Change Your Hotmail or Outlook. Email Address With An Alias. If you’re like me you’ve had your Hotmail email address for years. I’ve had mine for 1. Many people who have had their Hotmail addresses for a long time find that they’re getting a lot of unwanted email in the form of spam, marketing messages from companies that they once did business with, or even messages from individuals that they no longer wish to receive. The common reaction is to want to change your email address or close your account. The problem is that there really hasn’t been and isn’t such a thing as “change” when it comes to an email address. ![]() You could create a new email address, but that typically creates a new email account. That means everything associated with the old account is lost in the transition: email and contacts as well as additional services like calendars, cloud storage and other items associated with the account. Everything remains in the old account, but the new account – and email address – is starting over with a clean, and empty, slate. When Hotmail transitioned to Outlook. Not a change, but an addition. An alias is nothing more than another email address that is part of the same account. So let’s say I have an email account askleoexample@hotmail. For whatever reason I’ve decided I don’t want to use it any more, but I also don’t want to lose all of the email and contacts and services that I currently have associated with this account. I create an alias email address: askleoalias@outlook. All email sent to that alias email address is delivered to the same account – possibly even the same inbox – as my original askleoexample@hotmail. I can tell Outlook. I’ve changed my email address even though I log in to the same place with the same account to access it all. Let’s set one up so you can see what I mean. Call Hotmail Customer Service for Hotmail support and services like Hotmail login problem, Hotmail password recovery or Hotmail configuration. Usb Lock Ap Free Download Crack Files . Creating an alias. Naturally, you must be able to log in to your account in order to be able to create an alias for it. This is not a technique that can be used to help you recover anything. Click on the gear icon in the upper right, and then click on Options. On the resulting screen click on Aliases: manage or choose a primary. How to Close Old Email Accounts. If you need to close your email account, take the proper steps to secure any information that you have saved to your old email before.
![]() ![]() Assuming you have no aliases already, you’ll see something similar to the example above: the only alias is your existing email address. Click on Add alias. You’re given the option to create a new outlook. As you can see I’ve typed in “askleoalias” so that “askleoalias@outlook. Click on Add alias. At this point you may be told that the email address you’re attempting to create is already in use by someone else. Like any email address on free services, it’s first come first serve. If you run into that problem, keep trying different email addresses that would work for you until you find one that isn’t already taken. Fortunately “askleoalias” was not yet taken. And Microsoft sends a confirmation email: My account now has two email addresses that will reach it: askleoexample@hotmail. So far all we’ve done is added the alias to the account. Email sent to that alias will show up in the Outlook. If we really want to make the switch to using the new alias day- to- day, then we need to make it the “primary” alias. In the account aliases list that was presented after we created the new alias, click on the Make primary link for the new alias. Uncheck the opportunity to get more email from Microsoft, and then click on Yes. The alias is now the primary email address associated with your account. It may take up to 4. Microsoft services.)What did not happen. Your old email address still works. Your old email address was not affected by this at all. People can email you at your old email address, and they can email you at your new email address. All the email will appear in your inbox. In fact you can log in to your account using either email address, and you can send email from either account. When you compose a new message, click on the little down- arrow next to your email address: You’ll be able to choose which alias should be used to send this email, meaning which alias will appear in the “From: ” line. Removing the old alias: don’t. . You may have noticed that when we set the new alias as the primary, we actually have the option of removing the old email address: Now, on the surface it seems like you can complete an actual and complete change of email address by now clicking that Remove link. I strongly recommend you not do that. Once you do that, you lose all control over that email address. Legitimate people trying to reach you will be unable to. You may not be able to get it back. Worse, eventually someone else may be able to create an email account or alias with your old email address. If email to that address is the problem that you’re attempting to solve, I recommend that you instead: Create a folder into which you want email to that email address to go. Create a Rule (gear icon, and then Manage rules) to automatically move all email sent to that email address into the folder you’ve just created and never leave it in the inbox for you to see. Every so often check that folder for activity that you might actually want to see. Or ignore it completely. Don’t give up control of your old email address. I’ve seen too many people run into unintended and unanticipated consequences when they manage to completely release an email address. What To Do When Your Email Gets Hacked. Recently, I got an email from a friend urging me to check out an amazing page. Between the grammatical errors and a link pointing to a server somewhere in Russia, it was obvious that my friend’s email account had been hacked. When I checked in with her another way, she already knew about the problem—the hacker's message had gone out to her entire address book—and she was quite concerned. So I walked her through the steps for getting everything back in order. Step #1: Change your password. The very first thing you should do is keep the hacker from getting back into your email account. Change your password to a strong password that is not related to your prior password; if your last password was billyjoe. Billy. Joe, you shouldn't have been using your name as your password in the first place. Try using a meaningful sentence as the basis of your new password. For example, “I go to the gym in the morning” turns into “Ig. GYMitm” using the first letter of each word in the sentence, mixing uppercase and lowercase letters and replacing the word “to” with “2.”Step #2: Reclaim your account. If you’re lucky, the hacker only logged into your account to send a mass email to all of your contacts. If you’re not so lucky, the hacker changed your password too, locking you out of your account. If that’s the case, you’ll need to reclaim your account, usually a matter of using the “forgot your password” link and answering your security questions or using your backup email address. Check out the specific recommendations for reclaiming possession of your account for Gmail, Outlook. Hotmail, Yahoo! and AOL. Step #3: Enable two- factor authentication. Set your email account to require a second form of authentication in addition to your password whenever you log into your email account from a new device. When you log in, you'll also need to enter a special one- time use code the site will text to your phone or generated via an app. Check out two- step authentication setup instructions for Gmail, Microsoft’s Outlook. Hotmail, AOL and Yahoo! Step #4: Check your email settings. Sometimes hackers might change your settings to forward a copy of every email you receive to themselves, so they can watch for any emails containing login information for other sites. Check your mail forwarding settings to ensure no unexpected email addresses have been added. Next, check your email signature to see if the hacker added a spammy signature that will continue to peddle their dubious wares even after they've been locked out. Last, check to make sure the hackers haven’t turned on an auto- responder, turning your out- of- office notification into a spam machine. Step #5: Scan your computer for malware. Run a full scan with your anti- malware program. You do have an anti- malware program on your computer, right? If not, download the free version of Malwarebytes and run a full scan with it. I recommend running Malwarebytes even if you already have another anti- malware program; if the problem is malware, your original program obviously didn't stop it, and Malwarebytes has resolved problems for me that even Symantec's Norton Internet Security wasn't able to resolve. Scan other computers you log in from, such as your work computer, as well. If any of your scans detect malware, fix it and then go back and change your email password again (because when you changed it in step #1, the malware was still on your computer). Step #6: Find out what else has been compromised. My mother- in- law once followed the ill- advised practice of storing usernames and passwords for her various accounts in an email folder called "Sign- ups." Once the hacker was into her email, he easily discovered numerous other logins. Most of us have emails buried somewhere that contain this type of information. Search for the word "password" in your mailbox to figure out what other accounts might have been compromised. Change these passwords immediately; if they include critical accounts such as bank or credit card accounts, check your statements to make sure there are no suspicious transactions. It's also a good idea to change any other accounts that use the same username and password as your compromised email. Spammers are savvy enough to know that most people reuse passwords for multiple accounts, so they may try your login info in other email applications and on Pay. Pal and other common sites. Step #7: Humbly beg for forgiveness from your friends. Let the folks in your contacts list know that your email was hacked and that they should not open any suspicious emails or click on any links in any email(s) that recently received from you. Most people will probably have already figured out that you were not really the one recommending they buy Viagra from an online pharmacy in India—but you know, everyone has one or two friends who are a little slower to pick up on these things. Step #8: Prevent it from happening again. While large- scale breaches are one way your login information could be stolen—last month, 5. Yahoo accounts were hacked and there's evidence the number could actually be more than 1 billion—they’re certainly not the only way. Many cases are due to careless creation or protection of login information. A look at Splash Data's worst passwords reveals people still choose common passwords and passwords based on readily available information, making their accounts hackable with a few educated guesses. Easy passwords make for easy hacking, and spammers use programs that can cycle through thousands of logins a second to identify weak accounts. Picking a strong password is your best protection from this type of hacking. It also is prudent to use a different password for each site or account, or, at the very least, use a unique password for your email account, your bank account and any other sensitive accounts. If you're concerned about keeping track of your passwords, find a password management program to do the work for you. Limit the amount of personal information you share publicly on social media. Hackers use this publicly available personal information to help answer security questions that protect your accounts. Bookmark websites that you use frequently to access personal information or input credit card information. This will prevent you from accidentally landing on a site that hackers set up to catch people mistyping the site address. In my friend's case, her passwords were pretty good and there was no malware on her computer. But she was careless about where she was logging in. On a recent trip overseas, she used the computer in her hotel lobby to check her email. That was a bad idea. Computers in hotel lobbies, libraries and other public places are perfect locations for hackers to install key- logging programs. The computers are often poorly secured and get used by dozens of people every day who don't think twice about logging into their email or bank accounts or entering credit card information to make a purchase. The best practice is to assume that any public computer is compromised and proceed accordingly.[Updated: 1.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |