wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Webmail

profile
Harsha panchal
Aug 25, 2022
0 Likes
0 Discussions
143 Reads

Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, Gmail, GMX Mail, Mailfence, Outlook.com/Hotmail.com, Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers (ISP) provide webmail as part of their internet service package. Similarly, some web hosting providers also provide webmail as a part of their hosting package.

As with any web application, webmail's main advantage over the use of a desktop email client is the ability to send and receive email anywhere from a web browser. Its main disadvantage is the need to be connected to the Internet while using it.

The first Web Mail implementation was developed at CERN in 1993 by Phillip Hallam-Baker as a test of the HTTP protocol stack, but was not developed further. In the next two years, however, several people produced working webmail applications.

Webmail service providers (such as Hotmail and RocketMail) emerged in 1996 as a free service to the general public, and rapidly gained in popularity.

In some cases, webmail application software is developed in-house by the organizations running and managing the application, and in some cases it is obtained from software companies that develop and sell such applications, usually as part of an integrated mail server package an early example being Netscape Messaging Server.

Webmail is an email system that can be accessed via any web browser when connected to the internet. All emails, calendar services, and contacts are hosted on the email service provider's online servers. This makes it handy when you need to check your email in the depths of the Amazon rainforest.

Types of webmail :There are two main types of email service providers to choose from: Email clients and Webmail. Let's briefly go over these different types of providers.

Webmail that is accessed over unsecured HTTP may be readable by a third party who has access to the data transmission, such as over an unsecured Wi-Fi connection. This may be avoided by connecting to the webmail service via HTTPS, which encrypts the connection.Gmail has supported HTTPS since launch and in 2014 began requiring it for all webmail connections.Yahoo! Mail added the option to connect over HTTPS in 2013 and made HTTPS required in 2014.

Email users may find the use of both a webmail client and a desktop client using the POP3 protocol presents some difficulties. For example, email messages that are downloaded by the desktop client and are removed from the server will no longer be available on the webmail client. The user is limited to previewing messages using the web client before they are downloaded by the desktop email client. However, one may choose to leave the emails on the server, in which case this problem does not occur. The use of both a webmail client and a desktop client using the IMAP4 protocol allows the contents of the mailbox to be consistently displayed in both the webmail and desktop clients and any action the user performs on messages in one interface will be reflected when the email is accessed via the other interface.


Comments ()


Sign in

Read Next

Transgender

Blog banner

Disk Management

Blog banner

Street foods

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

INTERNET SECURITY

Blog banner

DATA WRANGLING

Blog banner

american greatines

Blog banner

Smartsheet

Blog banner

Multiprocessor and scheduling

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Virtual memory

Blog banner

Disk scheduling

Blog banner

Who decides your overthinking, anyway?

Blog banner

USPS mail

Blog banner

Hubspot

Blog banner

Hey Aryan here

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

Deadlock and Starvation

Blog banner

Getting started with Android Studio

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

INTERNET

Blog banner

A little bit of salt is all the hash needs!

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Why we should do reading

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

How to Build an Effective Digital Campaign

Blog banner

About myself

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

OS Assignment 3

Blog banner

Memory heirachy (Operating system)

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

KASHMIR TRIPS

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Constrained Management in IT

Blog banner

INTERRUPTS

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Web Site

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Shoulders

Blog banner