If things look suspicious and your inner alarm bells are going off, then do not move any further with this process. The most natural way to ensure safety is to look at who is sending you the attachment, and if you are expecting to receive a larger file from that source. This can be done by looking at the file type, but that can be a bit complicated if you are not familiar with the dozens of different types commonly attached to emails. Download the Attachmentīefore we move any further, take a minute to assess if the attachment you are about to download is safe. Here we can see three smaller squares which we will be using soon.ĭon’t click anything else quite yet though, as that would move us from identifying to downloading, which is the last significant step in the process. Each attachment can be identified as the individual rectangles with the lower right corner folded upon itself.Īs you hover your mouse over each one, the display will change slightly, as seen in this case with the middle DOC file. This is where we will find our attachmentsįrom left to right here we can see a jpeg image, a DOC file, and pdf files. See below for the different icons” we see a dotted line break. Beneath the main body text “This is a sample email with attachments. When we open the actual email we have a more comprehensive view of the email. Within each of these are icons, and you might recognize the middle one with blue square with a white “W” centered if you are familiar with Microsoft Word. Note how the email in the browser has become a little taller, and below the email heading “Sample Email” you can see three smaller rectangles with curved edges. ![]() Now let’s compared this to an email that has some attachments added to it: When there are no attachments, each email will take the same uniform rectangular shape from the left side of the screen all the way to the right. When viewing your email you should see the display below. Once you have this process down, it adds an entirely new depth of digital communication that will aid you in a wide variety of tasks. So let’s take a quick look at how to safely identify where and what the attachment of an email is, how to download, and then view the attachment. To activate or use these require additional steps beyond opening the initial email. A JPEG could be a family photo, a DOC file a university paper, and a PDF your tax forms or voter registration. Some common examples of email attachments are JPEG images, a DOC file, and a PDF files. To begin let’s clarify a core definition – an email attachment is anything additionally added to the body text of an email. Both use the same service of transport, but due to size and safety issues, the package necessitates a little extra precaution before opening. Think of a text only email as a letter, and an email attachment as a boxed package. In response to this your level of attention and overall knowledge needs to be heightened to match. With email attachments though, there is a deeper level of access between the sender and recipient. When emails consist of only text there is little danger within them, especially if you do not respond. Like with so much else in life, a little safety upfront can save you time, money, and a headache later on down the road. Scams come in countless forms, some merely after a password or an account name, but others aim for incredibly sensitive information like credit card or social security numbers. ![]() Just as it is a gateway for helpful information to flow back and forth between people, it is also a primary means of digital attacks. That is not to say it’s all sunshine and roses with email though. email) has overtaken traditional paper mail for most casual purposes as it is far faster, ubiquitous, and once understood an overall easier method of communication. While the core concept of mail has stayed steady throughout the years, the format has undergone a major overhaul in the 21st century. How to Safely Download an Email Attachment. ![]() ![]() How to Identify/Assess an Email Attachment.Table of Contents: (click to jump to section)
0 Comments
Leave a Reply. |