It has become extremely rare for ISPs to leave the port 25 open for external connections. This makes it impossible for email verifier programs to check email addresses for validity using a direct Internet connection. We kept it in mind when developing the Advanced Email Verifier and implemented the alternate option for email verification in the program.
G-Lock Email Processor offers great features for automatic attachment processing. With G-Lock Email Processor you can automatically extract attachments from incoming messages and save them to the hard disc. Plus, G-Lock Email Processor can rename the attachment based on your settings and save it to a folder under a new name. This program recognizes email attachments in most standard business formats, including PDF, TIFF, Word and Excel documents.
This article is about G-Lock EasyMail v6.xx.
You can read the tutorial how to send personal attachments with G-Lock EasyMail7 here
In some situations you may need to send a unique email attachment to each of your recipients. As an example, imagine that you want to attach an individual invoice in the .pdf format to each recipient. You can follow these steps to accomplish this task with G-Lock EasyMail v6.xx.
One of best email marketing practices says that you need to obtain the recipient's permission before sending emails to them. On the other hand, if you send relevant emails to your customers who purchased your product or used your service in the past, you may not worry about whether they want to receive your emails or not. It's supposed that nobody will complain about a relevant email even if they did not opt-in for it.
It sounds promising and opens more potential to email marketers eliminating the risk to be flagged as spammer. Let's dig deeper and see if you can really ignore the permission element in your email marketing campaign.
An essential element of successful email marketing campaign is a list of email addresses of people who are really interested in receiving the emails from the company or organization. Otherwise, unsolicited advertising will be classified as spam. Although sending out magazines and newsletters through bulk emailing is free, companies cannot risk the equity of their brands by offending people. An opt-in email list helps you assess the success of your email campaigns, and, more importantly, it reduces the risk of breaking anti-spamming laws.
Have you ever measured your email campaigns response rate? If no, it's time to start. Here is a good email tracking service. Email tracking can give you interesting results. For example, you may find that a small list generates a high response while a huge list generates a low open rate. Why so? Because it’s not the number of emails on your list but the quality of the list that really matters.
Anti-spam filters catch every incoming email before it is delivered into the Inbox and review it. They use a scoring system to classify an email as spam or legitimate. These filters (you might have heard about SpamAssassin, SpamProbe, or SpamCombat) look for certain patterns in the message, and assign "spam points" to it based on certain criteria: words, phrases, or even colors.
I've been working for a software developer company for 10 years. We regularly send newsletters to our customers and subscribers. For a company advertising their products on the Internet the most important thing is to get as many subscribers as possible and build a strong relationship with already existing clients. Since the communication with the customers is done via email, the newsletter you send plays the essential role.
This article tells about G-Lock EasyMail v6.xx and explains the most common reasons why the email sending in G-Lock EasyMail v6.xx may fail and gives possible solutions to them.
G-Lock EasyMail v6 records the log for each processed message. In case of sending failure, you can always find the reason of failure in the log. To view the message log, click on the Sent Manager button on the toolbar and do this:
- Select the group on the left pane, to which you sent the emails
- Select the message in the Message Log pane
- Click on the email address in the Sent Log pane and you'll see the full message log for this recipient.
G-Lock Email Processor is supplied with the rule which collects bounced emails from your mail server (POP3 or IMAP), extracts the email addresses from bounced emails and saves them to different files depending on the bounced email type.
The rule is called "Collect Bounced Emails" and includes the "Bounce Processor" and "Save Bounced Emails" components.
The Bounce Processor component identifies bounced emails on the server and extracts the following fields from bounced emails: