-
Categories: Computer Internet >> Internet.
Resolution: POP3 is an abbreviation for Post Office Protocol Version3. i.e. Post Office Protocol Version 3. Generally, the POP3 protocol standard is used to provide email sending and receiving services for hosts that do not have an email system.
POP3 (Post Office Protocol 3) POP is an email protocol for the offline model of the CS structure, which has been developed into its third version and is called POP3. , which specifies how to connect a personal computer to an inter's mail.
Electronic protocols for servers and e-mail. It is the first offline protocol standard for Internet e-mail, and POP3 allows users to store messages from a server to a local host (i.e., their own computer) and delete them at the same time.
Emails are stored on the mail server, and the POP3 server is the receiving mail server that follows the POP3 protocol and is used to receive emails.
imap4) is supported when a client connects to a server and queries a new e-mail message, all specified by that client.
Modify arbitrary messages without further interaction with the email server. The POP3 client sends to the POP3 server.
command and wait for a response, pop3 command is in command line form, represented by ASCII code.
A server response is made up of a single command line, or multiple command lines, with the first line of response ending in ASCII
The text +ok or -err indicates whether the corresponding operation status is successful or failed, and there are three states in the POP3 protocol.
Available Status, Processing Status, and Update Status.
When a client establishes contact with the server, it is recognized once the client has provided its identity and has been successfully confirmed.
The status is transferred to the processing state
-
is the protocol used when e-mail is transmitted.
-
The following method is applicable to Microsoft Outlook 2002 and above.
First of all, launch Microsoft Outlook 2003, click "Tools" and select "Account" option;
In the "Email Account" window that opens, select "Create a new email account" (default) and click "Next" to continue.
Select the "POP3" account and click "Next" to continue;
Enter the information required to complete the setup:
a.Enter your name (the sender's name will appear here when the message is received) and your email address in User Information.
c.Enter your username, which is the part that precedes your free email address "@", and your login password in the "Login Information" field. Note that you do not select the "Log in with a secure password identity" option.
d.Click on the "Additional Settings" button.
5.After clicking on "Other Settings", select the "Sending Server" tab, and check the "My Sending Server Requires Verification" option, and use the default "Use the same settings as the receiving mail server". Click the OK button to save the settings.
6 .Click Next to continue.
In general, POP3 is a usable protocol; The difference between IMAP and POP3 is that IMAP is used to transmit messages between networks in ciphertext, which is more secure than the plaintext transmission of POP3. IMAP (Internet Message Access Protocol) is another protocol corresponding to POP3, which is a multi-mailbox email system developed by Stanford University in the United States in 1986. It is able to obtain information about e-mail from the mail server or receive mail directly, which has the advantages of high performance and scalability. >>>More
The OTG function is mainly to transfer data between different devices, for example, if you want to transfer the ** inside the digital camera to the mobile phone, you must first transfer the ** to the computer and then from the computer to the mobile phone, the emergence of OTG allows the data to be transferred between the mobile phone and the digital camera, and it is recommended to give full play to the OTG function to the extreme: AGL >>>More
Through the "Bluetooth" technology, the wireless connection between personal business mobile devices can be realized, allowing users to easily and quickly communicate with their own peripheral electronic devices, such as computers, printers, scanners, fax machines, etc., without cable connection, making mobile access and communication of the device network simple. As the final form of "Bluetooth", it is to complete the construction of wireless networks (including personal area networks) on the basis of existing wired networks. At that time, the network will no longer be limited by geography and line, but will be truly portable and anytime Internet access and information interaction, so as to establish a fully wireless office environment. >>>More
Bluetooth wireless technology is a low-cost, low-power, short-range RF wireless technology for mobile devices and WAN access points. At present, more than 2,000 companies support Bluetooth technology. This fact illustrates that Bluetooth is fast becoming one of the widely accepted low-cost wireless technologies for personal area networks (PANs). >>>More
Death Eye Ability:
Unleashes an eye suspended in mid-air. Under the sweep of the Demon Eye, it will violently scorch the ground and form a circle of fire. All enemies who stay in this area will receive a group of "Purple Venom" and damage every 1 second for a total of 10 seconds. >>>More