Gmail account! Hurrah and congratulations.
  • 29. Capacity Google’s Gmail online, storage clocks in at seven gigabytes of space.  Available Anywhere available on literally any computer that has an internet connection.
  • 30. Password Recovery The only thing you need to enter into your Gmail account and retrieve your online files is a password.  Internet-Based
  • 31. Online email account provider
  • 32. Yahoo is one of the Web's most reliable and long-standing email providers. This service is free and it's fast and easy to set up your own email account at Yahoo.
  • 33.
  • 34.
  • 35. Then select "Create New Account".
  • 36.
  • 37. Remember that you can use numbers and letters and even a single dot.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.  Accessibility  Access other email accounts  Multiple yahoo addresses  Choose your ‘from’ address  Folders  Attach Large Files  Unlimited storage
  • 44.  All your favorite apps  Email tabs  Yahoo Mail Plus
  • 45. Online email account provider
  • 46.
  • 47. The sign-up option is on the left of the page next to "Don't have a Windows Live ID?"
  • 48.
  • 49. This is where you'll decide what your email address will be, as well as entering personal and security information.
  • 50. You can use hotmail.com or live.com.
  • 51.
  • 52.
  • 53. At the bottom of the page, there are two blue links to Microsoft's terms of service and privacy policy documents. You don't have to read these to set up an account, but you do have to agree to them. Click "I agree" at the bottom of the page to complete the process.
  • 54.
  • 55. . Visit the Hotmail website again to log into the email account you just created.
  • 56.
  • 57.  Like most email services, the biggest advantage of using Hotmail is having instant communication access  friends  Family  Business across the globe
  • 58.  Own address book  Lots of storage space  Connect you account to your Microsoft Outlook email
  • 59. Few and it is highly-rated service.
  • 60. There are various email providers across the web and each person has the favorite. Before signing up to your account, take the time to research providers and decide which one suits you best.
  • 61. You have the choice to pick one you like.