wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Webmail

profile
Harsha panchal
Aug 25, 2022
0 Likes
0 Discussions
143 Reads

Webmail (or web-based email) is an email service that can be accessed using a standard web browser. It contrasts with email service accessible through a specialised email client software. Examples of webmail providers are 1&1 Ionos, AOL Mail, Gmail, GMX Mail, Mailfence, Outlook.com/Hotmail.com, Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers (ISP) provide webmail as part of their internet service package. Similarly, some web hosting providers also provide webmail as a part of their hosting package.

As with any web application, webmail's main advantage over the use of a desktop email client is the ability to send and receive email anywhere from a web browser. Its main disadvantage is the need to be connected to the Internet while using it.

The first Web Mail implementation was developed at CERN in 1993 by Phillip Hallam-Baker as a test of the HTTP protocol stack, but was not developed further. In the next two years, however, several people produced working webmail applications.

Webmail service providers (such as Hotmail and RocketMail) emerged in 1996 as a free service to the general public, and rapidly gained in popularity.

In some cases, webmail application software is developed in-house by the organizations running and managing the application, and in some cases it is obtained from software companies that develop and sell such applications, usually as part of an integrated mail server package an early example being Netscape Messaging Server.

Webmail is an email system that can be accessed via any web browser when connected to the internet. All emails, calendar services, and contacts are hosted on the email service provider's online servers. This makes it handy when you need to check your email in the depths of the Amazon rainforest.

Types of webmail :There are two main types of email service providers to choose from: Email clients and Webmail. Let's briefly go over these different types of providers.

Webmail that is accessed over unsecured HTTP may be readable by a third party who has access to the data transmission, such as over an unsecured Wi-Fi connection. This may be avoided by connecting to the webmail service via HTTPS, which encrypts the connection.Gmail has supported HTTPS since launch and in 2014 began requiring it for all webmail connections.Yahoo! Mail added the option to connect over HTTPS in 2013 and made HTTPS required in 2014.

Email users may find the use of both a webmail client and a desktop client using the POP3 protocol presents some difficulties. For example, email messages that are downloaded by the desktop client and are removed from the server will no longer be available on the webmail client. The user is limited to previewing messages using the web client before they are downloaded by the desktop email client. However, one may choose to leave the emails on the server, in which case this problem does not occur. The use of both a webmail client and a desktop client using the IMAP4 protocol allows the contents of the mailbox to be consistently displayed in both the webmail and desktop clients and any action the user performs on messages in one interface will be reflected when the email is accessed via the other interface.


Comments ()


Sign in

Read Next

File Management

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Starvation

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Memory Management

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Buffering

Blog banner

Real time scheduling

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Evolution of Operating System

Blog banner

Use case of K-means clustering

Blog banner

Modern Operating system

Blog banner

Understanding E-mail Servers

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Mariana Trench: The deepest depths

Blog banner

Data Lake

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Why is ITSM important in IT organization?

Blog banner

File Organization and Access

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

File management

Blog banner

DELIRIUM

Blog banner

File management

Blog banner

Disk scheduling

Blog banner

Service Catalogue Management

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Pipedrive

Blog banner

File system implementation

Blog banner

Uniprocessor scheduling

Blog banner

Tableau

Blog banner

The Role of cryptography in cyber security

Blog banner

Life

Blog banner

Virtual memory

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Gamer life

Blog banner

Malicious softwares

Blog banner

Transgender

Blog banner