The practice of having multiple e-mail addresses all resolve to a single e-mail address. For example: a small business has an employee with the e-mail address [email protected]. This person is responsible for the sales and customer service of the company which have the separate e-mail addresses [email protected] and [email protected] to handle the business of those divisions. Mail coming in to those two e-mail addresses will be forwarded by a mail relay to the e-mail address [email protected] so that the employee does not need to check three separate e-mail accounts to read the messages that are sent to the three different addresses.
- e-mail appending
(ē´māl &-pend´ing) (n.) The process of merging a database of customer information that lacks email addresses for the customers with a third-party’s database of email addresses in an attempt to match the e-mail addresses with the information in the initial database. A typical email appending scenario involves a business that has name, address and telephone […]
- e-mail bomb
A malicious act where huge numbers of e-mails are directed to a specific system or a targeted user of that system. Mail bombs will usually fill the allotted space on an e-mail server for the users e-mail and can result in crashing the e-mail server, or at the very least, possibly rendering the user’s computer […]
- Email Client
An application that runs on a personal computer or workstation and enables you to send, receive and organize e-mail. It’s called a client because e-mail systems are based on a client-server architecture. Mail is sent from many clients to a central server, which re-routes the mail to its intended destination.
- e-mail footer
The bottom section of an e-mail message that contains information that does not change from one e-mail marketing campaign to another. The footer will usually contain the company’s mailing address, phone number, e-mail contact address, Web site link, and often unsubscribe links or directions.
- e-mail harvesting
An automated process where a bot is used to search Web pages for e-mail addresses. The e-mail addressees are collected into a database that can be used by spammers to send unsolicited e-mail.