Solved

How to send a HTML Mailshot

Posted on 2007-11-19
5
1,336 Views
Last Modified: 2013-12-25
Hi All,

Helop is needed with sending HTML Mailshots.

I have an index.html file and a folder of images that the index file uses to build an image.  I want to send this in an email so that it dispalys as teh image/webpage in teh body of the mail.  This has all been coded by a web developer.

How do i do this ? I havent a clue :o(
0
Comment
Question by:MisterMoleyMole
  • 3
  • 2
5 Comments
 
LVL 76

Expert Comment

by:David Lee
ID: 20314426
Hi, MisterMoleyMole.

The simplest way to accomplish this is to copy index.html to Outlook's stationery folder (i.e. C:\Program Files\Common Files\Microsoft Shared\Sstationery), then create a new message using that stationery.  This will work fine is the image tags in the html file all use absolute paths and the images are in a location that is accessible by all message recipients.
0
 

Author Comment

by:MisterMoleyMole
ID: 20318842
Ahhh thankyou.

At what point are the images downloaded into the mail ? when they open the message or will the exchange server download them and add them to the message on sending ?

Gav
0
 
LVL 76

Accepted Solution

by:
David Lee earned 500 total points
ID: 20319724
Hi, Gav.

If the image sources are set to a URL (e.g. http://company.com/somesite/image1.jpg), then they'll be downloaded when the message is viewed.  The person reading the message will need to have access to the location the images are stored in.  If they don't, then they'll see a red X in place of each image.  If you want the images to be embedded in the message, then copy all the images to the Stationery folder and change the image source to just the filename (e.g. image1.jpg).
0
 

Author Comment

by:MisterMoleyMole
ID: 20319740
Many thanks for the help and advice bluedevilfan, its very much appreciated.

Gav
0
 
LVL 76

Expert Comment

by:David Lee
ID: 20321690
You're welcome, Gav.  Glad I could help.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Use these top 10 tips to master the art of email signature design. Create an email signature design that will easily wow recipients, promote your brand and highlight your professionalism.
I've been asked to discuss some of the UX activities that I'm using with my team. Here I will share some details about how we approach UX projects.
Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now