wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Outlook.com

profile
Abhinash Jha
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Outlook.com is a personal information manager web app from Microsoft consisting of web mail, calendering , contacts,and task services .Founded in 1996 by sabeer bhatia and jack smith as Hotmail ,it was acquired by Microsoft in 1997 for an estimated of $400 million and relaunched as MSN Hotmail ,later rebranded to Windows  Live Hotmail as part of the windows  Live suits of products . Microsoft phased out Hotmail in October 2011,relaunching the service as outlook.com in 2012.

Outlook.com has promised to respect users privacy, specifically targeting gmails privacy practices . outlook.com does not scan email or attachments for advertising information and personal conversations are ad free entirely .

Let's remind Hotmail is free e-mail provider You have a strong email security guaranteed thnks to Microsoft anti viruses and anti spam tools .You can also connect multiple mailboxes from other email supplier account . outlook offers alot of other services such as contact databases, Calendar,task, etc.

 SSL and TSL are both supported as Encryption protocol in Gmail, Hotmail considered as more secure as user email are not scanned to send ads.


Comments ()


Sign in

Read Next

Memory input output management

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

10 Interesting Facts about Death Note

Blog banner

Memory input output management

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

DIGITAL ECONOMY

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Types of Malware in Cyber Security

Blog banner

Memory Management

Blog banner

What is OS Fingerprinting?

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Dekkers Algorithm

Blog banner

Time Series Analysis

Blog banner

Have You Explored India Yet?

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Race Condition in Operating Theatre

Blog banner

Types of Hackers.

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Education?

Blog banner

GIS Topography

Blog banner

Article on team management software

Blog banner

Network Forensics Tools and Techniques

Blog banner

Starvation and Deadlock.

Blog banner

Deadlock in operating system

Blog banner

Environmental Management using GIS

Blog banner

Disk scheduling

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Importance Of Time

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

THE ACTORS LIFE

Blog banner

CSI and Organizational Change

Blog banner

Direct Memory Access

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Challenges and risks in service operations

Blog banner

RAID

Blog banner

Deadlocks in Operating System

Blog banner

How Running Changed My Life

Blog banner

OS ASSIGNMENT

Blog banner