History of e-mail, Basic Computer Science

Assignment Help:

History of E-mail:

Internet based E-mail system was designed by a Computer engineer - Ray Tomlinson in late 1971 while working with ARPANET. Tomlinson used a file transfer protocol to send electronic messages to any computer on the ARPANET network. The first email was sent between two computers that were actually sitting beside each other but connected through ARPANET. The first important email standard was called SMTP, or simple message transfer protocol. SMTP was very simple and is still in use - however, SMTP has a problem - it makes no attempt to find out whether the person claiming to have sent a message is actually the same person. This basic flaw in the protocol was later to be exploited by viruses and worms, and by security frauds and spammers forging identities. Some of these problems are still being addressed. 

In 2004, when Internet standards for email began to mature the POP (or Post Office Protocol) servers began to appear as a standard - before that each server was a little different. POP was an important standard to allow users to develop mail systems that would work with each other.  Now Internet mail is defined by a large number of standards and recommendations by the Internet Engineering Task Force (IETF). However, only a few of the protocols used in Internet mail are full IETF standards. Most of these standards are being used by for people writing Internet mail software.  


Related Discussions:- History of e-mail

Operating system (o.s), Operating System (O.S) An operating syst...

Operating System (O.S) An operating system is the complete set of programs written to utilize the computer resources in an optimal manner. The operating system supervise

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

Graphical user interface and arrays, In this program, you are going to writ...

In this program, you are going to write a program for playing the game of Hangman. In this game, the computer will pick a word and display a sequence of blanks to be filled in; one

COMPUTER SYSTEM ARCHITECTURE, PLEASE HELP ME TO CONSTRUCT THE XOR GATE USIN...

PLEASE HELP ME TO CONSTRUCT THE XOR GATE USING ONLY NAND GATE

Help for final project, Hello i am a computer science student. now we are g...

Hello i am a computer science student. now we are going to start our final project. we want to work on Google App Inventor and we want to create mobile application. we are two grou

What are the Software interruptions, Software interruptions can be thoroug...

Software interruptions can be thoroughly activated by the assembler invoking the number of the preferred interruption with the INT instruction. The use of interruptions aids us in

Write separate programs for each of the above points, Question 1 Describe ...

Question 1 Describe the following with respect to creating Web Forms in .Net environment- Web Form Life Cycle Creating a Web Form Write programs with corresponding

How to set up the location (e.g. plaza, how to set up the location (e.g. pl...

how to set up the location (e.g. plaza, hall of fame, lecture theater or etc.) and services that will be used during the exhibition; devices needed; and finally produced a compreh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd