StartTLS initiates encryption of an e-mail based on the TLS protocol. For this purpose, the server is pinged without encryption first of all, and StartTLS support is requested. The encryption method can be used when the answer is positive. StartTLS is handy, as e-mails are encrypted automatically once the method has been accepted. You don't need to contact a dedicated port, StartTLS can simply be...
The Outlook address book is an important tool for many computer users who regularly send and receive messages via Microsoft's e-mail service. To restore the contact list from a backup file after a version change or data loss, or simply to add new contact information, there is this import function. We'll show you how to easily import Outlook contacts to update your address book.
How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?
With Outlook, you have all your email inboxes in view. The software makes it easy to manage multiple accounts. Not only different Microsoft accounts, but also other email service accounts can be integrated. If required, you can delete the account with just a few clicks. We’ll show you how.
The network protocol CalDAV allows you to synchronise calendar data such as appointments and meetings on your PC, smartphone or tablet. The events are then displayed presentably in iCalender format and managed in a WebDAV environment. We’ll explain what CalDAV is exactly and how you can use it yourself.
If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...
The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?
E-mails these days are quick to send – much quicker, indeed, than ordinary letters. Almost everyone has one or more e-mail addresses, and the chances are pretty good that one is with Google: Gmail is one of the most popular and most used e-mail services. But there are plenty of Gmail alternatives that stand out by offering you better protection for your personal data. We explain here what these...
If you plan to send newsletters, you’ll stumble across MailChimp sooner or later. But even though this option might seem like the king of the jungle, there are many alternatives on the market. These competitors provide interesting opportunities for experts as well as beginners. So that you don’t lose sight of things, we’ll introduce the top 7 MailChimp alternatives.
Microsoft OneNote remains one of the most frequently used digital notebooks. Above all, the most impressive aspect is its structured, multifunctional layout. However, OneNote does not stand alone in the world of digital notebooks. Other programs offer similar, even broader functions, and are also compatible with more operating systems than Windows. We present you the six best alternatives to...
IONOS E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.