wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Outlook.com

profile
Abhinash Jha
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Outlook.com is a personal information manager web app from Microsoft consisting of web mail, calendering , contacts,and task services .Founded in 1996 by sabeer bhatia and jack smith as Hotmail ,it was acquired by Microsoft in 1997 for an estimated of $400 million and relaunched as MSN Hotmail ,later rebranded to Windows  Live Hotmail as part of the windows  Live suits of products . Microsoft phased out Hotmail in October 2011,relaunching the service as outlook.com in 2012.

Outlook.com has promised to respect users privacy, specifically targeting gmails privacy practices . outlook.com does not scan email or attachments for advertising information and personal conversations are ad free entirely .

Let's remind Hotmail is free e-mail provider You have a strong email security guaranteed thnks to Microsoft anti viruses and anti spam tools .You can also connect multiple mailboxes from other email supplier account . outlook offers alot of other services such as contact databases, Calendar,task, etc.

 SSL and TSL are both supported as Encryption protocol in Gmail, Hotmail considered as more secure as user email are not scanned to send ads.


Comments ()


Sign in

Read Next

Memory management

Blog banner

SMARTSHEET

Blog banner

Article on different management system

Blog banner

Twisted world

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

INTERNET

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Social media

Blog banner

Top 10 Logos and their meanings

Blog banner

Starvation

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Consumer to consumer Business model

Blog banner

The functions of operating system

Blog banner

Evolution of OS

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Mobile Security

Blog banner

Deadlock and starvation

Blog banner

Disk scheduling

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Decoding Confusion Matrix

Blog banner

Security in Cloud Computing

Blog banner

Device driver

Blog banner

Explain website hacking issues

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Functions Of Operating Systems

Blog banner

EID UL FITR

Blog banner

10 Types of Friends in every friend group

Blog banner

Cloud Computing

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

AOL Mail

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Memory Management

Blog banner

Why Friendship at Work is Important

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

E-learning in today's world

Blog banner

Full Disk Encryption

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Virtual Memory

Blog banner

Disk Management

Blog banner