Site hosted by Angelfire.com: Build your free website today!
Chapter 23: E-Mail and Newsgroups Using Outlook Express

PreviousChapterContentsGlossaryNext

How Does E-Mail Work?

Oversimplifying somewhat, the process works like this:

  1. Using an e-mail program, such as Outlook Express, the sender creates a message and decides who the recipients should be.
  2. At a designated place at the beginning of the message, the sender lists the e-mail addresses of all the recipients. (The sender can specify a long list of recipients, but for simplicity, we'll pretend there is only one.) An e-mail address specifies two things: a computer on the Internet on which a recipient receives mail (called an incoming mail server), and the name that the incoming mail server uses to designate the mailbox of the recipient. So, for example, the e-mail address president@whitehouse.gov specifies the incoming mail server whitehouse.gov and a mailbox on whitehouse.gov called president.
  3. The sender connects to an outgoing mail server, a computer connected to the Internet (usually a computer owned by the sender's Internet service provider) that runs a mail-handling program that supports SMTP (Simple Mail Transfer Protocol), which is used for Internet mail). These servers are usually called SMTP servers. The message is sent from the sender's computer to the outgoing mail server.
  4. From the outgoing mail server, the message is passed across the Internet to the recipient's incoming mail server.
  5. The recipient's incoming mail server files the message in the recipient's mailbox, a file or folder containing all the messages that the recipient hasn't downloaded to her own computer yet.
  6. Using an e-mail program (which need not be the same as the one the sender used to create and send the message), the recipient looks for new mail by logging in to the incoming mail server. Incoming mail servers use one of three protocols for receiving mail: Post Office Protocol 3 (abbreviated POP3 or POP) , Internet Message Access Protocol (IMAP), or Hypertext Transfer Protocol (HTTP). The incoming mail server uses POP, IMAP, or HTTP to deliver the message to the recipient's computer, along with any other messages that may have arrived since the recipient last checked for mail.
  7. The recipient uses the e-mail program to read the message.

Every e-mail message consists of a header (lines containing the address, the return address, the date, and other information about the message) and a body (the text of the message).

tip To send messages right away to people who are logged in at the same time you are, and receive answers in seconds, use an instant messaging program like Windows Messenger.

What Is Hotmail?

Hotmail (at http://www.hotmail.com) is a Web-based e-mail account that you access by visiting a Web site with your Web browser, rather than with the e-mail program installed on your computer. A notable exception is that Microsoft has set up Outlook Express to work conveniently with its Web e-mail service, Hotmail. After you identify yourself by giving a user name and a password, the Hotmail Web site shows you your messages and allows you to send e-mail to other people. You can access a Hotmail account through a Web browser or through Outlook Express.

Many other free Web-based accounts are available: the most popular is Yahoo Mail, at http://mail.yahoo.com. In general, Hotmail is as good as any other Web-based e-mail service, and has the advantage that Outlook Express supports it. Using Hotmail together with Outlook Express can help you avoid many of the usual aggravations of Web-based e-mail, because your e-mail interface resides on your own computer rather than on a Web site. You can conveniently work with your downloaded mail when you are offline. However, when you are away from your usual computer, you can work with your e-mail through a Web browser and leave the messages on the Hotmail computer.

What Are Attached Files?

Sometimes when you write e-mail you want to send more than just a message; you want to send files that the recipient can use with an application on her computer. For example, if you are working on a Word document with someone, you don't just want to talk about the document in your e-mail, you want to send revised versions of the document back and forth. Attached files (or attachments for short) are files that you send along with an e-mail message. The recipient can save the files on their own computer system and/or use them with their own applications. See "Attaching a File to a Message" later in this chapter for how to attach files to e-mail messages.

How Do E-Mail Viruses Work?

E-mail viruses are computer viruses--rogue programs that hackers write to do mischief on other people's computers--that spread by e-mailing copies of themselves to other computers. (Technically, such programs are worms, not viruses, but the popular press does not usually make this distinction.) If an e-mail virus gets into your computer, it may try to send infected e-mail to everyone in your Address Book. The e-mail sent will look like it is coming from you--which won't make you popular with the people in your Address Book.

The most common (but not the only) way for e-mail viruses to spread is through file attachments, especially attachments that are executable (.exe) files or that invoke powerful applications like Visual Basic. The text of the message is a lure to get you to open the attachment. (Remember: the message comes to you from someone who has you in his address book. So it looks like your good friend Bob has sent you a mysterious attachment with a message saying something like "Try this. It's fun.") Once you open the attachment, your computer is infected.

Outlook Express is vulnerable to viruses, both because it is widely used and because it can automatically run programs that arrive attached to e-mail messages. However, you can decrease your risk of getting e-mail viruses: see the section "Protecting Yourself from E-Mail Viruses" later in this chapter. For more about viruses in general and what you can do to protect your system, see the section "Protecting Your System from Viruses and Worms" in Chapter 31.

PreviousChapterContentsGlossaryNext