[Latest News][6]

PC
andriod
Android
hack
Loots
ios
Iphone
andriod hack
ios9
iphone.ipad
hacks
recharge
windows
Windows phone
window phone
window
apps
linux
Amazing tricks
mac
windows 10
jailbreak
Facebook
facebook hack
windows xp
Tricks
hack windows xp
uber
whatsapp
free recharge
how to hack facebook account
nokia
tablet
website hack
COC
Clash-of-clans
OLA
POKEMON
Phissing
anonymous
hack a website
hack facebook
hak
hello
ola hack
ola unlimited
posting fake status
posting gif image in facebook
recover
reliance jio
user X The dark net
xp
1000rs note
500 note banned
ATM
India
Orkut
PM
PM Modi
POKEMON GO
Paytm
Teamuserx
askaman
attack
blank comment
blank status
browser
deals
email
flipkart
framework
funny
gmail
hack applock
lost contact
make invisible account
metasploit
metasploit framework
narendra modi
oy rooms
oyo
viral
wifi
wifi hack

How E-mail Works?

how e-mail works

Email is based around the use of electronic mailboxes. When an email is sent, the message is routed from server to server, all the way to the recipient's email server. More precisely, the message is sent to the mail server tasked with transporting emails (called the MTA, for Mail Transport Agent) to the recipient's MTA. On the Internet, MTAs communicate with one another using the protocolSMTP, and so are logically called SMTP servers (or sometimes outgoing mail servers).
The recipient's MTA then delivers the email to the incoming mail server (called the MDA, for Mail Delivery Agent), which stores the email as it waits for the user to accept it. There are two main protocols used for retrieving email on an MDA:
  • POP3 (Post Office Protocol), the older of the two, which is used for retrieving email and, in certain cases, leaving a copy of it on the server.
  • IMAP (Internet Message Access Protocol), which is used for coordinating the status of emails (read, deleted, moved) across multiple email clients. With IMAP, a copy of every message is saved on the server, so that this synchronization task can be completed.
For this reason, incoming mail servers are called POP servers or IMAP servers, depending on which protocol is used.
To use a real-world analogy, MTAs act as the post office (the sorting area and mail carrier, which handle message transportation), while MDAs act as mailboxes, which store messages (as much as their volume will allow) until the recipients check the box. This means that it is not necessary for recipients to be connected in order for them to be sent email.
To keep everyone from checking other users' emails, MDA is protected by a user name called a login and by a password.
Retrieving mail is done using a software program called an MUA (Mail User Agent).
When the MUA is a program installed on the user's system, it is called an email client (such as Mozilla Thunderbird, Microsoft Outlook, Eudora Mail, Incredimail or Lotus Notes).
When it is a web interface used for interacting with the incoming mail server, it is called webmail.

Open relay

By default, and for historical reasons, it is not necessary to authenticate oneself to send email, which means that it is very easy to falsify one's own address when sending mail.
For this reason, nearly all Internet service providers lock down their SMTP servers to that only their subscribers can use them, or more precisely only machines whose IP address belongs to the ISP's domain. This explains why travelling users must modify the outgoing server settings in their email clients each time they move to a new home or business.
When an organization's email server is improperly configured and allows third-party users on any network to send emails, this is called an open relay.
Open relays are generally used by spammers, as using them hides the true origins of their messages. As a result, many ISPs keep an up-to-date blacklist of open relays, to keep subscribers from receiving messages from such servers. By +Aman Kumar 

About Author Mr.H4ck3R

Mr.h4ck3r A passionate blogger and Hacker! Love to play with electronics and softwares Get listed in India's Top 3rd website ! CEO at 👇 www.teamuserx.com. UserX:The Dark-Net is a Blog which publishes several articles each day about hardware and software hacks.You will get Unrevealed secrets of hacking. A hack refers to modifications of a product or software as well as creation of something new for convenience.Thanks to all the members of the blog for their contribution Himmy,Adz-shankyPhionex,Akay The Tech-Boy

No comments:

Post a Comment

TataCliq CPA

Start typing and press Enter to search