How to stop your Office Watch newsletters going to the Junk E-mail folder. To make sure your Office Watch newsletters don’t end up in your Junk Email folder you need to set us up as a ‘Safe Sender’. Here’s how to do that in Outlook. Keep in mind that Outlook
It’s easy to send photos via email, with several options available for doing this, but there are some things to keep in mind when doing it. We’ll cover the basics and also some of the issues you need to keep in mind. In Office Watch newsletters we try to go
If you thought that all email addresses are the same, think again. There are five main types of email address and if you want to organize your email sensibly you should know the difference. All email addresses are formatted the same way @ but what isn’t obvious are the different
Google’s free Gmail service is still forging ahead with improvements to make it a compelling email host – not just for web based email but also for people with almost any email program. It’s a service that is far better than what most ISP’s give you with an Internet connection.
A new security threat known as the VML vulnerability has just been patched by Microsoft with a possibility of email messages taking advantage of this security gap in Windows. This is important because there’s a possibility of email messages taking advantage of this security gap in Windows. Just displaying a
How to remove the current plague of spam alleging “You’ve received a … “ Many people have been getting the latest incarnation of spam – messages with a subject starting with “You’ve received a” followed by a mix of alleged message types and affiliation group. These spams started with things
Why the Deleted Items folder is your friend There’s a feeling around for some people that they need to keep their Outlook ‘clean’ or ‘uncluttered’ with messages removed from the Inbox immediately and even the deleted items folder kept empty. While this sounds like a good idea, it’s really not
Some Outlook users have the option to recover deleted items even after they have disappeared. If your copy of Outlook is connected to Microsoft Exchange Server then the Deleted Items folder is a little different in two respects. When items are deleted from the ‘Deleted Items’ folder they are not
A new US court decision may make your email more accessible than you’d like. The legal battle about the status of emails continues with a US Federal Court in Cincinnati adding more mud to already unclear waters. When emails are stored on computers out of your direct control (like an
Symantec has an online ‘health check’ for your email. Symantec’s free email health check is available at http://edm.symantec.com/emailhealthcheck/ It looks at your email system from the security, backup and archiving perspectives. At the start you’re asked for your name, company, email address and phone number — all are required including
A reader is having a problem with some sluggish machines running Outlook – we suggest some possible cures. Al C. writes with a question about Outlook, he gave some details and had covered some obvious bases (virus infection, checked the Microsoft Knowledge Base), in summary: “I have 4 machines that
Even after all these years, people still give money to email scammers. The so-called ‘Nigerian’ scams have been going on for years and pre-date email. Some of you might remember getting letters and then faxes offering a commission on some large sum in exchange for helping get the money offshore.
Gmail has a good spam filter, you can use it for your own email accounts. In Email Essentials we often talk about spam filters that go too far, stopping you from seeing messages that you want to see. Many spam filters are either hidden from view or not configurable leaving
Spam filters can only give a guess about whether a message is spam or not … Last week we talked about messages disappearing before you receive them and the problem of over-zealous spam filters. In this issue we’ll look inside spam filters to see why they are not perfect. You
How can I get spam emails when my address isn’t listed as a receiver? Often spam arrives with email addresses in TO: or CC: that are similar but not the same as your address. You can’t find your address in the message – so how did it get to you?
The British Library is collecting emails this month. The British Library, in conjunction with Microsoft’s Windows Live is collecting a snapshot of email from UK residents all through May 2007. Email Britain is collecting messages from people to be preserved for future generations to get a glimpse of daily, virtual,
The possible ‘road-blocks’ between you and an email message. There’s a very real possibility that a message you send won’t reach the intended destination. Email delivery isn’t guaranteed and these days there are plenty of blocks between sender and recipient. Every week we hear from readers who are either sending
An all-too-common story from New Zealand where someone’s name causes their email to be refused. A somewhat funny email story from New Zealand this weekend shows how email filters have to be configured very carefully. Gay Hamilton sent an innocent customer enquiry to NZ Telecom (the major telco) and was
The ‘Privacy’ option at Google Checkout does more than you might expect or want. At Google Checkout (Google’s online payment option) you’ll see an option like this: ‘Keep my email address confidential. Google will forward all email from to ‘. This option creates an email alias (eg ‘[email protected]’ ) which
Do you know all the email addresses you have available? Remember when you got your first email address? What an exciting time, giving it out to friends and hoping for incoming emails. Even your first spam might have been interesting. These days the problem for many people isn’t one email
We look at some common problem areas with email account connections and how to trace the fault. When you’re setting up a new email account in your email program there’s lots of little things that can go wrong. One little typo or misunderstanding can break the connection. While the troubleshooting
Interesting comments and stories from our readers Some interesting messages from readers after our last issue regarding access to email accounts after the death of the user. In that article we deliberately kept our comments general – the legal situation for executors or estate administrators varies between countries and states.
What happens if you need to access webmail for someone who has died? And what should you do to prepare? An interesting article in the Sydney Morning Herald about access to email accounts after the account holder dies. This caught Peter’s eye because in a previous decade (pre-email) he worked
Some thoughts about a ’12 step’ program for email junkies. Another article that caught my eye was on CNN Twelve-steps to curing e-mail addiction. Being overwhelmed by email is certainly a problem, but we’re not sure that some of the suggestions are the right course. In particular the idea of
Like almost any web site, we use technologies like cookies to store and/or access device information. We aim to keep that to a minimum. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions. We apologize for this box but it's legally required in some regions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.