wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Webmail

profile
Harsha panchal
Aug 25, 2022
0 Likes
0 Discussions
143 Reads

Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, Gmail, GMX Mail, Mailfence, Outlook.com/Hotmail.com, Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers (ISP) provide webmail as part of their internet service package. Similarly, some web hosting providers also provide webmail as a part of their hosting package.

As with any web application, webmail's main advantage over the use of a desktop email client is the ability to send and receive email anywhere from a web browser. Its main disadvantage is the need to be connected to the Internet while using it.

The first Web Mail implementation was developed at CERN in 1993 by Phillip Hallam-Baker as a test of the HTTP protocol stack, but was not developed further. In the next two years, however, several people produced working webmail applications.

Webmail service providers (such as Hotmail and RocketMail) emerged in 1996 as a free service to the general public, and rapidly gained in popularity.

In some cases, webmail application software is developed in-house by the organizations running and managing the application, and in some cases it is obtained from software companies that develop and sell such applications, usually as part of an integrated mail server package an early example being Netscape Messaging Server.

Webmail is an email system that can be accessed via any web browser when connected to the internet. All emails, calendar services, and contacts are hosted on the email service provider's online servers. This makes it handy when you need to check your email in the depths of the Amazon rainforest.

Types of webmail :There are two main types of email service providers to choose from: Email clients and Webmail. Let's briefly go over these different types of providers.

Webmail that is accessed over unsecured HTTP may be readable by a third party who has access to the data transmission, such as over an unsecured Wi-Fi connection. This may be avoided by connecting to the webmail service via HTTPS, which encrypts the connection.Gmail has supported HTTPS since launch and in 2014 began requiring it for all webmail connections.Yahoo! Mail added the option to connect over HTTPS in 2013 and made HTTPS required in 2014.

Email users may find the use of both a webmail client and a desktop client using the POP3 protocol presents some difficulties. For example, email messages that are downloaded by the desktop client and are removed from the server will no longer be available on the webmail client. The user is limited to previewing messages using the web client before they are downloaded by the desktop email client. However, one may choose to leave the emails on the server, in which case this problem does not occur. The use of both a webmail client and a desktop client using the IMAP4 protocol allows the contents of the mailbox to be consistently displayed in both the webmail and desktop clients and any action the user performs on messages in one interface will be reflected when the email is accessed via the other interface.


Comments ()


Sign in

Read Next

Top 3 Places To Stay In Vienna

Blog banner

PERSONAL STORIES

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Tracking Emails & Email Crimes

Blog banner

MailChimp

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

(Input/Output) in os

Blog banner

Types of OS

Blog banner

Blockchain in IoT Applications

Blog banner

The IT Service Lifecycle

Blog banner

Memory Management

Blog banner

Regression Analysis

Blog banner

FILE SHARING

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Threads

Blog banner

I/O Management and Disk Scheduling

Blog banner

Risk factors in service transistion

Blog banner

memory cache

Blog banner

Be you

Blog banner

Hubspot

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Socket Programming in Java

Blog banner

S-Tool : Steganography

Blog banner

Latest Email Marketing Techniques

Blog banner

Google App Engine

Blog banner

Explain website hacking issues

Blog banner

Importance of Network Security Risk

Blog banner

Lifestyle of a photographer

Blog banner

PHISHING

Blog banner

Security issues

Blog banner

OPERATING SYSTEM

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Social Engineering

Blog banner

Bit Coins

Blog banner

Trello ( management software)

Blog banner

Explain Multiprocessors

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Virtual Machine

Blog banner