Follow the instructions to view message headers for a message you received. Verify that the message was sent by the displayed From: address rather than being spoofed.
Use Internet mailing lists.
Research popular Internet mailing lists. Consider signing up for any that interest you.
Research bulk email restrictions and identify appropriate ways to send bulk email messages.
Electronic mail (email) is a method of exchanging messages between people using electronics.[5]
Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages.[6]
Multipurpose Internet Mail Extensions (MIME) carry text in other character sets and support multimedia content attachments.[7]
The typical sequence of events in transmitting a message is:[8]
A mail user agent (email program) sends the message to its outbound mail server using SMTP.
The mail server determines the destination mail server based on the domain name of the email address and corresponding DNS MX record.
The mail server sends the message to the destination mail server using SMTP.
The destination mail server delivers the message to the recipient's mailbox.
The recipient's mail user agent retrieves the message from the server using either POP or IMAP.
Message headers include fields for Date:, From:, To:, Subject:, Cc:, and Bcc:.[9]
Most modern graphic email clients allow the use of either plain text or HTML for the message body at the option of the user.[10]
Messages are exchanged between hosts using the Simple Mail Transfer Protocol with software programs called mail transfer agents (MTAs); and delivered to a mail store by programs called mail delivery agents (MDAs).[11]
Accepting a message obliges an MTA to deliver it, and when a message cannot be delivered, that MTA must send a bounce message back to the sender, indicating the problem.[12]
Users can retrieve their messages from servers using standard protocols such as POP or IMAP, or with a proprietary protocol specific to Novell Groupwise, Lotus Notes, or Microsoft Exchange Servers.[13]
Programs used by users for retrieving, reading, and managing email are called mail user agents (MUAs).[14]
Mail can be stored on the client, on the server side, or in both places.[15]
Many current email users do not run MTA, MDA or MUA programs themselves, but use a web-based email platform instead.[16]
The Post Office Protocol 3 (POP3) is a mail access protocol used by a client application to read messages from the mail server. Received messages are often deleted from the server.[18]
The Internet Message Access Protocol (IMAP) provides features to manage a mailbox from multiple devices. IMAP shows the headers of messages, the sender and the subject and the device needs to request to download specific messages. Usually mail is left in folders on the mail server.[19]
An electronic mailing list or email list is a special use of email that allows for widespread distribution of information to many Internet users.[20]
Electronic mailing lists usually are fully or partially automated through the use of special mailing list software and a reflector address set up on a server capable of receiving email.[21]
Incoming messages sent to the reflector address are processed by the software, and, depending on their content, are acted upon internally (in the case of messages containing commands directed at the software itself) or are distributed to all email addresses subscribed to the mailing list.[22]
Electronic mailing list servers may be set to forward messages to subscribers of a particular mailing list either individually as they are received by the list server, or in digest form in which all messages received on a particular day by the list server are combined into one email that is sent once per day to subscribers.[23]
A computer file sent along with an email message.[24]
BCC
Allows the sender of a message to conceal the person entered in the BCC field from the other recipients.[25]
CC
Indicates those who are to receive a copy of a message addressed primarily to another recipient.[26]
Internet Message Access Protocol (IMAP)
An Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server.[27]
Mail Delivery Agent (MDA)
A computer software component that is responsible for the delivery of e-mail messages to a local recipient's mailbox.[28]
Mail Transfer Agent (MTA)
Software that transfers electronic mail messages from one computer to another using a client–server application architecture.[29]
Mail User Agent (MUA)
A computer program used to access and manage a user's email.[30]
Multipurpose Internet Mail Extensions (MIME)
An Internet standard that extends the format of email to support attachments and non-ASCII character sets.[31]
netiquette
The rules of etiquette that apply when communicating over the Internet or social networks or devices.[32]
open relay
An SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users.[33]
opt-in email
Describes when someone is given the option to receive email, typically for some sort of mailing list, newsletter, or advertising.[34]
Personal Information Management (PIM)
The activities people perform in order to acquire, organize, maintain, retrieve and use personal information items.[35]
Post Office Protocol (POP)
An application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[36]
Pretty Good Privacy (PGP)
A program used for signing, encrypting, and decrypting e-mail messages and to increase the security of e-mail communications. [37]
Secure MIME (S/MIME)
A standard for public key encryption and signing of MIME data.[38]
Simple Mail Transfer Protocol (SMTP)
An Internet standard for electronic mail (email) transmission.[39]
snail mail
Refers to letters and missives carried by conventional postal delivery services.[40]
spam
The use of electronic messaging systems to send an unsolicited message.[41]
spam filter
Processing of email to organize or block it according to specified criteria.[42]