wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Webmail

profile
Harsha panchal
Aug 25, 2022
0 Likes
0 Discussions
143 Reads

Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, Gmail, GMX Mail, Mailfence, Outlook.com/Hotmail.com, Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers (ISP) provide webmail as part of their internet service package. Similarly, some web hosting providers also provide webmail as a part of their hosting package.

As with any web application, webmail's main advantage over the use of a desktop email client is the ability to send and receive email anywhere from a web browser. Its main disadvantage is the need to be connected to the Internet while using it.

The first Web Mail implementation was developed at CERN in 1993 by Phillip Hallam-Baker as a test of the HTTP protocol stack, but was not developed further. In the next two years, however, several people produced working webmail applications.

Webmail service providers (such as Hotmail and RocketMail) emerged in 1996 as a free service to the general public, and rapidly gained in popularity.

In some cases, webmail application software is developed in-house by the organizations running and managing the application, and in some cases it is obtained from software companies that develop and sell such applications, usually as part of an integrated mail server package an early example being Netscape Messaging Server.

Webmail is an email system that can be accessed via any web browser when connected to the internet. All emails, calendar services, and contacts are hosted on the email service provider's online servers. This makes it handy when you need to check your email in the depths of the Amazon rainforest.

Types of webmail :There are two main types of email service providers to choose from: Email clients and Webmail. Let's briefly go over these different types of providers.

Webmail that is accessed over unsecured HTTP may be readable by a third party who has access to the data transmission, such as over an unsecured Wi-Fi connection. This may be avoided by connecting to the webmail service via HTTPS, which encrypts the connection.Gmail has supported HTTPS since launch and in 2014 began requiring it for all webmail connections.Yahoo! Mail added the option to connect over HTTPS in 2013 and made HTTPS required in 2014.

Email users may find the use of both a webmail client and a desktop client using the POP3 protocol presents some difficulties. For example, email messages that are downloaded by the desktop client and are removed from the server will no longer be available on the webmail client. The user is limited to previewing messages using the web client before they are downloaded by the desktop email client. However, one may choose to leave the emails on the server, in which case this problem does not occur. The use of both a webmail client and a desktop client using the IMAP4 protocol allows the contents of the mailbox to be consistently displayed in both the webmail and desktop clients and any action the user performs on messages in one interface will be reflected when the email is accessed via the other interface.


Comments ()


Sign in

Read Next

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Policies for Service Transition

Blog banner

Blog on health and fitness

Blog banner

Health and fitness in technology

Blog banner

Electronic Funds Transfer

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Big Data Architecture

Blog banner

Layers Of Blockchain

Blog banner

Artificial Intelligence (AI)

Blog banner

Disk scheduling

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

INTERRUPTS

Blog banner

Every body is beautiful

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Predictive Analysis - Ek Overview

Blog banner

File management

Blog banner

Artical on FreshBooks

Blog banner

File and File System Structure

Blog banner

Operating System

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

The evolution of OS

Blog banner

Natural Language Processing(NLP)

Blog banner

COMMUNICATION

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Deadlock

Blog banner

Virtual Memory

Blog banner

How Men and Women Process Pain Differently

Blog banner

Email Privacy

Blog banner

R Programming

Blog banner

Some web vulnerabilities

Blog banner

Security Breaches in Stock market trading

Blog banner

 " Healing of Yoga "

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Development Of Modern Operating System

Blog banner

Teenagers of Today

Blog banner

Segmentation and paging concept

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

How Harshad Valia International School is nurturing India’s Young Minds?

Blog banner

Amazon

Blog banner

Decoding Modern Assessment: Why We Look Beyond the Grade Sheet

Blog banner