From 85c38af8b431e9bc0a6fe8f3c96f21cedb6f935d Mon Sep 17 00:00:00 2001 From: Aaron Weber Date: Thu, 26 Jul 2001 21:55:25 +0000 Subject: revised. 2001-07-26 Aaron Weber * C/usage-mail-org.sgml: revised. * C/usage-mail.sgml: revisions and stuff. * C/evolution-faq.sgml: Reworded a few questions. svn path=/trunk/; revision=11436 --- help/C/usage-mail.sgml | 599 ++++++++++++++++++++++++++++++------------------- 1 file changed, 368 insertions(+), 231 deletions(-) (limited to 'help/C/usage-mail.sgml') diff --git a/help/C/usage-mail.sgml b/help/C/usage-mail.sgml index 54549a5dbc..4a2153c86f 100644 --- a/help/C/usage-mail.sgml +++ b/help/C/usage-mail.sgml @@ -1,3 +1,4 @@ + Using Evolution for Email @@ -110,24 +111,28 @@ Most of the mail-related actions you'll want to perform are - listed in the Message menu in the menu - bar. The most frequently used ones, like + listed in the Message menu in the menu bar. + The most frequently used ones, like Reply and Forward, also appear as buttons in the toolbar. Almost all of them are also located in the right-click menu and as keyboard shortcuts, which tend to be - faster once you get the hang of them. You can choose - whichever way you like best; the idea is that the software - should work the way you want, rather than making you work the - way the it does. + faster once you get the hang of them. You can choose whichever + way you like best; the idea is that the software should work the + way you want, rather than making you work the way the it does. - Take a look at the headers + Email Headers - To look at the entire source of your email message, including - all the header information, select - ViewSource - + To look at the complete headers for email messages, select + ViewMessage + DisplayShow Full + Headers. To see absolutely every + bit, choose + ViewMessage + DisplayShow Email Source + . + @@ -177,14 +182,16 @@ - Press delete button or right click and click on - Delete. + Press delete button or right click on the message and + choose Delete. Deleted but still here? - When you do this, your message is marked to be deleted. Your - email is not gone until you have expunged it. + When you do this, your message is marked to be + deleted. Your email is not gone until you have + expunged it. When you "Expunge" a folder, you remove + all the mail that you have marked for deletion. @@ -207,8 +214,13 @@ Trash is Actually a Virtual Folder? - Your trash bin is actually a Virtual Folder that searches for all mails that - are queued to be deleted. + Your trash bin is actually a Virtual Folder that displays + all messages you have marked for later deletion. For more + information about Virtual Folders, see . If you choose + Actions Empty + Trash you will expunge + all your folders. @@ -219,22 +231,28 @@ - Click a message marked for deletion to select it + Select a message you have marked for deletion. - Click + Press CtrlU + + or choose Actions Undelete + What does Undelete actually do? - Undelete doesn't bring back messages that have been expunged. - Undelete simply unmarks messages for expunging. + If you have marked a message for deletion, undeleting + it will unmark it, and the message will be removed + from the Trash folder. However, it can't bring back + messages that have been expunged. @@ -246,10 +264,11 @@ Checking Mail - Now that you've had a look around the Inbox, it's - time to check for new mail. Click Get Mail in the - toolbar to check your mail. If it's the first time you've done so, the - mail setup assistance will ask you for the + Now that you've had a look around the + Inbox, it's time to check for new mail. + Click Get Mail in the toolbar to check + your mail. If you haven't entered any mail settings yet, the + setup assistant will ask you for the information it needs to check your email. @@ -273,11 +292,11 @@ - To check your email, press the Check Mail button. - If this is your first time checking mail, or you don't have - Evolution setup to store your password, you'll - be prompted for the password. Enter your password and your email will be - downloaded. + To check your email, press the Check Mail + button. If this is your first time checking mail, or you + haven't asked Evolution to store your + password, you'll be prompted for the password. Enter your + password and your email will be downloaded. Can't Check Mail? @@ -306,14 +325,20 @@ Attachments and HTML Mail - If someone sends you an attachment, a - file attached to an email, + If someone sends you an attachment, + a file attached to an email, Evolution will display the file at the bottom of the message to which it's attached. Text, - HTML, and most images will be displayed within the message - itself. For other files, + including HTML formatting, will appear as part of the + message. To minimize download time, and to foil spammers + who use server information to track their messages, images + linked from an HTML message not + display unless you select the + ViewMessage + DisplayLoad Images + option. For other files, Evolution will show an icon at - the end of the message. + the end of the message. To Save an Attachment to Disk: @@ -346,54 +371,37 @@ - - - To automatically view an attachment inline, press the arrow button next - to the attachment. - - + To Open an Attachment in a Program: - Open up the desired email + Open the mail message with the attachment you want to read. - Click the down arrow at the bottom of the email for the desired - attachment. + Click the aarrow next the the attachment icon. - Click Open in Program where program is the - program that is assigned to open that file type. + Select the program you'd like to use. It will start up + and open the document. - - Evolution can also display - HTML-formatted mail, complete with graphics. Graphics don't load - automatically by default, becuase they can be large and take a long - time to download. They can also be used by spammers to help track - who reads their email. So having them not load automatically helps - protect your privacy. - + HTML-formatted mail, complete with graphics. Graphics + don't load automatically by default, because they can be + large and take a long time to download. They can also be + used by spammers to help track who reads their email. So + having them not load automatically helps protect your + privacy. @@ -454,29 +462,42 @@ You can also choose to save messages as drafts or as text - files. Choose - - File - Save + files. Your options are: + + + Choose + + File + Save Draft - or Save As to save your message - as a text file. If you prefer to keep your message in a - folder (the Drafts folder would be the - obvious place), you can select - File Save In - Folder . + to store your messages in the drafts folder for later + revision. + + + + If you'd like to have the message sent later, you + can choose Send Later. That way, + the message will be added to the queue, and you can send a + batch of messages all at once. + + + + If you prefer to save your message as a text file, + choose Save As and then choose a + file name. + + + Advanced Mail Composition - Evolution is meant to not only handle large - amounts of incoming mail, but helps you manage all the tasks of having - an email account. - In the next few sections, you'll see how - Evolution handles additional features, - including large recipient lists, attachments, and forwarding. + In the next few sections, you'll see how + Evolution handles advanced email + features, including large recipient lists, attachments, and + forwarding. Attachments @@ -529,9 +550,9 @@ Types of Recipients Evolution, like most email - programs recognizes three types of addressee: primary - recipients, secondary recipients, and hidden ("blind") - recipients. + programs, recognizes three types of addressee: primary + recipients, secondary recipients, and hidden ("blind") + recipients. The simplest way to direct a message is to put the email @@ -545,6 +566,16 @@ typewriters and there were no copy machines, "Cc" stands for "Carbon Copy." Use it whenever you want to share a message you've written to someone else. + + + Bcc: is a little more complex. You + use it like Cc:, but people on the + Bcc: list are hidden from the other + recipients of the message. Use it to send mail to large + groups of people, especially if they don't know each other + or if privacy is a concern. + + Using the Cc: field @@ -556,7 +587,7 @@ Tim about the message as well. - + @@ -585,16 +616,14 @@ If you have created address cards in the contact manager, you can also enter nicknames or other portions of address - data, and Evolution will transparently - complete - the address for you. If you enter a name - or nickname that can go with more than one card, Evolution - will open a dialog box to ask you which person you meant. - + data, and Evolution will offer a + drop down list of possible address completions from your + address book. If you enter a name or nickname that can go + with more than one card, Evolution will open a dialog box to + ask you which person you meant. Also, + Evolution will add a domain to + any unqualified addresses. By default, this is your domain, + but you can choose which one mail preferences dialog. Alternately, you can click on the @@ -669,29 +698,35 @@ with quoted materials and the relevant replies interspersed--> - You may want to reply to a whole mailing list. For this, you would - use the Reply to List instead of the standard - Reply or Reply to All. + If you're subscribed to a mailing list, and want your reply + to go just to the list, rather than to the sender, choose + Reply to List instead of + Reply or Reply to + All. What is a Mailing List? - Mailing Lists are one of the most popular ways in which group - collaboration on the Internet works. They allow people to send one - message to one server. The server then knows who is subscribed to the - mailing list, and sends a copy of your email to all the people on the - list. - For example, evolution-hackers@ximian.com allows the - Evolution programmers to converse - publically about their latest developments so that everyone can - stay up to date. + Mailing Lists are one of the most popular tools for + group collaboration on the Internet. Here's how they work: + + + Someone sends a message to a single address, like + evolution@ximian.com. + + + That address belongs to a program that distributes + the message to a list of recipients. + + + The mail management program lets individuals subscribe + to or unsubscribe from the list at will, without + requiring the message writers to remember the addresses + of every recipient. - There are two different types of mailing lists. The first is a - general submission list. That means that anyone can write to the - list. The second is a managed list. The managed lists have - someone running them. They can do as little as limit who - subscribes to the list or as much as moderate which emails get on - the list. + Mailing list servers can also let network administrators + control mail flow, list membership, and even moderate + the content of mailing lists. @@ -700,12 +735,13 @@ with quoted materials and the relevant replies interspersed--> Searching and Replacing with the Composer - You maybe familiar with search and replace features, - and if you come from a Linux or Unix background, you - probably know what Find Regex - does. If you aren't among the lucky who already know, - here's a quick rundown of an important section of the - Edit menu. + You are probably familiar with search and replace features + in any sort of text-editing software, and if you come from + a Linux or Unix background, you may know what + Find Regex does. If you aren't + among the lucky who already know, here's a quick rundown of + the automated text searching features that the message + composer makes available to you. @@ -1049,8 +1085,9 @@ with quoted materials and the relevant replies interspersed--> - ALL CAPS MEANS YOU'RE SHOUTING! Don't write a whole - message in capital letters. It hurts people's ears. + WRITING IN CAPITAL LETTERS MEANS YOU'RE SHOUTING! + Don't write a whole message in capital letters. It + hurts people's ears. @@ -1086,7 +1123,6 @@ with quoted materials and the relevant replies interspersed--> - Subscription Management @@ -1097,13 +1133,13 @@ with quoted materials and the relevant replies interspersed--> - Click on the folder you wish to subscribe to in the - Store section. + In the Store section, click on the + folder to which you wish to subscribe. - Click the Subscribe to add it to the + Click Subscribe to add it to the subscribed list. @@ -1112,129 +1148,224 @@ with quoted materials and the relevant replies interspersed--> Close the window. - - - - + Encryption What is Encryption? - Encryption is an ancient method of changing readable text to unreadable - text that dates back to Egyptian times. Encryption takes the statement - "Evolution" and turns it into something which cannot be read without help - through decryption. - - Encryption Example + Encryption is an ancient method of keeping information safe + from prying eyes. Evolution can + help you keep your private messages secret. To do that, it + makes use of the external application + gpg, an implementation of strong + Public Key + Encryption. + + + + Public Key? Private Key? Whats the difference? - Kevin sends his friend Rachel and email and chooses to encrypt it. - The email has the following contents: - Hi Rachel. - Go banana! - Kevin - He tells Evolution to encrypt the - message. The computer encrypts the message which now looks like - @#$23ui7yr87#@!48970fsd. When the information gets to Rachel, - she'll decrypt the message and it'll show up in plain text for her - to read. + GPG uses two keys: public and private. You can give your + public key to anyone from whom you want to recieve + encrypted messages, or put it on a public key server so + that people can look it up before contacting you. + Never give your private key to anyone, + ever. Your private key lets you decrypt any + message encrypted with your public key. - - Encryption can be used in email in two ways: to verify that the sender is - the real sender, and to hide the message while in transmission. - Evolution has the capability to do both. + + + + Using encryption takes a bit of forethought. When you send a + message that is encrypted, you must encrypt it using your + intended recipient's public key. To get + an encrypted message, you must make sure that the sender has + your public key in advance. + + + + You can use encryption in two different ways: + + + Encrypt the entire message, so that nobody but the recipient can read it. + + + Attach an encrypted signature to a plain text message, so + that the recipient can read the message without decrypting it, and + only needs decryption to verify the sender's identity. + + + + + Sending an Encrypted Messagee + + Kevin wants to send an encrypted message to his friend + Rachel. He looks up her public key on a general key + server, and then tells + Evolution to encrypt the + message. The message now reads "@#$23ui7yr87#@!48970fsd." + When the information gets to Rachel, she decrypts it using + her private key, and it appears as plain text for her to + read. + + + - Generating your PGP key + Making Encryption Keys - First, you need to create a PGP key. To do this, you'll need GPG - installed. + Before you can get or send encrypted mail, you need to + generate your public and private keys with GPG. Here's how: GPG Versions - This manual covers version 1.0.6 of GPG. If your version is different, - this may not be entirely accurate. You may find out your version number - by typing in: gpg --version. + This manual covers version 1.0.6 of GPG. If your version is + different, this may not be entirely accurate. You may find + out your version number by typing in: gpg + --version. - You can start by typing in: gpg --gen-key at the - console. When you are asked about the algorythm to use, select 1. The next question asks you about key length. - The longer the key, more stronger it is. However, the longer the key, the - longer it takes to generate. This is your choice. However, 1024 bits - (default) should be adequate. The next question asks you if you want your - key to expire. Expiring keys make your key invalid after a certain amount - of time, so old keys don't float around when they aren't used anymore. This is the same concept - as a coupon at a supermarket. Next, you'll type in your real name, your - email address, and a comment. You should not forge this information, as - it is used later to verify who you are. Assuming that all your - information is correct, press "O" to continue. GPG now asks you for a - passphrase. This is a password which you will need to decrypt and encrypt - messages. This can be any length, with any characters in it. It is case - sensitive, which means that it does know the difference between capital - letters and lower-case. Now your key is generated. It is recommend you - surf the Internet, read your email, or write a letter in a word - processor while your key is generated. + + + + Open a terminal and type gpg --gen-key. + + + + + + Choose the default algorythm, "DSA and ElGamal." + + + + + + Choose a key length. The default, 1024 bits, should be + long enough. + + + + + + Decide if you want your key to expire automatically, and if so, when. + + + + + + + Enter your name, email address, and any additional + personal information you think is appropriate. Do not + falsify this information, because it will be needed to + verify your identity later on. + + + + + + Next, enter your passphrase. It does not have to be the + same as your email password or your login password. In + fact, it probably shouldn't. Don't forget it. If you lose + it, your keys will be useless and you will be unable to + decrypt messages sent to you with those keys. + + + + + + Now, GPG will generate your keys. This may take awhile, + so feel free to do something else while it's + happening. In fact, using your computer for something + else actually helps to generate better keys, because it + increases the randomness in the key generation seeds. + + + - Once this is completed, you'll be dropped back to the command line. - Now you can view your key information by typing gpg - --list-keys. You should see something similar to this: - - GPG Listing Keys - - /home/bob/.gnupg/pubring.gpg + Once the keys are generated, you can view your key information + by typing gpg --list-keys. You should see + something similar to this: + + /home/you/.gnupg/pubring.gpg ---------------------------- - pub 1024D/32j38dk2 2001-06-20 bob <bob@bob.com> + pub 1024D/32j38dk2 2001-06-20 you <you@your-address.com> sub 1024g/289sklj3 2001-06-20 [expires: 2002-11-14] - - - You'll now need to upload your public key to a keyserver, so that your - friends can use your key. You'll need to know the ID of your key, which - is after the 1024D on the line beginning with pub. For this example, it - is 32j38dk2. You now type in gpg --send-keys --keyserver - wwwkeys.pgp.net 32j38dk2. Substitute your key ID for 32j38dk2. - You will be prompted to type in your password and your key will be uploaded for your - friends to download. + + + + GPG will create one list, or keyring, for your public keys + and one for your private keys. All the public keys you know + are stored in the file + ~/.gnupg/pubring.gpg. If you want to + give other people your key, send them that file. + + + If you wish, you can upload your keys to a keyserver. Here's + how: + + + + Check your public key ID with gpg +--list-keys. It will be the string after 1024D on the line +beginning with "pub." In this example, it's 32j38dk2. + + + + + Enter the command gpg --send-keys --keyserver +wwwkeys.pgp.net 32j38dk2. Substitute your key ID for +32j38dk2. You will need your password to do this. + + + + Why Use a Keyserver? - Keyservers store your public keys for you so that your friends can - decrypt your messages. If you choose not to use a keyserver, you - can manually send your friends your public key. It is much easier - though to upload to a keyserver and then let your friends download - your public key on their own wish. - - - - Public Key? Private Key? Whats the difference? - - GPG uses two types of keys: public and private. The private should - be given out to no one, ever. Your private key allows your mail to - be signed and encrypted and decrypted by anyone who has it. The - public key is what you give your friends so that they can decrypt - your mails. + Keyservers store your public keys for you so that your + friends can decrypt your messages. If you choose not to + use a keyserver, you can manually send your people public + key, include it in your signature file, or put it on your + own web page. However, it's easier to publish them once, + and then let people download them from the keyserver when + they want. + + - Retrieving a Friends Key + Getting and Using Public Keys - To encrypt a message to your friends, you'll need to use their public - key in combination with your private key. - Evolution does that transparently, but you - still need to get their key off a keyserver. To do that, type: + To encrypt a message to your someone else you'll need to use + their public key in combination with your private key. + Evolution does that for you, but + you still need to get their key and add it to your keyring. + + + To get public keys from a public key server, enter the + command: gpg --recv-keys --keyserver wwwkeys.pgp.net keyid - . You will need to type in your password, and then their ID - will automatically be added to your keyring. + , substituting "keyid" for your recipient's ID. You + will need to type in your password, and then their ID will + automatically be added to your keyring. When you send mail to + them, Evolution will allow you to + encrypt your messages. + + + If someone sends you their public key directly, save it as a + plain text file and enter the command gpg + filename. This will add it to your keyring. @@ -1246,28 +1377,32 @@ with quoted materials and the relevant replies interspersed--> Tools Mail Settings - Once there, select the account you'd like to associate the key to and click - the Edit button. In the - Security tab is a section labeled Pretty - Good Privacy. Enter your key ID and click - OK. Your key is now integrated into your identity - in Evolution. + Once there, select the account with which you'd like to send + and recieve encrypted mail, and click the + Edit button. In the + Security tab is a section labeled + Pretty Good Privacy. Enter your key ID + and click OK. Your key is now + integrated into your identity in + Evolution. + Sending Encrypted Messages - You can either sign or encrypt a message. When you sign a message, you verify - that you were the one who sent it, and that no one is forging your - identity. Encrypting a message makes it impossible for someone with - prying eyes to view it while it's in transmission. + As you know, you can use encryption to hide the entire + message, or just to verify your signature. Once you've + generated your public and private keys, and have the public + keys of the people to whom you want to send mail, here's what + to do: Signing a Message - To sign a message, you simply click + To sign a message, choose: Security PGP Sign @@ -1280,8 +1415,8 @@ with quoted materials and the relevant replies interspersed--> Encrypting a Message - Encrypting a message is very similar to signing a message. You simply - click the menu item + Encrypting a message is very similar to signing a message. + Just choose the menu item Security PGP Encrypt @@ -1291,14 +1426,16 @@ with quoted materials and the relevant replies interspersed--> Unencrypting a Recieved Message - Sometimes, a friend will send you a message which is encrypted. In order - for you to read it, you need to unencrypt it. + If you get an encrypted message, you will need to decrypt it + before you read it. Remember, the sender has to have your + public key before they can send you an encrypted message. - When you view the encrypted message, Evolution - will prompt you for your PGP password. You type in your PGP password and - the message is then decrypted. - - - + When you view the message, + Evolution will ask you for your + PGP password. Enter it, and the message will be displayed + properly. + + + -- cgit v1.2.3