Solved

Java-Based SMTP/POP3 client

Posted on 2001-06-26
3
247 Views
Last Modified: 2008-02-01
I need source code or links of sourcode that works (complete either with interface or not) for:

A Java-Based SMTP/POP3 client

at minimum is able to:
1. Compose e-mail messages (no attachments)
2. Send e-mails to the recipients
3. Download e-mails from the pop3 server (from the user?s mailbox) into a local mailbox on the workstation. These e-mails should be stored in the local hard-disk, and should be retrievable.

0
Comment
Question by:netnewbie
3 Comments
 

Expert Comment

by:jaikishan
Comment Utility
1. download sun's mail.jar It has full source code on how to send mails. Get a small GUI in HTML and send the request to a servlet that does it...
2. u need to write the code for ur own. Once u have the content of the mail(source in sun jar) then u can save that in any format in ur machine
0
 
LVL 7

Accepted Solution

by:
Igor Bazarny earned 300 total points
Comment Utility
Here are some links I found:

JavaMail:
http://java.sun.com/products/javamail/

Third-Party JavaMail-based products:
http://java.sun.com/products/javamail/Third_Party.html


YAMM--Yet Another Mail Manager:
http://www.gjt.org/~fredde/yamm/

WebMail:
http://jwebmail.sourceforge.net/

To solve your problems:
   1. Compose e-mail messages (no attachments)
You need some simple GUI to input recipients and mail body.

   2. Send e-mails to the recipients
It's few lines of code using JavaMail API

   3. Download e-mails from the pop3 server (from the user?s mailbox) into a local mailbox on the workstation.
       These e-mails should be stored in the local hard-disk, and should be retrievable.
It's another few lines, using JavaMail API and mbox JavaMail provider to handle local storage

Regards,
Igor Bazarny,
Brainbench MVP for Java 1
www.brainbench.com
0
 

Author Comment

by:netnewbie
Comment Utility
Thank You...
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

For customizing the look of your lightweight component and making it look lucid like it was made of glass. Or: how to make your component more Apple-ish ;) This tip assumes your component to be of rectangular shape and completely opaque. (COD…
Java had always been an easily readable and understandable language.  Some relatively recent changes in the language seem to be changing this pretty fast, and anyone that had not seen any Java code for the last 5 years will possibly have issues unde…
This theoretical tutorial explains exceptions, reasons for exceptions, different categories of exception and exception hierarchy.
This tutorial explains how to use the VisualVM tool for the Java platform application. This video goes into detail on the Threads, Sampler, and Profiler tabs.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now