XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an E-Mail Program and a Web-Based E-Mail Service Basic Communication.

Slides:



Advertisements
Similar presentations
K12 WebMail
Advertisements

The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Basic Communication on the Internet:
marketing. o is directly marketing a commercial message to a group of people using . o every sent to a potential or current customer.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Surrey Public Library Electronic Classrooms Essentials.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Tutorial 2 Basic Communication on the Internet: New Perspectives on The Internet, Seventh Edition.
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Web 101 Third Edition by Wendy G. Lehnert & Richard L. Kopec Chapter 3: .
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 3 1 Evaluating Integrated Browser Programs and a Web-Based.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Send, Updates, Promotions, Announcements, And More. Reach your customers instantly … …by learning how to send an HTML newsletter.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
AND SPAM BY OLUWATOBI BAKARE
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Unit 9 Communication Services
Prepared by: Ms Melinda Chung Chapter 3: Basic Communication on the Internet: .
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Tutorial 2: Basic Communication on the Internet: .
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
Marketing Effective way to commutate. Things to remember in marketing 1. IS NOT ONLY ABOUT SELLING 2. IS NOT ONLY FOR THE SOURCE.
Unit 10 Communication Services
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 7 1 Mass Communication on the Internet Using Newsgroups Tutorial.
Lecture 10. and Netiquette Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet,
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Setting up Web-based or Local Computer Program.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
XP New Perspectives on Microsoft Windows XP Tutorial 5 1 Microsoft Windows XP Bringing the World Wide Web to the Desktop Tutorial 5.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Computer Skills (1) .
Internet Business Associate v2.0
Yahoo Mail Support Helpline USA
Roadrunner Error 530 Call 1 (888) Toll-free
Fix Thunderbird Error 5.7.1 Call Toll-free
Fix Yahoo Mail Box Error 550 Call for Help
Technology ICT Option: .
راهنمای سیستم الکترونیکی دانشگاه تبریز
Technology ICT Option: .
Presentation transcript:

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication on the Internet: Tutorial 2

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 2 Objectives Learn about guamcc, GTA Spyder and MCV Broadband Online mail server configurations. Learn about SPAM. Explore Mail Options in Web-Based accounts.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 3 POP Server - guamcc

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 4 SMTP Server - guamcc

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 5 POP / SMTP Server GTA Spyder Mail Server Settings POP Incoming Mail Server: pop.teleguam.net SMTP Outgoing Mail Server: smtp.teleguam.net

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 6 POP / SMTP Server MCV Broadband Online Mail Server Settings The incoming (POP3) server is mail.guam.net and the outgoing (SMTP) server is smtp.guam.net.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 7 Programs Pegasus Mail Mozilla Thunderbird

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 8 “You’ve Got Spam!” Spam: unsolicited commercial (UCE) or bulk mail. Includes unwanted solicitations, advertisements, or chain letters sent to an address.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 9 “You’ve Got Spam!” Many organizations are fighting spam aggressively. Most companies find it more effective and less costly to eliminate spam before it reaches users.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 10 Reducing Spam Passing of laws and technical changes in the mail handling systems of the Internet. Control the exposure of your address so software robots searching the Internet for addresses cannot easily obtain them. (They search for strings containing

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 11 CAN-SPAM Law Many U.S. jurisdictions have passed laws that provide penalties for sending spam. The CAN-SPAM Law is the first U.S. federal government effort to legislate controls on spam.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 12 CAN-SPAM Law According to the CAN-SPAM law, unsolicited messages must:  identify the sender  contain an accurate message subject and a notice that the message is an advertisement or solicitation  make it possible for the recipient to “opt out” of future mailings within 10 days of receipt of the request  include the sender’s physical postal address  prohibit the sender from selling or transferring an e- mail address with an opt out request to any other entity

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 13 CAN-SPAM Law Enforcement is a problem because spammers can move their operations from one server to another in minutes.

XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 14 Yahoo Mail Options Spam Protection  Customizes anti-spam tools to maximize spam protection. Filters  Sorts incoming mail into designated folders. Signature  Attaches a custom signature to outgoing s.