The Fetchmail FAQ

Total Page:16

File Type:pdf, Size:1020Kb

The Fetchmail FAQ The Fetchmail FAQ The Fetchmail FAQ Table of Contents Frequently Asked Questions About Fetchmail.........................................................................................................1 General problems........................................................................................................................................................3 G1. What is fetchmail and why should I bother?............................................................................................3 G2. Where do I find the latest FAQ and fetchmail sources?...........................................................................3 G3. I think I've found a bug. Will you fix it?..................................................................................................3 G4. I have this idea for a neat feature. Will you add it?..................................................................................5 G5. I want to make fetchmail behave like Outlook Express...........................................................................5 G6. Is there a mailing list for exchanging tips?...............................................................................................5 G7. So, what's this I hear about a fetchmail paper?.........................................................................................5 G8. What is the best server to use with fetchmail?..........................................................................................6 G9. What is the best mail program to use with fetchmail?..............................................................................6 G10. How can I avoid sending my password en clair?....................................................................................6 G11. Is any special configuration needed to use a dynamic IP address?........................................................8 G12. Is any special configuration needed to use firewalls?.............................................................................9 G13. Is any special configuration needed to send mail?.................................................................................9 G14. Is fetchmail Y2K-compliant?..................................................................................................................9 G15. Is there a way in fetchmail to support disconnected IMAP mode?........................................................9 G16. How will fetchmail perform under heavy loads?....................................................................................9 Build-time problems..................................................................................................................................................11 B1. Make coughs and dies when building on FreeBSD................................................................................11 B2. Lex bombs out while building the fetchmail lexer.................................................................................11 B3. I get link failures when I try to build fetchmail......................................................................................11 B4. I get build failures in the intl directory...................................................................................................11 Fetchmail configuration file grammar questions...................................................................................................13 F1. Why does my old .fetchmailrc file no longer work?...............................................................................13 F2. The .fetchmailrc parser won't accept my all-numeric user name............................................................15 F3. The .fetchmailrc parser won't accept my host or username beginning with 'no'.....................................15 F4. I'm getting a 'parse error' message I don't understand.............................................................................15 Configuration questions............................................................................................................................................17 C1. Why do I need a .fetchmailrc when running as root on my own machine?............................................17 C2. How can I arrange for a fetchmail daemon to get killed when I log out?...............................................17 C3. How do I know what interface and address to use with --interface?......................................................18 C4. How can I set up support for sendmail's anti-spam features?.................................................................19 C5. How can I poll some of my mailboxes more/less often than others?.....................................................19 Fetchmail works OK started up manually, but not from an init script..........................................................19 C7. How can I forward mail to another host?................................................................................................20 How to make fetchmail play nice with various MTAs...........................................................................................21 T1. How can I use fetchmail with sendmail?................................................................................................21 T2. How can I use fetchmail with qmail?......................................................................................................22 T3. How can I use fetchmail with exim?.......................................................................................................23 T4. How can I use fetchmail with smail?......................................................................................................23 T5. How can I use fetchmail with SCO's MMDF?........................................................................................24 T6. How can I use fetchmail with Lotus Notes?...........................................................................................24 i The Fetchmail FAQ Table of Contents How to make fetchmail play nice with various MTAs T7. How can I use fetchmail with Courier IMAP?........................................................................................24 T8. How can I use fetchmail with vbmailshield?..........................................................................................24 How to make fetchmail work with various servers................................................................................................25 S1. How can I use fetchmail with qpopper?..................................................................................................25 S2. How can I use fetchmail with Microsoft Exchange?...............................................................................25 S3. How can I use fetchmail with HP OpenMail?.........................................................................................26 S4. How can I use fetchmail with Novell GroupWise?.................................................................................26 S5. How can I use fetchmail with InterChange?...........................................................................................27 S6. How can I use fetchmail with MailMax?................................................................................................27 S7. How can I use fetchmail with FTGate?...................................................................................................27 How to fetchmail work with specific ISPs...............................................................................................................29 I1. How can I use fetchmail with CompuServe RPA?..................................................................................29 I2. How can I use fetchmail with Demon Internet's SDPS?..........................................................................29 I3. How can I use fetchmail with usa.net's servers?......................................................................................30 I4. How can I use fetchmail with geocities POP3 servers?...........................................................................30 I5. How can I use fetchmail with Hotmail or Lycos Webmail?....................................................................31 I6. How can I use fetchmail with MSN?.......................................................................................................31 I7. How can I use fetchmail with SpryNet?...................................................................................................31 I8. How can I use fetchmail with comcast.net or other Maillennium servers?.............................................31 How to set up well-known security and authentication methods..........................................................................33 K1. How can I use fetchmail with SOCKS?..................................................................................................33 K2. How can I use fetchmail with IPv6 and IPsec?......................................................................................33 K3. How can I get fetchmail to work with ssh?............................................................................................33 K4. What do I have to do to use the IMAP-GSS protocol?...........................................................................33 K5. How can I use fetchmail with SSL?........................................................................................................34 K6. How can I tell fetchmail not to use
Recommended publications
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Design Document
    SPEC OSG Mailserver Subcommittee SPECmail2009 Benchmark Architecture White Paper Revision: v1.0 Date: 22 December 2008 Copyright © 2001-2009 Standard Performance Evaluation Corporation. All Rights Reserved. 1. Introduction 1.1 Overview SPECmail2009 is a software benchmark designed to measure a system's ability to act as an enterprise mail server servicing email requests, based on the Internet standard protocols SMTP and IMAP4. The benchmark concentrates on the workload encountered by corporate mail servers, with an overall user count in the range of 150 to 10,000 (or more) users. It models IMAP business users accessing IMAP servers over fast local area networks (LAN) instead of broadband, WAN or dialup access speeds. Two separate metrics measure e-mail servers with and without secure network connections (SSL). SPECmail2009 has been developed by the Standard Performance Evaluation Corporation (SPEC), a non-profit group of computer vendors, system integrators, universities, research organizations, publishers, and consultants. This paper discusses the benchmark principles and architecture, and the rationale behind the key design decisions. It also outlines the workload used in the benchmark, and the general steps needed to run a benchmark. However those aspects are covered in more detail in other documents. 1.2 Organization of this Paper Chapter 2 discusses the basic goals and non-goals of the benchmark. Chapter 3 introduces the two performance metrics for SPECmail2009 – IMAP sessions per hour - and how it relates to the transaction mix imposed on the system under test.. Chapter 4 explains the benchmark workload - how it was derived, how it translates into configuration parameters for the benchmark tool and size calculations for planning a benchmark, and how it relates to the benchmark metric.
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • A4 Paper Format / International Standard Paper Sizes
    A4 paper format / International standard paper sizes International standard paper sizes by Markus Kuhn Standard paper sizes like ISO A4 are widely used all over the world today. This text explains the ISO 216 paper size system and the ideas behind its design. The ISO paper size concept In the ISO paper size system, the height-to-width ratio of all pages is the square root of two (1.4142 : 1). In other words, the width and the height of a page relate to each other like the side and the diagonal of a square. This aspect ratio is especially convenient for a paper size. If you put two such pages next to each other, or equivalently cut one parallel to its shorter side into two equal pieces, then the resulting page will have again the same width/height ratio. The ISO paper sizes are based on the metric system. The square-root-of-two ratio does not permit both the height and width of the pages to be nicely rounded metric lengths. Therefore, the area of the pages has been defined to have round metric values. As paper is usually specified in g/m², this simplifies calculation of the mass of a document if the format and number of pages are known. ISO 216 defines the A series of paper sizes based on these simple principles: ● The height divided by the width of all formats is the square root of two (1.4142). ● Format A0 has an area of one square meter. ● Format A1 is A0 cut into two equal pieces.
    [Show full text]
  • Simple Mail Transfer Protocol (SMTP)
    Mail agents MUA = Mail User Agent Interacts directly with the end user Introduction to Internet Mail Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry, Pegasus, Simeon, Netscape, Outlook, ... Multiple MUAs on one system - end user choice Philip Hazel MTA = Mail Transfer Agent University of Cambridge Receives and delivers messages Sendmail, Smail, PP, MMDF, Charon, Exim, qmail, Postfix, ... One MTA per system - sysadmin choice Message format (1) Message format (2) From: Philip Hazel <[email protected]> An address consists of a local part and a domain To: Julius Caesar <[email protected]> [email protected] Cc: Mark Anthony <[email protected]> Subject: How Internet mail works A basic message body is unstructured Julius, Other RFCs (MIME, 2045) add additional headers which I'm going to be running a course on ... define structure for the body Format was originally defined by RFC 822 in 1982 MIME supports attachments of various kinds and in Now superseded by RFC 2822 various encodings Message consists of Header lines Creating/decoding attachments is the MUA's job A blank line Body lines Authenticating senders MUA MTA Spool log Embedded MUA uses inter-process call to send to MTA in May use pipe, file, or internal SMTP over a pipe Folders Mailbox MTA knows the identity of the sender Normally inserts Sender: header if differs from From: SMTP MTA Spool Freestanding MUA uses SMTP to send mail MTA cannot easily distinguish local/remote clients SMTP No authentication in basic protocol Folders SMTP AUTH command in extended
    [Show full text]
  • Exim the Mail Transfer Agent.Pdf
    ,Title.10724 Page 1 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent ,Title.10724 Page 2 Tuesday, October 9, 2001 9:25 AM ,Title.10724 Page 3 Tuesday, October 9, 2001 9:25 AM Exim The Mail Transfer Agent Philip Hazel Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo ,Copyright.10561 Page 1 Tuesday, October 9, 2001 9:25 AM Exim: The Mail Transfer Agent by Philip Hazel Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editor: Andy Oram Production Editor: Mary Brady Cover Designer: Ellie Volckhausen Printing History: June 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of an aye-aye and Exim is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Hazel, Philip Exim: the mail transfer agent/by Philip Hazel p.cm. ISBN 0-596-00098-7 1. Exim (Computer program) 2.
    [Show full text]
  • Designing a User Interface for the Innovative E-Mail Client Semester Thesis
    Designing a User Interface for the Innovative E-mail Client Semester Thesis Student: Alexandra Burns Supervising Professor: Prof. Bertrand Meyer Supervising Assistants: Stephanie Balzer, Joseph N. Ruskiewicz December 2005 - April 2006 1 Abstract Email Clients have become a crucial application, both in business and for per- sonal use. The term information overload refers to the time consuming issue of keeping up with large amounts of incoming and stored email. Users face this problem on a daily basis and therefore benefit from an email client that allows them to efficiently search, display and store their email. The goal of this thesis is to build a graphical user interface for the innovative email client developed in a previous master thesis. It also explores the possibilities of designing a user interface outside of the business rules that apply for commercial solutions. 1 Contents 1 Introduction 4 2 Existing Work 6 2.1 ReMail ................................. 6 2.1.1 Methods ............................ 6 2.1.2 Problems Identified ...................... 7 2.1.3 Proposed Solutions ...................... 7 2.1.4 Assessment .......................... 8 2.2 Inner Circle .............................. 8 2.2.1 Methods ............................ 8 2.2.2 Problems Identified ...................... 9 2.2.3 Proposed Solutions ...................... 9 2.2.4 Assessment .......................... 10 2.3 TaskMaster .............................. 10 2.3.1 Methods ............................ 10 2.3.2 Problems Identified ...................... 11 2.3.3 Proposed Solution ...................... 11 2.3.4 Assessment .......................... 12 2.4 Email Overload ............................ 12 2.4.1 Methods ............................ 12 2.4.2 Problems Identified ...................... 13 2.4.3 Proposed Solutions ...................... 13 2.4.4 Assessment .......................... 14 3 Existing Solutions 16 3.1 Existing Email Clients .......................
    [Show full text]
  • Securedrop Documentation Release 0.9.0
    SecureDrop Documentation Release 0.9.0 SecureDrop Team and Contributors Sep 05, 2018 User Guides 1 Source Guide 3 1.1 Choosing the Right Location.......................................3 1.2 Get the Tor Browser...........................................3 1.3 Choose Who to Submit To........................................4 1.4 Making Your First Submission......................................4 1.5 Continuing the Conversation....................................... 10 2 Journalist Guide 15 2.1 Updating Your Workstation....................................... 15 2.2 Creating a GPG Key........................................... 16 2.3 Connecting to the Journalist Interface .................................. 16 2.4 Daily Journalist Alerts About Submissions............................... 17 2.5 Interacting With Sources......................................... 18 2.6 Moving Documents to the Secure Viewing Station ........................... 21 2.7 Decrypting on the Secure Viewing Station ................................ 26 2.8 Working with Documents........................................ 28 2.9 Encrypting and Moving Documents to the Journalist Workstation ................... 29 2.10 Decrypting and Preparing to Publish................................... 31 3 Admin Guide 33 3.1 Responsibilities.............................................. 33 3.2 Common Tasks.............................................. 35 3.3 Frequently Asked Questions....................................... 44 4 Passphrase Best Practices 47 4.1 General Best Practices.........................................
    [Show full text]
  • Uninstalling Imail Server
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©1995-2011 Ipswitch, Inc. All rights reserved. IMail Server Getting Started Guide This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History March 2005 v8.2 November 2005 v2006 January 2006 v2006.02 April 2006 v2006.04 July 2006 v2006.1 February 2007 v2006.2 October 2007 v2006.22 February 2008 v10 November 2008 v10.02 April 2009 v11 November 2009 v11.01 May 2010 v11.02 October 2010 v11.03 April 2011 v11.5 November 2011 v12 Contents CHAPTER 1 Getting Started with IMail Server About Getting Started................................................................................................................................................
    [Show full text]
  • The BG News October 20, 2008
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 10-20-2008 The BG News October 20, 2008 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News October 20, 2008" (2008). BG News (Student Newspaper). 7979. https://scholarworks.bgsu.edu/bg-news/7979 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. ESTABLISHED 1920 A daily independent student press serving THE BG NEWS the campus and surrounding community Monday October 20,2008 Volume 103. Issue 42 WWWBGNEWSCOM Guest speakers at GSS meeting Edward Whipple and billing off the old Deanne Snavely spoke at the most recent GSS meeting, encouraging campus involvement label once and for al as well as expressing concerns pertaining to graduate education | Page 3 CHRISTINA MCGINNIS !■■; I.,'. CAMPAIGNING: Republican presidential nominee John McCain promised the residents Make use of of the Toledo aiea to focus on the needs of the average citizen at his rally yesterday. the privacy controls! Columnist Greg Chick McCain ILLUSTRATION BY JENN1FIR WALKED "~> responds to last week's article detailing the University's creation BGSU rises in Trojan sexual health rankings from 100 to 33 of a Web page aiming 'straight talks' to educate students on what information By Alexandria CUrk to hide or provide Reporter TROJAN SEXUAL HEALTH REPORT CARD on social-networking pages, believing that to Toledo Those who attend the 2008: 2007 DATA: students just need to University are probably famil- use the privacy options By K ri Itan Vasal of the failing economy.
    [Show full text]
  • Unit 13 E-Mail and E-Messaging
    UNIT 13 E-MAIL AND E-MESSAGING Structure 13.0 Objectives 13.1 Introduction 13.2 E-mail 13.2.1 Defining Email 13.2.2 Need of Email 13.2.3 Email Address 13.3 Types of Email Services 13.3.1 Free Web-based Email Services 13.3.2 Priced Web-based Email Services 13.3.3 Private Email Services 13.4 Types of Email Account 13.4.1 POP/IMAP Account 13.4.2 Email Forwarder 13.4.3 Mailing List 13.4.4 Auto Responder 13.4.5 Email Bouncer 13.4.6 Email Blackhole 13.5 Structure and Features of Email 13.5.1 Header 13.5.2 Body 13.5.3 Features 13.6 Functioning of Email Systems 13.6.1 Protocols 13.6.2 Delivery Agent 13.6.3 Access Client 13.6.4 Setting up Account 13.6.5 Folder Management 13.7 Messaging 13.7.1 Instant Messaging 13.7.2 Unified Messaging 13.8 Issues with Messaging 13.8.1 Spamming 13.8.2 Privacy 13.8.3 Security 13.9 Widgets and Utilities 13.10 Summary 13.11 Answers to Self Check Exercises 13.12 Keywords 13.13 References and Further Reading 5 Internet Tools and Services 13.0 OBJECTIVES After reading this Unit, you will be able to: provide a detailed account about Email and Email service Providers; explain in detail various Protocols used in Email service; and discuss about Web 2.0 tools in Email. 13.1 INTRODUCTION Electronic Mail is one of the most prominent uses of networked communication technology.
    [Show full text]