CC – Emails to indirect recipients
CC – How to include indirect email recipients
  • Technical matters

Carbon copy (CC) allows transparency in communication. A CC address field can be found in any email program. Recipients you enter in the CC field will receive messages as a copy for their information, allowing them to stay in the loop. The feature is not suitable for advertising emails, newsletters or public circulars. We explain why this is the case.

CC – How to include indirect email recipients
Blind Carbon Copy (BCC)
Blind Carbon Copy (BCC) – How to send blind carbon copies of your emails
  • Technical matters

The BCC feature found in your email program allows you to send blind carbon copies of your messages to anonymous third parties. Although it may sound unethical and can be seen by some conversation partners as a breach of trust, the inclusion of BCC recipients is useful and justified in exceptional circumstances. We explain when this is the case.

Blind Carbon Copy (BCC) – How to send blind carbon copies of your emails
Microsoft Exchange 2019
Exchange 2019
  • Technical matters

An update for the mail server: Microsoft has made important improvements to their popular software with Exchange 2019. The focus is now on higher security and improved performance. At the same time, a prominent feature of the previous version has been eliminated. Is it worth switching to the new version?

Exchange 2019
Exchange server: Microsoft’s groupware at a glance
What is Exchange Server?
  • Technical matters

Microsoft Exchange Server is considered the standard solution for business e-mail traffic and computer-supported collaborative work. The software has many different usage models of available and these require purchasing special licenses. We’ll show you the licensing model here and give you an overview of the different functions of the collaborative software.

What is Exchange Server?
StartTLS
StartTLS
  • Technical matters

StartTLS initiates encryption of an e-mail based on the TLS protocol. For this purpose, the server is pinged without encryption first of all, and StartTLS support is requested. The encryption method can be used when the answer is positive. StartTLS is handy, as e-mails are encrypted automatically once the method has been accepted. You don't need to contact a dedicated port, StartTLS can simply be...

StartTLS
SMTP Relay
What is behind the term SMTP relay?
  • Technical matters

Server, service, protocol, or process? The definition of the term “STM relay” has fueled raging debate on the internet. What exactly are “smarthosts” and “open mail relays” in this context? Where do you get an “SMTP relay server” – and what do you need it for? The answers are simpler than expected and we will provide additional clues to better understand the subject of sending e-mails. Everything...

What is behind the term SMTP relay?
SMTP Server
What is an SMTP Server?
  • Technical matters

Anyone familiar with the technicalities of the e-mail sending process will invariably come across the term “SMTP server” at some point. But how exactly does this unit of hardware and software – which invisibly transports the typical consumer’s e-mail from A to B – work? Understanding how this type of server functions is information that can be used to your advantage when it comes to manually...

What is an SMTP Server?
SMTP
What is SMTP? Definition and basics
  • Technical matters

SMTP stands for “Simple Mail Transfer Protocol” – but it’s not that simple. E-mails do not simply travel directly from A to B, but go through several communication and transmission processes that the standard network protocol has been responsible for since the 1980s. As an electronic set of rules from the internet protocol family, SMTP (and its extension, ESMTP) determines important factors such...

What is SMTP? Definition and basics
SMTP-Auth
What is SMTP authentication? Secure e-mail against spam
  • Technical matters

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP...

What is SMTP authentication? Secure e-mail against spam
The double opt in process
E-Mail marketing basics: the double opt in process
  • Technical matters

An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. This is technically allowed in the US, but only until the recipient explicitly opts out. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double...

E-Mail marketing basics: the double opt in process