Electronic Mail | e-mail: Visibility recipients
The addresses of the main recipients (To: or A:) and those copies (Cc:) are equally visible to all recipients.
The choice of putting a person in one of the two fields is linked to the role that people have about the subject of the message. For example, if a message needs to perform a task means that you ask who is the principal recipient (To: or A:) to execute, while the copy recipients (Cc:) are informed that this request was done, but do not expect them to perform that task.
The address of carbon copy recipients (Bcc: or Bcc:) do not appear in the message delivered to the recipients. This fact can make it known to others what you’re saying and who the recipients without “official” to be aware of. “Putting DC” or “CCN” expression is widespread in the workplace and in social groups organized.
When email is used to disseminate messages to many people who do not know each other (such as press publicity, advertising, witty messages more or less useful), the fact that each recipient will know who the other recipients and their addresses is not generally desirable, for reasons of privacy and security. In particular, if you send a message to a large number of people who do not necessarily know each other, they will not necessarily agree that their addresses, and the fact that they received that message, is made known to strangers. Moreover, many worms propagate by e-mail, and use the addresses in your messages to spread. Send a message with the recipients’ addresses in the clear means then expose all the recipients to further risk of infection if one of them is infected. To overcome this problem, you should use in these cases the Bcc: (or BCC), or a mailing list.
Advertising and deductibility address
The references to the To: and CC:, proposes an approach typical of the mailing list in which all communicate with everyone. Mailing lists, however, should be organized by providing a single reference address for everyone, from which the moderator shall dispatch a copy of each message to each of the members. It is highly advisable, therefore, do not play in clear all the addresses registered in the mailing list, but include, for receiving the responses, only the address of the mailing list which is merely the container of the addresses of all subscribers, and offers advantage of not making public the addresses of members by exposing them to the risk of being contacted by others without control, without confidentiality with respect to their e-mail, with no connection to the theme of subscribed mailing list, since if the addresses are visible, each MS could contact one another directly and for any other reason. It is valid as an alternative to resort to stratagem to include all recipients in the BCC field hidden:.
It is hardly necessary to mention that when the e-mail addresses or pseudonyms are not fanciful names, but respond to agreements with no fixed rule, they are easily deducible from the rule, and then if you ensure the accessibility of the members in homogeneous groups of people, it is also true that they are already regarded as potentially “public” even if they are not spread by email. In other words: if, for ensuring the accessibility of all personnel in the company, an employee may contact a colleague just knowing his name and applying the Convention for the creation of corporate e-mail has already waived the confidentiality of e-mail, even if not advertised by sending them an email.
Operation of Client
The e-mail clients are programs that allow you to operate on the content of one or more mailboxes. The vast majority of clients has roughly the same main features, as opposed to presentation graphics and advanced features.
The mail client has traditionally been a program running on the computer used by the user, but is also widespread ability to use the same functionality as a web application
The main function is to display a list of messages in the box, where for every message you see only some headers such as Subject, date, sender, and sometimes the first few lines of text in the message body.
The possible operations on a message are typically:
- Read the message body
- Reply (Reply): reply to this message, or compose a new message to the sender, which often includes the text of the message received (quote). Your reply message has the same subject of the message to which it responds, preceded by “Re” (“R” on some clients) to indicate that this is an answer.
- Reply to All (Reply to All): reply to this message, but sending the reply to the sender and all other recipients.
- Forward (Forward): Sends the text of an e-mail received to other addresses. The message has the same subject of the forwarded message, preceded by “Fw:”.
- Delete: deletes the message.
There is also naturally function to compose and send a new message.
To get an e-mail box you can follow different paths:
- Internet Service Providers typically provide email accounts to their customers, in addition to connectivity services or even free. Sometimes these email accounts have limitations, particularly often the box is accessible via standard protocols such as POP or IMAP only when connected to the Internet via an ISP that provides otherwise and only via Webmail.
- Many employers provide email accounts to their employees. However, it is necessary to make sure what are the conditions of use of this box, especially as regards the use for personal purposes. Moreover, often with the interruption of employment you lose access to the box. Therefore, you should use these boxes for work purposes only.
- Number of sites that offer free one or more email addresses. These always provide access to email via the web, and sometimes only one.
- Some Internet Service Providers provide an email service charge, with guarantees on service quality (availability, antivirus and antispam services, size of the field) and with the possibility of having its own DNS domain.
- If you have a permanent Internet connection with a public IP address and the necessary skills, you can install and manage your mail server. This usually requires the use of a dynamic DNS service to make your domain more accessible.
Latest posts by Santosh (see all)
- Cloud Computing: The Concept and Examples of its Virtual Services | Part 1 - July 23, 2012
- Why Rapidly Growing Companies Need Cloud Computing | Part 1 - July 22, 2012
- Web Designing Process | Strategic Planning | Part 1 - August 7, 2011