There are plenty of email terms you might have come across but draw a blank. If you want to know your APOP from your IMAP, have trouble distinguishing your Cc from your Bcc, and are stumped by the term Backscatter, stick with us. We’ll start with how email came about and how it’s used today. The rest of the page covers the most common email terms, all summarized in plain English.
Email came before the entity we call the internet itself. It was crucial to the development of what’s known as interoperability, in which different computers exchange information and resources through local area networks (LANs) or wide area networks (WANs).
Originally conceived at the Massachusetts Institute of Technology (MIT), email was developed as a simple way to allow users of a computer to communicate with users on another computer. The success of email resulted in the development of the beginnings of the internet.
The list below contains the most up-to-date email related terminology. The list is arranged alphabetically should you want to skip to a certain topic, or start from beginning for a comprehensive overview of email terms.
An email attachment is any type of file sent along with an email message. Including an attachment in an email is a simple way to share documents and images. One or more files can be attached and sent to over to an email recipient. Attachments can include anything from photos and documents to zipped files, folders, mp3s, and more.
Most email providers limit the size of the attachment(s) that can be sent, and the number of attachments allowed per email. When attaching a file to an email, keep your email program’s file size limit in mind. To get around file size limitation, you may want to share a link to a file place in Dropbox, or a similar file hosting service within the email body.
Base64 is a method of encoding and decoding. It’s used to convert binary data transferred over the internet into the American Standard for Information Interchange (ASCII) text format. The need for Base64 arose from the need to attach binary content to emails without encountering any problems during transmission given that the system of transporting email messages is designed for plain text only (ASCII). The trouble with ASCII is it’s difficulty with handling other languages and arbitrary files.
The internet as an information highway, yet, the path for email to pass through is a narrow space. Think of a ten tonne truck trying to travel through a small tunnel that only small carts can pass through. It’s like getting a truck through the tunnel. How does it pass through? To solve this problem, the truck needs to be dismantled to pass through, and rebuilt on the other end of the tunnel.
This is exactly how it works when you send an email with an attachment. Data is encoded in a process called encoding the binary data and transformed into ASCII text (the type that can be transported via email without problems). Once the message reaches the recipient, the data is encoded and the original file is rebuilt. Base64 is one method of encoding arbitrary data as plain ASCII text.
The majority of the email sent worldwide is spam. Fortunately, blacklists exists as a means of sorting through legitimate email versus spam before it reaches your inbox. An email blacklist is a database containing known sources of spam mail that is used to filter and block spam email. Without email blacklists, it would be hard to accomplish much via email. Inboxes would be flooded and the intense traffic between servers would stall a lot of mail from reaching its destination.
Servers query blacklist databases in real time to ascertain the reputation of an IP address or the domain used to send an email. Email servers use the information in a blacklist to decide whether the email is coming from a reputable source to help them determine whether to accept or reject incoming mail. To query a blacklist, the IP address sending the email is checked against the spam database. If it’s included on the list, it is called a "known" source of spam and the email server stops the message from reaching the sender. It’s important to note that not all spam mail is on the blacklist, it may not yet have been reported as a ‘known’ source of spam mail.
There are several types of blacklists. The most common types are private blacklists courtesy of well known names McAfee, Cloudmark and Hotmail, there’s are also many public blacklists such as Spamcop and Spamhaus. Private blacklists tend to be stricter with their spam filtering. There’s no way of knowing why yourself or any other site features on a private blacklists, you’ll only know when you begin receiving bounceback emails from those particular spam lists. Conversely, publicly available spam lists can be searched. People can check if their IP address is on a list and they have the ability to resolve the listing. A good source for checking whether your IP address is on an email blacklist is MX Toolbox.
When you send an email, you need to select the address that will receive it. You can add them to one of three fields; To, Cc and Bcc. All three fields can send an email to several recipients in one go, however they work slightly differently.
An email message is made up of three components:
An email address is the electronic version of a real life postbox. It can send and receive email messages over a network of connected machines such as a local network not connected to the wider internet or the internet).
Given the popularity of email, there’s an abundance of email services offering a whole host of services each with various levels of functionality. Even though most ISPs provide email accounts to their service users, dedicated email services such as Google and Thunderbird are preferred by many since they offer greater functionality, integrated communication services such as chat and games, and more storage.
We’ve mentioned the prevalence of email use over the last few decades, it’s the perfect environment for abuse. Given the enormous use of emails sent and received worldwide every day, they have become a target for abuse and spam. Think about how cost effective sending large amounts of email messages is to many recipients online. For this reason, it’s never been more important to use filters that sort legitimate email from spammers.
Spam, also known as junk email is when unsolicited messages are sent by email. More often than not, spam is from a commercial advertiser because it’s email is a more cost effective medium for the sender. To be classed as spam an email has to be not only commercial but have fraudulent or malicious intent. These are often sent in bulk (the act of spamming) by people you don’t know. Many spam emails contain links to familiar websites but in fact lead to sites that are hosting malware of phishing sites. Spam is delivered in various ways. These messages are orchestrated by a spammer. A spammer is an individual or an entity (group of individuals or a company) that sends spam emails.
There are several types of fraudulent spam practices that email users and email administrators need to watch out for:
You’ve probably heard of the terms that surrounding data storage metrics, but most people aren’t clued up on what they actually mean. Let’s start with a gigabyte (GB). A GB is a unit of storage containing 1,000 megabytes (1 MB), or 1 Billion bytes to be exact. Each bite is a single unit of storage made up of 8 bits.
LDAP is a directory service protocol. This purpose is a directory service is to provide a set of records organized in a hierarchical structure, similar to how a building directory contains a list of occupants along with their suite number and phone extension.
LDAP allows email and other programs on the internet to look up information from a server by querying this hierarchy. Anyone can use this protocol to locate individuals, organizations, and other resources on the network such as files and devices, on the internet or a corporate intranet.
List-unsubscribe is an optional string of text you can add to the header portion of an email. This option allows email providers and email clients to handle their unsubscribes. This email practice allows recipients to easily unsubscribe from an email list. Users click the text ‘unsubscribe’ which features as a button to effortlessly unsubscribe themselves from a mailing list. For publishers and marketers list-unsubscribe is an email best practice and should be adopted by legitimate mailers in all their email campaigns.
MIME, short for Multipurpose Internet Mail Extensions make it easy to send file attachments with emails. MIME is an extension of the original capabilities of the original email protocol, which allowed nothing but plain text to be sent. The introduction of MIME was an exciting time during the development of modern email. Suddenly people could exchange different kinds of data files across the internet (video, audio, applications etc).
A mail user agent is a type of program that allows you to send and receive emails. In daily life we just refer to an MUA as an email program. There are two types of MUA, classed by how the programs are accessed:
The Personal Folders File (PST) is how Microsoft Outlook stores data locally. PST is a file format that can hold emails, notes, contacts, calendars, and basically any Outlook data.
Public key cryptography is a secure algorithm that allows people to exchange encrypted emails and files over an open network such as the internet. Two keys, a public key and a private key are used to secure the data transmitted. Each key performs a unique function, the public key encrypts data during transmission while the private is used to decrypt it once it lands at the recipient. Public key cryptography is used across the internet when exchanging information, most notably when websites have an SSL certificate they deemed secure. Emails on the other hand rely on using Transport Layer Security protocol (TLS), the successor of SSL, to encrypt email data.
Request For Comments (RFC) is a crucial to internet governance. An RFC is a document drafted by the Internet Engineering Task Force (IETF) and the Internet Society (ISOC). These bodies are the principal agencies for standard setting governing the internet. They are tasked with describing the specifications for a particular technology. Most RFC documents use a common set of terms such as "not recommended" and "must".
Once an RFC is ratified by the IETF and ISOC, it becomes a formal standards document. All current RFCs can be found in the RFC-editor. For example, RFC 5782, a document regulating DNS Blacklists and Whitelists can be viewed here.
Is the standard protocol for sending secure email messaging. S/MIME authenticates an email sender using a digital signature and to protect privacy, they can be encrypted.
The name says it all: it’s a short description of the message. When you receive an email, the subject is in prominent position next to the sender’s name plus a preview of the body of the message depending on your email account. The best subject lines are concise and to the point. Keeping this short and informative will give people incentive to open your email.
Threadhijacking occurs when an individual or group of people comment on an original post on an online forum and deliberately go off topic. This practice can be carried out anywhere people can interact with comment threads online from a message board, blog comments section or Facebook post for example. They might ask a different question to the original question or suggestion on the first post of the thread.
For example a thread may begin "Where is the best Tapas in Madrid" and someone might divert the conversation by commenting "There’s tapas everywhere in Madrid, what’s really important is the best Sangria. Where can you find the best Sangria in this town?"
Threadjacking isn’t a crime but it’s good to keep in mind that derailing a conversation is bad internet etiquette since it undermines the point of the original post. To discuss a new topic, it’s polite to start a new thread.
Unicode has made it easier to exchange text files across the world. Unicode is the international coding standard that makes it possible to represent character and symbols from across the world including Western, Asian, Arabic and so on. Each letter or symbol is assigned a unique numerical value that applies to all devices, platforms and programs. This provision of setting up binary codes for script or text characters was the first of its kind, and provides a consistent way of encoding multilingual plain text to this day.
Starting at $14.88/yr
Web-based access to your accounts, secure storage on our private cloud, tough anti-spam protection and plenty of space!
Find out how you can host your own email server to ensure reliability and security for your business.
Get the basics of email communication right from the very start with this guide to email etiquette and protocol.
Every website on the planet is hosted somewhere. What does that mean? Find out with our guide!
Virtual Private Networks make your internet connection truly secure. Find out more about them and how they work.
Find out what that padlock symbol in your browser's address bar means and why you should care.
Instructions on how to avoid domain hijacking and other security attacks.
Discover how your domain name provider can help keep your information your own on the web.