Technology & You: E-mail


Image Credit: Nedroid

In this modern world of technology, everyone has an e-mail. Android users need a Gmail to use their devices and nearly every on-line account require some form of e-mail. With the need, has come supply and there are a plethora of e-mail options out there to choose from. No longer are we limited to AOL and Hotmail. With a little help, we will help you navigate a few options and pick a service that suits your needs. Some are widely popular with multiple services available, while others are more focused on privacy and data security. All of the services below also have corresponding apps or are compatible with apps to help provide communication on the go.

The Big Names


Google is the biggest name on the internet and one of the most widely used web-based e-mails in the world. The sign up is relatively simple. However, there are concerns with Gmail, specifically their handling of user information and their privacy policies.

To create a Gmail account, you will need your name, a username, a secure password, birthday, and gender. A phone number and recovery e-mail are also requested, but not required. Once your account is created, you will have access to not only Gmail, but also the full suite of google services such as drive, docs, and more.


While AppleID itself is not an e-mail service, it does come bundled with one. A standard for all things Apple, if you have an iTunes or iCloud account, you already have an AppleID. With this ID, you would be able to utilize their free e-mail service, Mail.

To create an Apple ID you will need your name, location, birthday, a preferred e-mail address, and a secure password. You will also need to provide an answer to three separate security questions as well as enter a captcha. After, this you will be able to make use of the myriad of services that Apple provides.


Yahoo still does e-mail and they do an adequate job of it. Sign-up is fairly easy However, as with the other big name web mail services, there are concerns with its privacy policy and how much they handle you information.

To sign up for a Yahoo mail account, you will need your name, a preferred e-mail address, a secure password, a phone number, and your birthday. The also ask for your gender, but providing it is optional. Once signed in you will have access to your mail and be able to comment on yahoo sports, new and other articles.


If you have ever owned a Windows computer with Office, no doubt you have experience with Outlook. However, Outlook is more than just a bundled piece of software with Office now. It is now a fully functional webmail application.

To create an account you must make a username. You will be given the choice of @ outlook or hotmail. You will then be asked to create a password. Next, they will ask for your name. After that, they will ask where you are located as well as your birthdate. Lastly, they will ask you to prove your humanity by having you complete a captcha. Once you have completed these steps you will be ready to use your new Outlook/Hotmail/Microsoft account to your hearts content.

Privacy Based


Proton mail is the brainchild of some Harvard graduates wanting to put an emphasis on privacy. Their servers are based in Switzerland in an effort to circumvent data extradition laws. In practice however, there is nowhere truly safe from warrants and extradition. There emails feature encryption and other security features to help keep your private information private.

To create an account, you will need a username and a secure password. You will also be asked to verify that you are not a bot by either giving it an email or phone number it can send a confirmation message. After you finish the confirmation process, you will be ready to use your e-mail as you see fit.


Based out of Germany, Tutanota (literally Latin for safe note) is focused on privacy in many of the same ways as Protonmail. Their encryption and privacy also work in much the same way as Protonmail in helping keep your information safe and secure.

The process to acquire an account is the simplest of all the e-mails on this list. You simply require a username and a secure password. Once you have provided both, you are ready to start communicating with encrypted or unencrypted messages to your friends and family.

Previous Installments:


Better Browsing Practices

Vulnerable/Updated and Malware/Spyware

Device Security

Wireless Security

Programming Languages

Wireless Printing

Share this Post