An Overview of Protocols and Function

Size: px
Start display at page:

Download "An Overview of Protocols and Function"

Transcription

1 An Overview of Protocols and Function

2 A Brief History of or (both spellings are acceptable) is short for electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating the Internet. In the 60s it was a way to facilitate communication for time-sharing computers Ray Tomlinson initiated the use of symbol to separate the name of the user form their machine in 1971.

3 Plain Text and HTML Both plain text and HTML are used to convey Text is certain to be read by all users without problems, there is a perception that HTMLbased has a higher aesthetic value.

4 Advantages and Disadvantages Advantages of HTML are that you are able to: Include links and images Word wrap naturally on any display use emphasis such as underlines and italics change font styles Some disadvantages include: Increased size of the message privacy concerns about web bugs messages can be used for phishing attacks and to spread malicious software

5 SMTP Simple Mail Transfer Protocol: Conceived and developed by ARPA in the 1960s Used to forward messages from one host to another Very simple protocol that runs directly on the TCP/IP (Transmission control protocol/internet protocol)

6 POP3 Post Office Protocol 3 The third iteration of POP (4 th in the works, starting to roll out) Like STMP runs on the TCP/IP Used by the user to retrieve a message from the machine to which the SMTP has forwarded a message Works hand-in-hand with SMTP

7 What makes up a Valid Address (Review) An address can be broken up into four parts: local-part@subdomain.domain.tld Cannot be an empty or zero length string Domain portion cannot contain any of the following characters: ~ ' ^ ` " * + = \ ] [ ( ) { } $ &! # % / :, ; (spaces) NOTE: the local part (i.e. the part before symbol) can Valid address cannot have a '.' in last or second last position There must be one, and only symbol in the address There cannot be a. Immediately following symbol There must be at least one. after symbol (just not immediately after it) Two periods (. ) cannot be side-by-side in the address

8 PHP Validation (Review) The majority of scripting or programming languages require that you code a validator Something that accepts a String argument and return a boolean depending on whether the string passed conform to the valid rules PHP, as its sole purpose is for use on the web, provides a predefined funtion: filter_var ()

9 filter_var() (REVIEW) The filter_var() function can filter out several things For the purposes of this course, it shall be used to filter invalid address strings The syntax is: filter_var($a_string_arg, FILTER_VALIDATE_ ); This will either return a boolean false (if the string argument is an invalida ), or the string argument itself (if the string is a valid address) NOTE: the FILTER_VALIDATE_ is a predefined PHP constant, that tells the function what it is filtering See:

10 <?php?> Simple filter_var() Example //comes from if(!filter_var( FILTER_VALIDATE_ )) { echo(" is not valid"); } else { echo(" is valid"); }

11 <?php?> Realistic filter_var() Example $error = ; //an error message variable, initially empty //embed in a page with an input box named _address and //have the form submit here in POST mode $ = trim($_post[ _address ]); //trim whitespace if(strlen($ ) == 0){ //use strlen() to det. whether var empty or not $error.= You must enter an address ; }else if(!filter_var($ , FILTER_VALIDATE_ )){ } //note the! not symbol, if valid no problem $error.= $ . is not a valid address ; //note: give the invalid address so user knows $ = ; //empty out the variable so it is not sticky

12 PHP mail() Function bool mail ( string $to, string $subject, string $message [, string $additional_headers [, string $additional_parameters ]] ) N.B. Subject should not conatin any newline characters In the message each line should be separated with a LF (\n). Lines should not be larger than 70 characters. The additional headers (which are optional) is a string to be inserted at the end of the header Returns TRUE if the mail was successfully accepted for delivery, FALSE otherwise. For delivery means the local SMTP will attempt to send, it has nothing to do with whether it was actually delivered or not.

13 PHP mail() Example <?php //first_mail.php $mail_to $mail_subject = "Hi there!" ; $mail_body = "We'll have a meeting next Wednesday.\n"; $mail_body.= "7 P.M. in Judy's Office.\n"; $mail_body.= "Oh, BYOB!\n"; if(mail($mail_to, $mail_subject, $mail_body)) echo \"$mail_subject\" to $mail_to was accepted for sending."; else echo " \"$mail_subject\" to $mail_to was not accepted for sending."?>

14 A More Realistic Example <?php $to = 'nobody@example.com'; $subject = The Subject'; $message = 'hello'; $headers = 'From: webmaster@example.com'. "\r\n". 'Cc: someoneelse@a.com\r\n Bcc: hidden@gmail.com. 'Reply-To: webmaster@example.com'. "\r\n". 'X-Mailer: PHP/'. phpversion(); mail($to, $subject, $message, $headers);?> The \r are what the system needs to delimit your header N.B. When sending mail, the mail must contain a From header. This can be set with the additional_headers parameter, or a default can be set in php.ini

15 PHP Bulk Mail Example <?php //mass_mail.php $team_mates = "./teammates_ .txt"; $ s = file($team_mates); for($i=0; $i < count($ s); $i++) $ s[$i] = trim($ s[$i]); $recipients = implode( ;", $ s); $mail_subject = "Hi there!"; $mail_body = "We'll have a meeting next Wednesday.\n"; $mail_body.= "7 P.M. in Judy's Office.\n"; $mail_body.= "Oh, BYOB!\n"; mail($recipients, $mail_subject, $mail_body); echo "Successfully sent the \"$mail_subject\" to $recipients.";?>

16 Spam also known as "bulk " or "junk ," involves nearly identical messages sent to numerous recipients by . A common synonym for spam is unsolicited bulk e- mail (UBE). Sending spam violates the Acceptable Use Policy (AUP) of almost all Internet Service Providers. Providers vary in their willingness or ability to enforce their AUP. Some actively enforce their terms and terminate spammers' accounts without warning. Some ISPs lack adequate personnel or technical skills for enforcement, while others may be reluctant to enforce restrictive terms against profitable customers.

17 Spam Stats An spam is sent to 600 addresses (all of the ARPANet users at the time) First large-scale spam sent to 6000 newsgroups, reaching millions of people (June) 30 billion per day (June) 55 billion per day (December) 85 billion per day (February) 90 billion per day billion per day estimates the amount of spam was between 88 92% of messages sent in the first half of 2010 A 2004 survey estimated that lost productivity costs Internet users in the United States $21.58 billion annually, while another reported the cost at $17 billion, up from $11 billion in 2003 Data from:

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

Questionnaire 4.0 Setup Guide 2006/4/14

Questionnaire 4.0 Setup Guide 2006/4/14 Email Questionnaire 4.0 Setup Guide 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute

More information

Internet Concepts ML Study Guide Created by Advisers

Internet Concepts ML Study Guide Created by Advisers Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

Chapter 9: Internet

Chapter 9: Internet Chapter 9: Internet Email Internet email has become one of the most popular applications on the Internet. An Internet experience is not complete without the usage of email. In this chapter we shall be

More information

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2)

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2) Chapter 1 : Fixing Magento USPS API issue with First-Class Mail Parcel Plumrocket Inc Blog Grandparents and looters mothballed than sped opposite the late hsien stillness, quantized over glib doorkeepers

More information

Getting Started with Universal

Getting Started with Universal Getting Started with Universal Email Universal Email adds email power to your website. This Getting Started Guide shows you how to use Universal Email to enable a contact form that you have on your site,

More information

Image Spam. Introduction. Project description:

Image Spam. Introduction. Project description: Image Spam Introduction Image spam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file. Since most modern graphical E-mail client software will render

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

Emptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort by...19 Default font style...19 Service language...

Emptying the trash...18 Webmail Settings...19 Displayed Name...19 Sort  by...19 Default font style...19 Service language... Force9 Webmail 1 Table of Contents Guide Notes...4 About this guide...4 Contacting the author...4 Assumptions...4 Who should read this guide...4 Conventions used in this guide...5 Further Reading...5 Using

More information

Why we spam? 1. To get Bank Logs by spamming different banks.

Why we spam? 1. To get Bank Logs by spamming different banks. Hello guys this is tutorial in depth of the topic spamming. First of we will see what do we mean by term spamming. Wikipedia definition: Email spam, also known as unsolicited bulk Email (UBE), junk mail,

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Deliverability Terms

Deliverability Terms Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help

More information

Contents. Acknowledgments

Contents. Acknowledgments Contents Acknowledgments Introduction Why Another Book About Web Application Development? How Is This Book Arranged? Intended Audience Do I Need to Start from Scratch? Choosing Development Tools Summary

More information

PHP INTERVIEW QUESTION-ANSWERS

PHP INTERVIEW QUESTION-ANSWERS 1. What is PHP? PHP (recursive acronym for PHP: Hypertext Preprocessor) is the most widely used open source scripting language, majorly used for web-development and application development and can be embedded

More information

ICT PHP Coding Standards

ICT PHP Coding Standards esolutions ICT Volume 3 : Application Standards ICT 3.2.1.1-2014 PHP Coding Standards Abstract This document defines the standards applicable to PHP coding. Copyright Deakin University All rights reserved.

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

STATS 507 Data Analysis in Python. Lecture 2: Functions, Conditionals, Recursion and Iteration

STATS 507 Data Analysis in Python. Lecture 2: Functions, Conditionals, Recursion and Iteration STATS 507 Data Analysis in Python Lecture 2: Functions, Conditionals, Recursion and Iteration Functions in Python We ve already seen examples of functions: e.g., type()and print() Function calls take the

More information

https://exchange.billings.k12.mt.us Enter your username Enter your password

https://exchange.billings.k12.mt.us Enter your username Enter your password https://exchange.billings.k12.mt.us Enter your username Enter your password Available folders This is the folder view. From here you can view your inbox, calendar, or any other folder shown on the left.

More information

PHP with data handling

PHP with data handling 171 Lesson 18 PHP with data handling Aim Objectives : To provide an introduction data handling with PHP : To give an idea about, What type of data you need to handle? How PHP handle the form data? 18.1

More information

Broadcast E mail TOOLS AND BEST PRACTICES

Broadcast E mail TOOLS AND BEST PRACTICES Broadcast E mail TOOLS AND BEST PRACTICES Is your e mail communication successful? Why or why not? Have you even thought about it? What is your current process? How e mail appears to work Select Recipients

More information

Error Codes have 3 Digits

Error Codes have 3 Digits The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

WEB APPLICATION ENGINEERING II

WEB APPLICATION ENGINEERING II WEB APPLICATION ENGINEERING II Lecture #4 Umar Ibrahim Enesi Objectives Gain understanding on: Form structure Form Handling Form Validation with Filters and Pattern matching Redirection Sticky form 06-Nov-16

More information

1.1. Agreement means this document together with the Ignite General Terms and Conditions.

1.1. Agreement means this document together with the Ignite General Terms and Conditions. IGNITE SECUREMAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of this product

More information

Introduction to the HTML Editor HTML Editor

Introduction to the HTML Editor HTML Editor HTML Editor This is the Editing window. Let's do a quick rundown of each tool. 1 Undo A click on the Undo button undoes the last edit performed on the page. Repeated clicks on the button will eventually

More information

Manual Assembled By. Eng. Shaikha Al-Ali

Manual Assembled By. Eng. Shaikha Al-Ali Manual Assembled By Eng. Shaikha Al-Ali TABLE OF CONTENT CREATING AN EMAIL ACCOUNT -----------------------------------------------------------3 LOGIN USING YOUR USER ID AND PASSWORD--------------------------------------6

More information

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad OCT 21,2016 BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01 IT430 - E-COMMERCE Midterm Papers

More information

Using the Inbox to Manage Messages

Using the Inbox to Manage Messages 6 Using the Inbox to Manage Messages You can use the Outlook Inbox folder as well as the other mail-item folders (Drafts, Outbox, and Sent Items) to receive, send, and manage email, and send fax messages.

More information

Contents. Management. Client. Choosing One 1/20/17

Contents.  Management.  Client. Choosing One 1/20/17 Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,

More information

BulkMailer User Guide

BulkMailer User Guide BulkMailer User Guide If you want to run BulkMailer on your PC, this document is for you. In this document, we first ensure that BulkMailer is the program you want to run. Then, we explain how to install

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Princeton University COS 333: Advanced Programming Techniques A Subset of PHP

Princeton University COS 333: Advanced Programming Techniques A Subset of PHP Princeton University COS 333: Advanced Programming Techniques A Subset of PHP Program Structure -----------------------------------------------------------------------------------

More information

ECE 435 Network Engineering Lecture 6

ECE 435 Network Engineering Lecture 6 ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption

More information

Some things to watch out for when using PHP and Javascript when building websites

Some things to watch out for when using PHP and Javascript when building websites Some things to watch out for when using PHP and Javascript when building websites Les Hatton 10 Sep 2003 1 PHP PHP is a C-like language which evolved from Perl scripts originally produced by Rasmus Lerdorf

More information

PIC 40A. Lecture 19: PHP Form handling, session variables and regular expressions. Copyright 2011 Jukka Virtanen UCLA 1 05/25/12

PIC 40A. Lecture 19: PHP Form handling, session variables and regular expressions. Copyright 2011 Jukka Virtanen UCLA 1 05/25/12 PIC 40A Lecture 19: PHP Form handling, session variables and regular expressions 05/25/12 Copyright 2011 Jukka Virtanen UCLA 1 How does a browser communicate with a program on a server? By submitting an

More information

Getting Started with Mail Advanced Web Client. Mail is a full-featured messaging and collaboration application that offers reliable highperformance

Getting Started with Mail Advanced Web Client. Mail is a full-featured messaging and collaboration application that offers reliable highperformance Welcome Getting Started with Mail Advanced Web Client Mail is a full-featured messaging and collaboration application that offers reliable highperformance email with address books. 17_12_Mail_FAQs_2017.12.08_Amended

More information

MX Control Console. Administrative User Manual

MX Control Console. Administrative User Manual MX Control Console Administrative User Manual This Software and Related Documentation are proprietary to MX Logic, Inc. Copyright 2003 MX Logic, Inc. The information contained in this document is subject

More information

How to: Add Content to your Events. EventReference User Guide #10

How to: Add Content to your Events. EventReference User Guide #10 How to: Add Content to your Events EventReference User Guide #10 EventReference lets you display confirmation messages and send emails to your registrants. To do this, you need to use the Content Management

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Lecture 7: Dates/Times & Sessions. CS 383 Web Development II Wednesday, February 14, 2018

Lecture 7: Dates/Times & Sessions. CS 383 Web Development II Wednesday, February 14, 2018 Lecture 7: Dates/Times & Sessions CS 383 Web Development II Wednesday, February 14, 2018 Date/Time When working in PHP, date is primarily tracked as a UNIX timestamp, the number of seconds that have elapsed

More information

Activity 1.1: Indexed Arrays in PHP

Activity 1.1: Indexed Arrays in PHP Name: StudentID: Note: Please fill the online CES feedback for this course if you have not done so. We value your feedback and it helps us to improve the course. Note: All of you should be familiar with

More information

PHP Hypertext Preprocessor

PHP Hypertext Preprocessor PHP Hypertext Preprocessor A brief survey Stefano Fontanelli stefano.fontanelli@sssup.it January 16, 2009 Stefano Fontanelli stefano.fontanelli@sssup.it PHP Hypertext Preprocessor January 16, 2009 1 /

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

Creating Accessible Documents

Creating Accessible Documents What is an Accessible Document? Creating Accessible Documents An accessible document is any document that has been created to be easily read by sighted, low-vision, or non-sighted readers using adaptive

More information

What is PHP? [1] Figure 1 [1]

What is PHP? [1] Figure 1 [1] PHP What is PHP? [1] PHP is an acronym for "PHP: Hypertext Preprocessor" PHP is a widely-used, open source scripting language PHP scripts are executed on the server PHP is free to download and use Figure

More information

These instructions can be found on the MCCSC web site Under Outlook Web Access on the lower right, click on Overview of OWA.

These instructions can be found on the MCCSC web site  Under Outlook Web Access on the lower right, click on Overview of OWA. E-Mail: OUTLOOK WEB ACCESS (OWA). Your email address is: username@mccsc.edu These instructions can be found on the MCCSC web site www.mccsc.edu. Under Outlook Web Access on the lower right, click on Overview

More information

MarshallSoft Client Mailer. Tutorial

MarshallSoft Client Mailer. Tutorial MarshallSoft Client Mailer Tutorial Version 5.1 September 23, 2016 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2016 All rights reserved MarshallSoft Computing,

More information

CSCE 121 ENGR 112 List of Topics for Exam 1

CSCE 121 ENGR 112 List of Topics for Exam 1 List of Topics for Exam 1 If statements o How is an if statement constructed? o Does every if need an else? Looping o While loop! What does a while loop look like?! How do you ensure you will not have

More information

Cisco TEO Adapter Guide for

Cisco TEO Adapter Guide for Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible

More information

Questionnaire 4.0 User Manual 2006/4/14

Questionnaire 4.0 User Manual 2006/4/14 Email Questionnaire 4.0 User Manual 2006/4/14 Introduction Email Questionnaire is an interactive email survey system. Unlike other on-line questionnaire systems that need a web server to construct, distribute

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

B. V. Patel Institute of BMC & IT 2014

B. V. Patel Institute of BMC & IT 2014 Unit 1: Introduction Short Questions: 1. What are the rules for writing PHP code block? 2. Explain comments in your program. What is the purpose of comments in your program. 3. How to declare and use constants

More information

(Refer Slide Time: 01:40)

(Refer Slide Time: 01:40) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #25 Javascript Part I Today will be talking about a language

More information

Who s Marcus? mail() 2008 Marcus Bointon

Who s Marcus? mail() 2008 Marcus Bointon 1 Who s Marcus? Programming since 1982 Years of multimedia production for CD-ROM In PHP since 2001 Technical Director of Synchromedia Ltd Sole architect and coder of Smartmessages.net Delivering around

More information

: Acceptable Use Policy

: Acceptable Use Policy : Acceptable Use Policy This Acceptable Use Policy ("Policy") describes the proper and prohibited use of 's Hosting services ("Services") as subscribed to per the Master Service Agreement. This Policy

More information

Creating Threat Prevention Connection Rules

Creating Threat Prevention Connection Rules Creating Threat Prevention Connection Rules The Threat Prevention feature runs a connection rules script each time a client tries to connect to eprism. The script determines whether to accept or reject

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model

More information

Controlled Assessment Task. Question 1 - Describe how this HTML code produces the form displayed in the browser.

Controlled Assessment Task. Question 1 - Describe how this HTML code produces the form displayed in the browser. Controlled Assessment Task Question 1 - Describe how this HTML code produces the form displayed in the browser. The form s code is displayed in the tags; this creates the object which is the visible

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

CPSC156a: The Internet Co-Evolution of Technology and Society

CPSC156a: The Internet Co-Evolution of Technology and Society CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 16: November 4, 2003 Spam Acknowledgement: V. Ramachandran What is Spam? Source: Mail Abuse Prevention System, LLC Spam is unsolicited

More information

Shell programming. Introduction to Operating Systems

Shell programming. Introduction to Operating Systems Shell programming Introduction to Operating Systems Environment variables Predened variables $* all parameters $# number of parameters $? result of last command $$ process identier $i parameter number

More information

IBM Notes Client V9.0.1 Reference Guide

IBM Notes Client V9.0.1 Reference Guide IBM Notes Client V9.0.1 Reference Guide Revised 05/20/2016 1 Accessing the IBM Notes Client IBM Notes Client V9.0.1 Reference Guide From your desktop, double-click the IBM Notes icon. Logging in to the

More information

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services

IGNITE HOSTED PREMIUM MAIL TERMS AND CONDITIONS OF SERVICE. 1. Definitions. 2. Services IGNITE HOSTED PREMIUM MAIL PLEASE NOTE: These product or service specific terms and conditions must always be read together with our General Terms and Conditions, which will always apply to your use of

More information

IT1403: Internet and World Wide Web Multiple Choice Question Paper

IT1403: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet

More information

2013 edition (version 1.1)

2013 edition (version 1.1) 2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:

More information

An electronic mailing list is a way to distribute information to many Internet users using . It is a list of names and addresses, similar to a

An electronic mailing list is a way to distribute information to many Internet users using  . It is a list of names and addresses, similar to a 1 An electronic mailing list is a way to distribute information to many Internet users using email. It is a list of names and addresses, similar to a traditional mailing list and works using a reflector,

More information

Keystone Acceptable Use Policy

Keystone Acceptable Use Policy Keystone Acceptable Use Policy Keystone Learning Services, ("Keystone") Acceptable Use Policy ("AUP") is intended for Keystone products and services with the goal of protecting Keystone Subsidiaries, Affiliates,

More information

OnePlace Contacts User s Guide. Managing your contacts with the OnePlace Contact Manager.

OnePlace Contacts User s Guide. Managing your contacts with the OnePlace Contact Manager. OnePlace Contacts User s Guide Managing your contacts with the OnePlace Contact Manager. How to Find It Go to http://www.ouroneplace.net Choose My Contacts Adding Contacts Contact: Summary The Contact

More information

Quick Guide for Sending Broadcast s

Quick Guide for Sending Broadcast  s Quick Guide for Sending Broadcast E-mails What is the Broadcast E-mail tool? The Broadcast E-mail tool makes it easy to send a large an e-mail to a selection of contacts. This function allows you to enter

More information

Project 3 Web Security Part 1. Outline

Project 3 Web Security Part 1. Outline Project 3 Web Security Part 1 CS155 Indrajit Indy Khare Outline Quick Overview of the Technologies HTML (and a bit of CSS) Javascript PHP Assignment Assignment Overview Example Attack 1 New to web programming?

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

Hotmail Documentation Style Guide

Hotmail Documentation Style Guide Hotmail Documentation Style Guide Version 2.2 This Style Guide exists to ensure that there is a consistent voice among all Hotmail documents. It is an evolving document additions or changes may be made

More information

QUICK REFERENCE GUIDE

QUICK REFERENCE GUIDE QUICK REFERENCE GUIDE WYSIWYG Toolbar Editor provides page editing commands with the What-You-See-Is-What-You-Get (WYSIWYG) Editor Toolbar. (User toolbar may vary.) File Functions: Save or revert changes

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for ios User Guide Version 1.2.2 12 December 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

JAVASCRIPT - CREATING A TOC

JAVASCRIPT - CREATING A TOC JAVASCRIPT - CREATING A TOC Problem specification - Adding a Table of Contents. The aim is to be able to show a complete novice to HTML, how to add a Table of Contents (TOC) to a page inside a pair of

More information

PHP Personal Home Page PHP: Hypertext Preprocessor (Lecture 35-37)

PHP Personal Home Page PHP: Hypertext Preprocessor (Lecture 35-37) PHP Personal Home Page PHP: Hypertext Preprocessor (Lecture 35-37) A Server-side Scripting Programming Language An Introduction What is PHP? PHP stands for PHP: Hypertext Preprocessor. It is a server-side

More information

Quick Reference Guide OU Campus

Quick Reference Guide OU Campus Quick Reference Guide OU Campus omniupdate.com Logging In... 2 Page Actions Toolbar... 2 Editing Content... 3 WYSIWYG Toolbar Editor... 4 Commonly Used Functions... 5 Publishing Pages... 5 Creating Folders

More information

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION

More information

Introduction To The New University Service. Bob Booth November 2010 AP- 2

Introduction To The New University  Service. Bob Booth November 2010 AP- 2 Introduction To The New University Email Service. Bob Booth November 2010 AP-Email2 University of Sheffield Contents 1. Introduction... 3 2. Accessing your Email... 4 3. Received Messages... 5 3.1 READING

More information

Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation.

Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation. Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation October 5, 2017 1. Introduction The Email Sender and Provider Coalition

More information

Acceptable Usage Policy

Acceptable Usage Policy High Quality Web Hosting Acceptable Usage Policy Serventus Inc. (www.serventus.com) Content Introduction... 2 Prohibited Content... 3 Users Security Obligation... 3 Network Abuse... 3 Intellectual Property

More information

OUTLOOK WEB ACCESS (OWA) USER S GUIDE. Exchange 2003 Version - OWA Guide

OUTLOOK WEB ACCESS (OWA) USER S GUIDE. Exchange 2003 Version - OWA Guide OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version - OWA Guide TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION TO OWA...3 Web-Based

More information

PHP and MySQL for Dynamic Web Sites. Intro Ed Crowley

PHP and MySQL for Dynamic Web Sites. Intro Ed Crowley PHP and MySQL for Dynamic Web Sites Intro Ed Crowley Class Preparation If you haven t already, download the sample scripts from: http://www.larryullman.com/books/phpand-mysql-for-dynamic-web-sitesvisual-quickpro-guide-4thedition/#downloads

More information

IEEE Electronic Mail Policy

IEEE Electronic Mail Policy IEEE Electronic Mail Policy 1. Policy Responsibility and related documents This policy is maintained by the IEEE Information Technology Strategy Committee (ITSC), with revisions submitted to the Board

More information

PHP. Interactive Web Systems

PHP. Interactive Web Systems PHP Interactive Web Systems PHP PHP is an open-source server side scripting language. PHP stands for PHP: Hypertext Preprocessor One of the most popular server side languages Second most popular on GitHub

More information

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have

Basics. Setting up an Account. Inbox. Your inbox is your starting place when you open your  . Your inbox contains all the  s that have Email Basics Welcome to Email Basics. Today we will be covering how to send an email, how to add attachments, how to reply or forward an email, and how to use the different folders in your email account.

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet

More information

Deliverability: The Battle to the Inbox

Deliverability: The Battle to the Inbox Email Deliverability: The Battle to the Inbox Arend Henderson, Chief Analytics Officer Q Interactive Tuesday, February 26, 2008 Q Interactive Overview Connect advertisers and consumers using Consumer Requested

More information

Application Inspection and Control for SMTP

Application Inspection and Control for SMTP Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be

More information

What s New in Metasploit Pro 4.5? Getting Metasploit Pro 4.5. Product Term. Metasploit Pro Metasploit Pro 4.5 Release Guide.

What s New in Metasploit Pro 4.5? Getting Metasploit Pro 4.5. Product Term. Metasploit Pro Metasploit Pro 4.5 Release Guide. Metasploit Pro 4.5 What s New in Metasploit Pro 4.5? The Metasploit Pro 4.5 release focuses on streamlining and simplifying the abilty to create social engineering attacks. The goal is to provide an intuitive

More information

PHP-FIG Home Blog PSRs Personnel Bylaws FAQs Get Involved PSR-2: Coding Style Guide

PHP-FIG Home Blog PSRs Personnel Bylaws FAQs Get Involved PSR-2: Coding Style Guide PHP-FIG Home Blog PSRs Personnel Bylaws FAQs Get Involved PSR-2: Coding Style Guide This guide extends and expands on PSR-1, the basic coding standard. The intent of this guide is to reduce cognitive friction

More information

CITS1231 Web Technologies. PHP s, Cookies and Session Control

CITS1231 Web Technologies. PHP  s, Cookies and Session Control CITS1231 Web Technologies PHP Emails, Cookies and Session Control Sending email with PHP We have looked at storing user information using files. Email messages can also be thought of as data streams, providing

More information

Track-able Bulk Management System

Track-able Bulk Management System Track-able Bulk Management System Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits Why TBMS? Effective Communication E-Marketing Behavior & getting Attention Track-able Bulk

More information

CSE413: Programming Languages and Implementation Racket structs Implementing languages with interpreters Implementing closures

CSE413: Programming Languages and Implementation Racket structs Implementing languages with interpreters Implementing closures CSE413: Programming Languages and Implementation Racket structs Implementing languages with interpreters Implementing closures Dan Grossman Fall 2014 Hi! I m not Hal J I love this stuff and have taught

More information