IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring...
Transcript of IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring...
![Page 1: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/1.jpg)
Good morning!
• Lecture will start at 10:45 (let's wait for everyone).• If you have any question, please ask in the chat.• Note that lecture will be recorded.
• Please write your name and student ID there:https://forms.gle/TbxHD2HCRkq9aNPp6
![Page 2: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/2.jpg)
Email, Thunderbird (or Apple Mail)E-mailApple MailThunderbirdWriting/sending emails
Information Literacy I – EN(IL1) Course
![Page 3: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/3.jpg)
E-mail SystemMessage delivery
A letter arrived from White Goat
Black Goat gobbled it up unread
Nothing for it but to write a letter right back
I'm sorry, what was it thatyour letter said?
The above translation is taken from the blog of by Matt Treyvaudhttp://no-sword.jp/blog/2009/10/goat_mail.html
“Goat Mail” (Yagi-san yuubin) is a very popular Japanese children’s song
![Page 4: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/4.jpg)
Electronic mail (E-mail)
A method of exchanging digital messages using digital devices.Store-and-forward system.Mainly used for communications via computer networks.Historically, one of the services available via the Internet.
![Page 5: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/5.jpg)
Exchanging Mails
The following 4 main steps can be identified:1. Writing and editing2. Sending3. Transmission4. Reception
![Page 6: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/6.jpg)
Sending, Transmitting, Receiving
Writinga message
To: Mr.Black Goat
From: Mr.White Goat
Sending server
Server to process the
message
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
![Page 7: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/7.jpg)
Example of Sending Failure:Incorrect Configuration of the Sending Server
Writinga message
To: Mr.Black Goat
From: Mr.White Goat
Sending server
Server to process the
message
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
![Page 8: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/8.jpg)
Writinga message
I do not know this sending server!
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
To: Mr.Black Goat
From: Mr.White Goat
Example of Sending Failure:Incorrect Configuration of the Sending Server
![Page 9: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/9.jpg)
Writinga message
To: Mr.Black Goat
From: Mr.White Goat
Sending server
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
The sender is suspicious!I will deny to transmit, because
(s)he did not pass authentication.
Example of Transmission Failure:Incorrect Configuration of Authentication
![Page 10: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/10.jpg)
Writinga message
To: Mr.Red Goat
From: Mr.White Goat
Sending server
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
What? There is no Red Goat at this
address!
Example of Transmission Failure:Incorrect Address
![Page 11: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/11.jpg)
Writinga message
Sending server
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
I do not know this receiving server!
To: Mr.Black Goat
From: Mr.White Goat
Example of Transmission Failure:Incorrect Configuration of the Receiving Server
![Page 12: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/12.jpg)
Writinga message
Sending server
Receiving server
Receivingthe message
Relayingserver
Relayingserver
Relayingserver
This receiver is suspicious!I will deny to transmit, because
(s)he did not pass authentication.
To: Mr.Black Goat
From: Mr.White Goat
Example of Reception Failure:Incorrect Configuration of the Receiving Server
![Page 13: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/13.jpg)
It is rare, but system failures occur as well
Writinga message
Sending server
Receiving server
Relayingserver
Receivingthe message
Relayingserver
Relayingserver
To: Mr.Black Goat
From: Mr.White Goat
Dear customers, we are sorry to inform you that today, due to
maintenance/malfunction/overload the mailing system is out of order.
![Page 14: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/14.jpg)
Configuring an e-mailsoftwareMozilla ThunderbirdThunderbird is a free e-mail software, which is available for Mac, Windows, and Linux
Apple MailAvailable on MacOS and iOS(available in English here in TokyoTech)
![Page 15: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/15.jpg)
E-mail account settingsFollow the configuration procedures very precisely, when installing Thunderbird on your personal computer.Remember that you first need to download and install the Thunderbird software on your PC.
![Page 16: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/16.jpg)
Configuring an e-mail software
Detailed information/tutorial available from Tokyo Tech Portal:choose “Online guides” → “Setting up e-mail applications”Instructions available for Thunderbird, Outlook, and Mail.
![Page 17: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/17.jpg)
IMAP (vs POP3)
E-mail protocol IMAPSynchronization with e-mail server (also for folders, tags, etc.)Convenient for high-speed networks, for use with smartphones
Another e-mail protocol POP3 is outdatedDo not use it!Messages are download to your computer/phone and removed from the server,Thus the messages are not available anymore from webmail or another device. It was (maybe) good when using a single device, but not convenient anymore!
![Page 18: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/18.jpg)
Get your Tokyo Tech mail auth ID
Specific to TokyoTech.You do not need such ID for your private email accounts (gmail, yahoo, …)
![Page 19: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/19.jpg)
ConfiguringApple Mail software
Select “Other Mail Account”
Note: You can also use for your private email and then choose Google/Yahoo/…
![Page 20: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/20.jpg)
ConfiguringApple Mail softwareName: Choose a meaningful name! (not a funny nickname)E-mail address: Input your TokyoTech address(In the form: ****.*.**@m.titech.ac.jp)
Note: When clicking “Sign In”, there will be a warning/error. It is normal. Apple Mail does not know details about Tokyo Tech servers.
![Page 21: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/21.jpg)
ConfiguringApple Mail softwareUser Name: TokyoTech mail auth ID
Note: Usually username and email address is the same. But not in TokyoTech.
Note: In Thunderbird, it is necessary to provide more information: port numbers
![Page 22: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/22.jpg)
Configuring Apple Mail softwarelist of messages content of message
• From: sender• To: receiver• Cc: “copy-receiver”...
foldersto order
messages
![Page 23: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/23.jpg)
ConfiguringApple Mail software
Possible to configure many optionsYou can check more by yourself
![Page 24: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/24.jpg)
ConfiguringThunderbird softwareVery similar to Apple Mail.Roughly same information needed, but:-explicit port numbers-explicit protocols
![Page 25: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/25.jpg)
Advantages of Apple Mail (or Thunderbird)It is fast
No need to login to Tokyo Tech portalCheck how fast the Inbox opens – vs Tokyo Tech Webmail
Multiple accounts can be handled (working, home, etc.)Advanced folder handlingAdvanced customization,including themes (skins)
![Page 26: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/26.jpg)
ComposingMessages
![Page 27: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/27.jpg)
Three types of destination addresses
The message will be sent to the address(es) written in the following fields:
To – Main destinationCC – Carbon CopyBCC – Blinded Carbon Copy
![Page 28: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/28.jpg)
Basics etiquette for e-mail communication
Typically, one receives a few dozens e-mails a day.E-mail messages are typically “long” (a few paragraphs).Use your Tokyo Tech e-mail account (also from your smartphone) when communicated to the faculty members.Remember to configure your account to show your real name.
![Page 29: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/29.jpg)
Basics etiquette for e-mail communication (cont)
When composing your message, add the subject that summarizes the contents and/or the topic of your letter.Always begin your message with the name of the person, whom you are referring to.When writing for the first time, state your name, the student number, the class, followed by the contents of your inquiry.
![Page 30: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/30.jpg)
Example of good and not-so-good emails
Thank you for all your messages!
![Page 31: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/31.jpg)
Example of good and not-so-good emails
Thank you for all your messages!
![Page 32: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/32.jpg)
Purpose of Tokyo Tech e-mailThe main purpose of your Tokyo Tech e-mail account is to support your communications on the topics related to your studies.In particular, it will be used by Tokyo Tech for:
Notifications of cancelling classes (for instance, in the case of influenza outbreak)
Providing supplementary materials for classes
Announcements from Student Support Division
Etc.
Check regularly, once per day
![Page 33: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/33.jpg)
Methods for protecting e-mail systems
IMAP + SSL/TLSPOP3 + SSL/TLSSMTP + SSL/TLS
IMAP (and POP3) are the protocolsfor incoming e-mailSMTP is the protocol for outgoing e-mailBut what is SSL/TLS?
![Page 34: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/34.jpg)
Potential risks in Internet communications
Authentication failure: A fake mail-server may try to pose as the Tokyo Tech mail-server to steal users’ messages.
Information leakage: The communication over the network is intercepted, causing the leakage of username and password, so that the account may be hijacked.
Tampering: The messages sent and received by the user may be changed in the process of transmission, and also fake messages can be inserted.
![Page 35: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/35.jpg)
Measures used in SSL/TLSto protect e-mail systems
Authentication: Identity of the e-mail server is certified and confirmed.Encryption: Communication with the server is encrypted.Tamper resistance: Keyed cryptographic hash functions are used as checksums.
![Page 36: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/36.jpg)
SSL/TLS is the fundamental technologyfor protection of the Internet communication
Secure communication between web browsers and web serversAuthentication (certificate verification)Confidentiality (encryption)Integrity (tampering detection)
![Page 37: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/37.jpg)
Security risks concerning e-mail systems
Do not trust the message headerAttached files: Careful! They are potentially dangerous!Visiting malicious websites: Careful! Do not click just any link, as it may be dangerous! (Your PC may get infected by malware just by visiting a malicious website.)Automatic opening of multimedia data (photos, videos, etc.) is potentially dangerous!
![Page 38: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/38.jpg)
Identifying phishing
These are two recently received messages
![Page 39: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/39.jpg)
Suspicious or not?
This cannot be right!
![Page 40: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/40.jpg)
Suspicious or not?
I have never heardof this service
![Page 41: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/41.jpg)
Suspicious or not?
If a valid digital signatureis included, we can trustthe message, right?
![Page 42: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/42.jpg)
Suspicious or not?
This is too informalfor the bank!
![Page 43: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/43.jpg)
Suspicious or not?
These expressionslook strange
![Page 44: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/44.jpg)
Suspicious or not?
Why are they first talkingabout authorization, but then suggest me
to register?
![Page 45: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/45.jpg)
The evolution of phishing
![Page 46: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/46.jpg)
Phishing poses a real threat!
At the first glance, this message is from Resona Holdings, but if you just check, the link is pointing to a mysterious address www.v-i-p8.com(a closer look shows that this is a company located outside Japan)
![Page 47: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/47.jpg)
Summary of key points
E-mail system – computer analogue of postal mail.Handled using e-mail software, some of which is free.(Thunderbird as an example.)Software must be (downloaded, installed), and configured prior to use.IMAP is the recommended e-mail protocol.
![Page 48: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/48.jpg)
Summary of key points (cont.)
Various options can be used when composing and sending messages.In particular, copies of the same message can be sent to several addresses at once (To:, Cc:, Bcc:).Basic etiquette must be followed when writing e-mails.Security settings guarantee protection against unauthorized access to your private information (SSL/TLS).On top of this, measures must be taken to prevent phishing and other illegal activities.
![Page 49: IL1(EN) - 3 › y20-bonnet › slides › il1en-3.pdfemail accounts (gmail, yahoo, …) Configuring Apple Mail software Select “Other Mail Account” Note: You can also use for your](https://reader033.fdocuments.in/reader033/viewer/2022042409/5f26971382a5be475665c26b/html5/thumbnails/49.jpg)
1st Test – E-mail
Your answers should be submitted via the Google Form: https://forms.gle/u8wqLM7WgbLj1Ssj6 (link also on the website).
To be completed by May 24, 23:59.
You are allowed to submit your answers multiple time, the last submission before the deadline will be considered final.
This test is mandatory – it is a part of your course evaluation.
NB: Depending on the settings of your browser, some text in the above form may appear in Japanese. In any case, write your answers in English.