Solved

Java-Based SMTP/POP3 client

Posted on 2001-06-26
3
258 Views
Last Modified: 2008-02-01
I need source code or links of sourcode that works (complete either with interface or not) for:

A Java-Based SMTP/POP3 client

at minimum is able to:
1. Compose e-mail messages (no attachments)
2. Send e-mails to the recipients
3. Download e-mails from the pop3 server (from the user?s mailbox) into a local mailbox on the workstation. These e-mails should be stored in the local hard-disk, and should be retrievable.

0
Comment
Question by:netnewbie
3 Comments
 

Expert Comment

by:jaikishan
ID: 6227253
1. download sun's mail.jar It has full source code on how to send mails. Get a small GUI in HTML and send the request to a servlet that does it...
2. u need to write the code for ur own. Once u have the content of the mail(source in sun jar) then u can save that in any format in ur machine
0
 
LVL 7

Accepted Solution

by:
Igor Bazarny earned 300 total points
ID: 6228782
Here are some links I found:

JavaMail:
http://java.sun.com/products/javamail/

Third-Party JavaMail-based products:
http://java.sun.com/products/javamail/Third_Party.html


YAMM--Yet Another Mail Manager:
http://www.gjt.org/~fredde/yamm/

WebMail:
http://jwebmail.sourceforge.net/

To solve your problems:
   1. Compose e-mail messages (no attachments)
You need some simple GUI to input recipients and mail body.

   2. Send e-mails to the recipients
It's few lines of code using JavaMail API

   3. Download e-mails from the pop3 server (from the user?s mailbox) into a local mailbox on the workstation.
       These e-mails should be stored in the local hard-disk, and should be retrievable.
It's another few lines, using JavaMail API and mbox JavaMail provider to handle local storage

Regards,
Igor Bazarny,
Brainbench MVP for Java 1
www.brainbench.com
0
 

Author Comment

by:netnewbie
ID: 6231589
Thank You...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
solarwind tftp server 2 45
bitbucket vs gitbucket 3 58
Way to decrease size of apk file 9 46
Opening PDF on button click and fill new document 2 23
Java contains several comparison operators (e.g., <, <=, >, >=, ==, !=) that allow you to compare primitive values. However, these operators cannot be used to compare the contents of objects. Interface Comparable is used to allow objects of a cl…
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
The viewer will learn how to implement Singleton Design Pattern in Java.
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now