Create an E-mail Signature
Creating an e-mail signature – a step-by-step guide
  • Technical matters

Why bother creating an elaborate greeting at the end of an e-mail when you could simply let your e-mail program do the work for you? E-mail signatures have been a practical way to save time and provide the recipient with important information such as telephone number or homepage for a long time, and not just in office life. Links and images can even be seamlessly added in many cases. But how are...

Creating an e-mail signature – a step-by-step guide
DKIM (DomainKeys)
Setting up DKIM (DomainKeys Identified Mail) for better email deliverability
  • E-Mail security

Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?

Setting up DKIM (DomainKeys Identified Mail) for better email deliverability
IMAP or POP3: which e-mail protocol to choose?
IMAP or POP3 – comparing e-mail protocols
  • Technical matters

When you set up your e-mail account you will sooner or later be faced with the decision of choosing between IMAP or POP3. Both transfer protocols help you receive your e-mails. But what are the differences between IMAP and POP3? And when is it best to use which protocol?

IMAP or POP3 – comparing e-mail protocols
Spear phishing
Spear phishing: targeted attacks on your data
  • E-Mail security

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

Spear phishing: targeted attacks on your data
Deleting an Outlook email account
Deleting an email account from Outlook
  • Technical matters

With Outlook, you have all your email inboxes in view. The software makes it easy to manage multiple accounts. Not only different Microsoft accounts, but also other email service accounts can be integrated. If required, you can delete the account with just a few clicks. We’ll show you how.

Deleting an email account from Outlook
CalDAV
CalDAV - What’s behind the network protocol?
  • Technical matters

The network protocol CalDAV allows you to synchronize calendar data such as appointments and meetings on your PC, smartphone or tablet. The events are then displayed presentably in iCalender format and managed in a WebDAV environment. We’ll explain what CalDAV is exactly and how you can use it yourself.

CalDAV - What’s behind the network protocol?
Email archiving: laws and practices you should know
Email archiving: what all companies should know
  • Technical matters

We use emails every day in the office, as one of our principle forms of communication. So what are you supposed to do with the mountain of emails backlogged over the years? The answer is email archiving. This isn’t just a useful way to keep your inbox clean though: it’s also the law. Find out here about the importance of mail archiving and how it’s governed in the US and Canada.

Email archiving: what all companies should know
Outlook archive
Archiving Emails with Outlook – Here's How it Works
  • Technical matters

Old emails, past appointments, and completed tasks are automatically archived by Outlook after a preconfigured period. AutoArchive can be configured individually, if required. Outlook also provides the ability to manually archive selected folders. We’ll show you how to do it.

Archiving Emails with Outlook – Here's How it Works
Microsoft Office alternatives
Six free alternatives to Microsoft Office
  • Technical matters

Microsoft Office is the most widely used Office package and, without a doubt, will remain to be for professional purposes. For users who often exchange documents with others, its compatibility gives it an unbeatable advantage. The biggest disadvantage, however, is the high cost of using Microsoft Office. Microsoft Office alternatives are usually more cost-effective, especially when the software is...

Six free alternatives to Microsoft Office
550 requested action not taken: possible solutions
SMTP error 550: how to fix “Requested action not taken: mailbox unavailable” and other SMTP 550 error messages
  • Technical matters

If you want to send a message with your e-mail client and the sending fails, you’ll receive a corresponding error message from the server, including an SMTP status code. For example, the message “550 Requested action not taken: mailbox unavailable” means that the targeted address couldn’t be reached. Since this problem can have various causes, even more possible solutions exist, some of which you...

SMTP error 550: how to fix “Requested action not taken: mailbox unavailable” and other SMTP 550 error messages

E-mail

IONOS E-mail Guide: everything need to know about e-mails

Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.

The E-mail Guide’s target audience

The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.

The E-mail Guide’s structure and topics

In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.