Email and TCP/IP

Posted on 2004-11-28
Last Modified: 2013-11-29
This question is directed to whom ever responds.  What application do you use to send and recieve email?

How does TCP/IP affect your email?

Question by:johnsonlr96
    LVL 34

    Accepted Solution

    I use a variety of applications.

    At work, I use the Novell GroupWise client for Windoze. As we begin our move to replace Windoze with Linux, I'll be using the GroupWise client for Linux. This is a true client/server application that communicates with the GroupWise Post Office over TCP port 1677. While it can, if needed, communicate using NCP over IPX (or NCP over TCP/IP - it really doesn't care what NCP transports over), that's not the preferred or recommended way of doing things.

    At home, I use primarily the PINE E-Mail client (part of the PINE package from University of Washington). This basically works on files it accesses directly, altho those files can be delivered over, say, an NFS mount, so it can depend on TCP/IP. Heck, if I'm SSHed into the server where I'm running PINE (and I usually am), then it depends on TCP/IP in that fashion, too.

    The query "How does TCP/IP affect your E-Mail?" is very, very broad, and gives no context for framing an answer. IN WHAT RESPECT are you asking that question?

    Since both the GroupWise and PINE systems support IMAP, I can also access my E-Mail from any IMAP-enabled client - and those operate aover TCP/IP.

    The more I look at it, the more this looks like a homework/test question.
    LVL 8

    Expert Comment

    * GroupWise at work
    * Thunderbird at home

    TCP/IP should be the CORE protocol for your mail application. If you felt that TCP/IP affected your email application at all, I'd throw it away and get one that was built more recently than 1990.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    I tend toward trying the newest hardware and software.  Thiss sometimes works out to my benefit, and sometimes not.  Because I downloaded and installed Android 5.x (…
    Are you using email marketing software? If not, you're missing out on effortless marketing and the reaching of desired conversion rates through email marketing software.
    The purpose of this video is to demonstrate how to set up Lists in Mailchimp. This will be demonstrated using a Windows 8 PC. Mailchimp will be used. Log into your Mailchimp account. : Click on Lists. Click on Create List Button : Choose the desi…
    This Micro Tutorial will demonstrate the easy use of Gmail embedding images in your email so the recipient of your email can view them in context.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now