Internet / Email Software

An email client, email reader or more formally mail user agent (MUA) is a computer program used to access and manage a user's email. A web application that provides message management, composition, and reception functions is sometimes also considered an email client, but more commonly referred to as webmail.

Share tech news, updates, or what's on your mind.

Sign up to Post

An Outlook data file aka PST is prone to corruption due to various reasons. A corrupt PST file is always inaccessible. Also, you may lose all your crucial mailbox content at any time. So to fix this corruption and protect the mailbox content from being lost, you should repair PST file. Learn how...!
CompTIA Security+
LVL 19
CompTIA Security+

Learn the essential functions of CompTIA Security+, which establishes the core knowledge required of any cybersecurity role and leads professionals into intermediate-level cybersecurity jobs.

There’s hardly a doubt that Business Communication is indispensable for both enterprises and small businesses, and if there is an email system outage owing to Exchange server failure, it definitely results in loss of productivity.
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations using CodeTwo Exchange Rules 2010.
The advancement in technology has been a great source of betterment and empowerment for the human race, Nevertheless, this is not to say that technology doesn’t have any problems. We are bombarded with constant distractions, whether as an overload of information or ads vying for our attention.
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Are you using email marketing software? If not, you're missing out on effortless marketing and the reaching of desired conversion rates through email marketing software.
Explore the encryption capabilities built into Google Apps and how these features can help you meet privacy policy and regulatory compliance, but are not a full solution. Understand and compare the most popular email encryption services for Google Apps.
LVL 15

Author Comment

by:Allen Falcon
I can quickly edit if you wish.
Being able to change email signatures is made really simple with email signature software and services.
Zimbra is famous for its platform independency, ability to manage multiple user accounts, easy assimilation with 3rd party applications, social network certification etc. Here, we discuss about how users can move multiple Zimbra user accounts to Exchange, the next best alternative to Zimbra.

Author Comment

by:Lauren Albert
Thanks for accepting the article.

Expert Comment

by:Nick More
Hello Friends,

As you know the above Zimbra converter tool is good but i had used another software Zimbra Converter  which gives good results you can download it from here :-
How can MDaemon MRK files and MSG files work together?

We can also say that, how worldclient and Outlook connecter works, using both application collectively you can view your mails, contacts, calendar, task, notes. In this article you can understand that How to access MDaemon data to Outlook.

Expert Comment

by:Stefanie Lawrence

Nice article. I think now the migration task of MDaemon emails to other server is easy. Thanks for introducing such a good solution.  must use your tool now as I am MDaemon user.
OWASP: Avoiding Hacker Tricks
LVL 19
OWASP: Avoiding Hacker Tricks

Learn to build secure applications from the mindset of the hacker and avoid being exploited.

A high-level exploration of how our ever-increasing access to information has changed the way we do our jobs.
I didn’t use eM Client for long when I decided to swap to Outlook 2016. The reason for the switch is that it started asking for payment to continue some of its services after one month.
The problems I faced when I didn’t pay were:
  • I was not able to send or receive any new emails and was only able to do Off-line work
  • Could only configure two accounts - If I wanted more, then I had to pay
  • Most importantly, I noticed that some of the comments I made on its group were missing
These were enough reasons for me to say goodbye to eM Client permanently. However, that was not the end of my problems. First, my laptop started to give me problems and second, I had to decide which email client I would use next. The former was not much of an issue as Windows 10 was so popular that I had to try it, so I upgraded & got myself a Windows 10 setup. The latter is much more of an issue. When it came to the email client, the choice was not as difficult as I was already aware of Outlook. I decided to use its latest 2016 edition.
Wth me though, the problems never stop. While switching from eM Client to Outlook, I found it only has the option to export the emails in .eml & as luck would have it, Outlook 2016 did not have any option to import eml files. So, basically, I was stranded with around 9000+ eml files & had zero idea of how to import them into Outlook 2016.
My problem was solved when I found SoftSpire EML to PST Converter
The biggest nightmare for any Exchange Server Administrator is to keep the server running without any issue. But the problems often come and they need to be resolved efficiently and timely. Here are important troubleshooting points:

Define the Problem & its Scope

In order to begin troubleshooting in Exchange Server, you need to understand what the problem really is. This will require gathering information by asking questions from end users. After collecting information, the next thing is to find out the scope (how many clients have been affected, what are the common characteristics etc.

Understanding Error Code 

Most of when something goes wrong with the Server it returns some error code. There are built-in tools that make Microsoft Exchange truly powerful. Based on which Admin/User can have some idea about the problem. 
Check out Different Exchange Error Codes and their Solution:
Here is the list of tools available on Exchange Server: 

Use of Tools in Exchange Server for Troubleshooting


(1) Event Viewer
The Event Viewer stores detailed information about the recent system state and application errors. Using the event logs in Event Viewer one can obtain information about system hardware, software, and problems. In the Event Viewer, both application log and system log contain errors, informational events and warnings that can be used in the process of troubleshooting.
Read More about Event Viewer:
Touch screen experience for personal computers, improved security, and performance have made Windows 8 a great hit amongst users. If you are an Outlook user and thinking of or have upgraded to Win 8 or 8.1, then here are some guidelines that may prove helpful to have a trouble-free startup experience.
Windows 8 support three versions of Outlook®: 2007, 2010, and 2013 including the respective versions of Business Card Manager. There is no support to Outlook 2003 due to end of Support Life Cycle for it.

#1: Upgrading to Windows 8 from Windows XP or Vista
While upgrading from Windows XP or Vista, you get the option to “Keep personal files” or “Nothing”. If you choose to keep personal files only, ensure that you do maintain a backup of Outlook data files (PST) so that in case the upgrading process goes wrong, you still have the data preserved for restoration.
You can also use the built in utility called Windows Easy Transfer that allows migrating the settings, files, emails, pictures from an older version of Windows to a newer one. This will prove helpful in case of upgrading from Windows XP, Vista to Windows 8. You can either transfer the files and related data on same computer or on different computer. Although this works well for most of the applications but it might create issues while using it with MS Outlook. In some cases the issue might get fixed by recreated the Outlook profile while in some the PST files are not the part of transfer …
LVL 37

Expert Comment

Another important tip is that you should immediately update your Outlook program files after installation using Windows Update. In fact, if you use email via an Exchange account hosted via Office 365, you may find you cannot even connect with your user credentials until after those updates are complete.
In Q3 of last year, Experts Exchange introduced a new Messaging System, allowing any member to communicate directly with other members.

During an especially long thread with a member, I wanted to go back to previous messages in the exchange to refresh my memory on an issue. However, the Message System doesn't have a Search function that allows you to search the contents of all messages in a thread. But then it occurred to me that I could take advantage of the search feature in my browser, Firefox (Edit>Find or Ctrl-F). However, to do that, all of the messages would have to be expanded by clicking the plus sign next to each one:
Plus-sign---Expand.jpgThat's very painful in a long thread! So I submitted an enhancement request entitled Need the ability to expand/collapse all messages in a thread  in the Messaging System testing project. An EE Administrator, eenookami, replied to my request with a fantastic work-around — JavaScript code to expand all messages in a thread, as well as JavaScript code to collapse all of them.

In the spirit of giving credit where credit is due, all of the credit goes to eenookami for this solution. My only minor contributions are taking the time to write the article in order to share the solution with other members of the EE community and adding an explanation of how to place the Expand All and Collapse All items on the Firefox Bookmarks Toolbar

Expert Comment

by:Rob Jurd
Great Article Joe and thanks for giving me kudos however no one would know about it without taking it a step further with this article contribution.

For those interested, it is called a bookmarklet and it will work it all browsers.  For those adventurous ones, you can write your own bookmarklets to do anything on the site you would otherwise do with a click or a keypress on your keyboard.  I'll leave the examples for your imagination...

The bug report that started this is:


LVL 68

Author Comment

by:Joe Winograd
Hi eenookami,

Thanks for the compliment and the Helpful Vote — I appreciate both! Additional thanks for the further explanation of bookmarklet — very interesting!

Btw, the link you posted for the bug report that started this does not seem to be right, but it gave me the idea to include that link in the article, which I will do in a moment. Regards, Joe
Microsoft goes to great lengths to ensure that the users don’t encounter issues while working with MS Outlook. But errors are inevitable and can occur when you least expect them. One of such errors which are encountered in Outlook is Error 0x800ccc10 Invalid Address. The reason displayed for the error is that the address is not identical in the server. But this description is superficial. The real reasons behind this are discussed in a section of the article.

outlook-error.pngSymptoms Of Outlook Error 0x800ccc10 Invalid Address
How will the user get to know that Error 0x800ccc10 has occurred? This can be observed by following symptoms. If you are experiencing any of the below symptoms, it indicates that the error 0x800ccc10 has occurred.
  • The active program window gets crashed when the error is observed.
  • The system usually crashes when Outlook is used.
  • Windows runs slowly and responds to mouse and keyboard in a very slow manner.
  • While working, Outlook freezes or hangs for a few minutes.
Root Cause Of Error 0x800ccc10
If you are also experiencing the above symptoms then we know where this is heading. There are various reasons behind the occurrence of this error. It can occur during MS Outlook installation, starting or shutting of Windows or when Outlook is running. We have compiled some of the main reasons responsible for the error 0x800ccc10. Keeping a check on when the error occurs proves to be helpful while troubleshooting it. Have a look:
  • Incomplete installation of MS Outlook.

Author Comment

by:Alexa Jackson
Dear Weinberk,

Thank you for such crucial SUGGESTIONS. I will make sure that my upcoming contributions may withstand your expectations.

LVL 19

Expert Comment

 Instead of criticising someone's hard work, why don't you write an article and let others post what they think about it.


Ever had certain email messages or responses that you find yourself using over and over again? Do you use Google's Gmail system? If so, then this article is here to help you save time by teaching you how to create email templates from within Gmail. No more cutting and pasting from past messages or from a saved document; and it only takes a little bit of setup.

Activating the Feature

If you're wondering why you haven't found this type of feature within normal usage of Gmail (like I was), it's because it's not part of the standard Gmail web client. You'll actually need to enable one of the experimental features within Google Labs. Yes, that does mean it could break or vanish at any moment, but then again, Gmail was technically in beta for ages and went pretty well, so I wouldn't be too worried about that.

The feature we'll be using is called "Canned Responses", and activating it is simple.

First, click the gear icon near the upper right of the Gmail screen and select the "Settings" option from the list.
On the Settings page, choose the tab called "Labs".
From there, you can look through the list of labs and you'll probably find it, but an even easier way is to search for the phrase "canned" and it'll filter the list for you. After you've found the Canned Responses feature in the Available Labs list, select the option to Enable it, then click the Save Changes button at the bottom.

Creating a Canned Response

If you can connect to your internal network or can connect to your router but are not able to connect to the Internet follow these steps in order until the problem is resolved.
1. Right click on the network icon on the task bar and select "Troubleshoot problems" Let it run. 
2. Right click on the network icon on the task bar and select "Open network and Sharing Center". Double click on the red X that is between the network icon and the internet icon to run a diagnostic on the Internet connection.
3. In the "network and sharing center" window. Click on “Change Adapter Settings”. Disable the network card (Local area Connection) by right clicking on icon and select “disable” after it is disabled, then re-enable it by right clicking on the network card and select “enable”.
4. Flush the DNS:
 Open cmd.exe with run as administrator. At the DOS prompt type:
 ipconfig /flushdns  
 Press enter.
 5. Do a TCP/IP Repair:
 Open cmd.exe with Run as Administrator.  At the DOS prompt type:  
 netsh int ip reset c:\resetlog.txt
 Press enter.
Type exit to close the DOS prompt then reboot the computer.
If you still cannot connect to the internet after following the above steps and you are not getting a "cable unplugged" error, then the system could be infected with malware or the browser may be corrupted. Try using a different browser such as Google Chrome, Internet Explorer or Firefox to see if you can connect to the Internet with a different …
When you send traffic on the network or on wireless it may be in plain text and it may reveal all your passwords and details.  Most programs do not use encryption by default.

This is acceptable if you own every device on the network and are sure that it can not be intercepted by anyone else.  If you are using wireless - especially if you are using a shared public wireless point (a coffee shop etc) then your passwords are flying round in the air just waiting to be grabbed with nothing more than a laptop and some software.

As soon as you are on the wireless network and attached to the internet using something like VPN will encrypt all your traffic and pass it to a known destination.  VPN is not always the simplest system to setup and may be blocked by the network you are on.  Another system is called SSH Tunnelling.

All you need for this to work is a Linux (or unix) server in a remote location (for example at home or at work) on a publicly accessible network.  This can be an old PC attached to your network or a web server on the internet from a hosting company (one where you get ssh access).

This server then becomes a stepping stone in the middle.  Your data is encrypted and sent to this server where it leaves and goes out onto the Internet. Check that this server has SSH server running on it.  If not install it and start it.

SSH is very easy to install for example -

If …
LVL 15

Administrative Comment

by:Eric AKA Netminder

Your article has been published.

Page Editor
Rowby Goren Makes an Impact on Screen and Online
LVL 19
Rowby Goren Makes an Impact on Screen and Online

Learn about longtime user Rowby Goren and his great contributions to the site. We explore his method for posing questions that are likely to yield a solution, and take a look at how his career transformed from a Hollywood writer to a website entrepreneur.

Need helpful information on avoiding losing your Bitcoins to scammers, hackers, or data loss?

This article discusses risks of working with Bitcoins and is a follow up to my previous article which introduced Bitcoins at a higher level.

Since the software and retailers supporting Bitcoins are still in their growth phase, there are some teething problems you should be aware of. To start on a positive note, I should mention that Bitcoins have the potential to save consumers around the world enormous sums of money by avoiding use of credit cards for online transactions. It is also a powerful tool for avoiding foreign exchange conversion fees. However, because the tools for making use of the currency haven't fully matured, there are risks that need to be understood.

It's easiest to give an idea of the severity of some of the risks of Bitcoins by summarising the highest profile losses that have occurred so far. Remember that over the last month or so, 1 Bitcoin has been worth between US$7 and $30 at an exchange.

Examples of Major Losses & Failures so far

31st July 2011, 27,000BTC stolen from This was a website that worked like an online wallet. After the website disappeared for several days, the owner reappeared claiming the site was hacked and is closing the site down, with a plan to refund 49% of each user's previous balance.
LVL 61

Expert Comment

by:Kevin Cross

Thank you for writing this Article, as well as the previous one. You definitely have my Yes vote above. I found this to be an interesting read, especially in combination with DrDamnit's "5 Steps to Protecting Your BitCoins from Internet Thieves and Wallet Stealing Viruses" Article. Hopefully, with this knowledge, I can keep my tiny bits of coin. *smile*

Best regards,
LVL 58

Expert Comment

Great article again Terry.
Would love an updated one now that Bitcoins are becoming more widespread in mainstream online retailers and I'm just now looking at it (and just asked a question about it)

I wrote this article because there are many articles out there that don't seem to understand the essence of what bitcoins really are.

Bitcoins are worth a look because they have the potential to save us from tithing our money to credit card companies when we spend it.

Bitcoins are a digital currency that can be spent online in a similar way to real cash. Transactions are processed and validated through a peer-to-peer network running the open source Bitcoin software, avoiding the need to rely on a single party (such as a credit card company) for the processing and verification behind the scenes. This can eliminate most of the transaction and exchange fees involved in particular with online spending and international money transfers.

The somewhat official website for bitcoins is and Wikipedia has more detail too. I say somewhat official because nobody owns the concept of bitcoins – it is run by volunteers through open source software. The software and algorithms behind it were released by an apparently fictional character “Satoshi Nakamoto”, and the peer-to-peer network keeps it running.

The volunteers doing the transaction processing also are (temporarily) eligible for random payouts of new bitcoins. This appears to have been a very clever method of releasing the initial bitcoins out into the community and it is helping the currency reach a tipping point for acceptance. (See "Mining" below). These payouts will be replaced by transaction fees in the long run, as the total number of bitcoins will never exceed 21 million (but it's ok - they can be split up).

Benefits of using bitcoins

Make online payments easily and with very low transaction fees. Credit card companies have a stranglehold on the online transaction market and this is a chance to replace them with something more efficient. Payments are as easy as copying and pasting an account number into your bitcoin client application and choosing how many bitcoins to send. Retailers accepting credit cards get charged 2% or (much!) more of every transaction made and the consumer wears the cost in the end. If the payment is to a foreign currency, you'll probably lose another 4 to 10% in exchange losses and fees. International money transfers charge even more, with something like a $25 fee being the norm even for small amounts.
To receive payments, simply generate and share an account number for the payment to be deposited against. With bitcoins, smaller payments such as a 25 cent donation become feasible, which is great news for providers of free software (or music, or other electronic media) who are keen to accept a donation. You can generate as many account numbers as you like for tracking your receipts. With this feature, you can of course easily make payments to friends whenever you like. In bitcoin forums, it's become the norm to include a signature on posts with a receiving account number such as "Donate to 16ABa3SREb3YxkdYpVdkMkMech6oFQVf5C if my comments were helpful" because it's so easy to do.


Transactions need to be verified through the bitcoin network before they can be considered complete – this prevents for example double spending of bitcoins by spending the same coins twice in different locations at the same time. The verification process can take an hour or two before it can be considered foolproof, so someone receiving a large payment needs to wait a while for the transaction confirmations to be received.
A user’s bitcoins are stored in an electronic wallet, similar to a wallet for real cash, which exists as a file on your computer. The wallet file can be stolen (i.e., copied), in which cases you will probably never get your bitcoins back, or it can be lost (if you don't have a backup, or can't recover your wallet data, you can't get your bitcoins back). Software for managing bitcoins needs to mature before the average user can reliably prevent their bitcoin wallet being stolen by hacking.
Bitcoins are in a phase of growth as a currency, and only a very limited number of retailers accept payment in bitcoins. Many of the current retailers sell electronic media or services which has a minimal cost to the retailer for each sale. In the meantime, it could still prove very useful for international money transfers, but there is quite a range of physical goods to be bought too.
Currency exchange rates for bitcoins are still fluctuating fairly heavily, so while you are holding bitcoins there is a risk of the value dropping, but you might also make a gain. Various exchanges are listed here. The future viability of bitcoins relies on the technology continuing to work as intended, and there being a demand for them. The demand is likely to improve, but the technology needs to remain robust as the scale increases.
Not quite anonymous, yet. Some sources have been claiming that bitcoin transactions are anonymous, however the default functionality does NOT provide that protection. Wikileaks found out the hard way that banks, credit cards and PayPal are affected by politics when their donations were blocked and accounts suspended - no matter your opinion on the ethics of Wikileaks, this type of behaviour is dangerous to the concept of freedom of speech. In the future, software might be available to provide for easy anonymous transactions, but it's not there yet.
Downloading the block chain. When you first install the bitcoin client application, it needs to download the chain of historic transaction blocks before it can list your transactions, calculate your balance, and send payments, which I understand is approx 500MB at the time of writing (July 5th 2011). The bitcoin client app will need to be modified to address this, but a team of enthusiastic developers are maintaining it.

Mining bitcoins

As an incentive to provide the back end transaction processing for bitcoins, participants have a chance to earn 50 bitcoins (currently worth around $700) for their efforts. This is referred to as "mining" because it's reminiscent of mining for gold nuggets. The payouts are earned somewhat like a lottery, with the bitcoin software automatically adjusting the chances of winning (the "difficulty") based on the processing power of the network. This mechanism also provides a neat way for distributing the (approx) 21 million bitcoins amongst a large number of people to help with acceptance of the currency.

It turns out that ATI graphics cards are by far the best hardware to perform bitcoin mining. The automatic adjustments in difficulty to date mean that mining bitcoins with a CPU is unlikely to even cover the cost of the power to run it. The difficulty rating is sufficiently high that even users with powerful ATI graphics cards tend to join forces into "pools" of miners and work together, splitting the rewards. The "bonus" rewards for mining will eventually decrease over time to nothing, and the end result will be that small transaction fees will need to be paid by bitcoin users as a reward for the miners, but these should be much less than what we're paying to credit card companies.

Mining really deserves its own article, but the Bitcoin Forum Mining section has all of the info necessary to get started for moderately technically competent users.


Disclaimer: I am a hobbyist bitcoin miner, participating in pooled mining with a single ATI 5770 graphics card which covers the cost of my power. My motivation for learning and sharing knowledge on bitcoins is mainly a technical interest, plus a desire to see humanity paying lower transaction fees for financial transactions.

LVL 37

Author Comment

by:Terry Woods
I have since written a 2nd article on Bitcoins, going into more detail of some of the risks involved:'t-Get-Virtually-Mugged.html
LVL 58

Expert Comment

Great article - better than most stuff you find online.
Earlier today, Google rolled out a new feature, Google Buzz; and the aptly named tool, is already creating quite a stir on the World Wide Web.  According to his post on the Gmail blog, Edward Ho, tech lead for Google Buzz, says the feature is "a new way to start conversations about the things you find interesting and share updates, photos, videos and more."  But according to Yahoo! and Microsoft, Google isn't doing anything they haven't been doing for years.  Given my background in journalism--and my overall desire to be "in the know,"--I've been reading up on Google Buzz and how it compares with other social media sites and features already on the web and here's what I found out:

What is Google Buzz?
Google Buzz is a social sharing feature that syncs up with Gmail to aggregate status updates, links, comments, photos and other content from the people you email with.  (Apparently, Buzz connects with Picasa, Flickr, Google Reader and Twitter.)  In addition, Google uses one of its mysterious algorithms to weed through some of the useless information that people tend to share via social networks so that you only see information that's relevant and informative.  In other words, status updates like "BRB" and "I heart kitties" won't show up in Google Buzz.

When someone responds to a post …

Author Comment

by:Jenn Prentice
Feel free to hijack away! I am enjoying this discussion and finding it very informative. If I have time (no promises) I might even do a Google Buzz part 2 article...emphasis on that no promises thing.
I have to say that I have been using Buzz a bit the past few days and haven't been overly impressed--but have found it to be very convenient.  
I have a Blackberry that's linked up to my gmail account, and it pings me when someone I'm following on Buzz sends out a Buzz message, but I cannot respond to that Buzz message directly from my Blackberry. I can only email the person who sent the Buzz message (not buzz them). I think this is b/c Google has only synced Buzz up with Android OS and iPhone as of now, but I am hoping it comes to Blackberry soon (or maybe I should just get rid of my crappy Blackberry).  
Another thing I find "frustrating" is that Blogger is one of the sites you can connect to, but not Wordpress. I realize that Blogger is Google's own blogging platform, but if they are billing Buzz as the next Facebook, it needs to link up with as many other sites as possible.  
Ok. I'm done sharing now...back to work! =)
Feel free to continue the discussion. I will keep chiming in as I find out more! =)

Author Comment

by:Jenn Prentice
Thanks Dan!!!!! =)
Many recipients get so much mail that they only read e-mail that:
Criteria #1: Seems to have a legitimate subject and source, and...
Criteria #2: Is convenient (meaning they didn't have to do any extra work to get your message).

It's the marketer's constant battle to meet both of these, and most of the battle is involved in criteria #2 and getting past those sometimes-overzealous spam filters. With so many different types of spam filters, you can improve your chances of reaching your target audience using a variety of different techniques. Here are some tips and tricks I've learned over the years to help navigate legitimate marketing messages past the filters and into the inboxes.

The first step of the battle is always to understand what spam is. Quite simply, spam is any e-mail that is sent to a large group of people without having prior permission. (

The content of your e-mail doesn't matter, so even if you're not selling Rolex replicas or weight-loss supplements, your message is still spam if you're sending it to a group of people without their prior consent.

Tip #1: Don't Cut Corners
Spammers cut corners. Limit the number of recipients to 1 per e-mail instead of trying to cut corners and cramming a bunch of recipients into each message.

Tip #2: Use the Right Tools
If you're using PHP, then use phpMailer (, which is a free PHP application. phpMailer gives you …
LVL 24

Expert Comment

by:Alan Henderson
Excellent advice.


Expert Comment

by:Evan Cutler
Absolutely an awesome article,
it got me moving forward.

Very Succinct and easy to understand.
Thanks much.

Internet / Email Software

An email client, email reader or more formally mail user agent (MUA) is a computer program used to access and manage a user's email. A web application that provides message management, composition, and reception functions is sometimes also considered an email client, but more commonly referred to as webmail.