wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Webmail

profile
Harsha panchal
Aug 25, 2022
0 Likes
0 Discussions
143 Reads

Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, Gmail, GMX Mail, Mailfence, Outlook.com/Hotmail.com, Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers (ISP) provide webmail as part of their internet service package. Similarly, some web hosting providers also provide webmail as a part of their hosting package.

As with any web application, webmail's main advantage over the use of a desktop email client is the ability to send and receive email anywhere from a web browser. Its main disadvantage is the need to be connected to the Internet while using it.

The first Web Mail implementation was developed at CERN in 1993 by Phillip Hallam-Baker as a test of the HTTP protocol stack, but was not developed further. In the next two years, however, several people produced working webmail applications.

Webmail service providers (such as Hotmail and RocketMail) emerged in 1996 as a free service to the general public, and rapidly gained in popularity.

In some cases, webmail application software is developed in-house by the organizations running and managing the application, and in some cases it is obtained from software companies that develop and sell such applications, usually as part of an integrated mail server package an early example being Netscape Messaging Server.

Webmail is an email system that can be accessed via any web browser when connected to the internet. All emails, calendar services, and contacts are hosted on the email service provider's online servers. This makes it handy when you need to check your email in the depths of the Amazon rainforest.

Types of webmail :There are two main types of email service providers to choose from: Email clients and Webmail. Let's briefly go over these different types of providers.

Webmail that is accessed over unsecured HTTP may be readable by a third party who has access to the data transmission, such as over an unsecured Wi-Fi connection. This may be avoided by connecting to the webmail service via HTTPS, which encrypts the connection.Gmail has supported HTTPS since launch and in 2014 began requiring it for all webmail connections.Yahoo! Mail added the option to connect over HTTPS in 2013 and made HTTPS required in 2014.

Email users may find the use of both a webmail client and a desktop client using the POP3 protocol presents some difficulties. For example, email messages that are downloaded by the desktop client and are removed from the server will no longer be available on the webmail client. The user is limited to previewing messages using the web client before they are downloaded by the desktop email client. However, one may choose to leave the emails on the server, in which case this problem does not occur. The use of both a webmail client and a desktop client using the IMAP4 protocol allows the contents of the mailbox to be consistently displayed in both the webmail and desktop clients and any action the user performs on messages in one interface will be reflected when the email is accessed via the other interface.


Comments ()


Sign in

Read Next

MODERN OPERATING SYSTEM

Blog banner

Teenagers of Today

Blog banner

Microsoft Windows Overview

Blog banner

To travel is to live

Blog banner

DISK SCHEDULING

Blog banner

Is Your Password Complex Enough?

Blog banner

How Does SSO Works

Blog banner

IT RISK

Blog banner

Life of an army person

Blog banner

Race condition

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Data Science in Mental Health Prediction

Blog banner

Business Engineering

Blog banner

Article on team management software

Blog banner

GraphQL

Blog banner

Deadlock in Operating systems

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Deadlocks in operating system

Blog banner

Artificial Intelligence (AI)

Blog banner

Memory Management

Blog banner

Virtual Memory

Blog banner

Memory Management

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Session Hijacking Techniques

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

PERSONAL STORIES

Blog banner

OS Evolution Achievements

Blog banner

The Evolution of Operating Systems

Blog banner

Having passion in life

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Components of GIS

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Child labour

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Service design process in ITSM

Blog banner

Security issues

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner