PocoMail, PC Magazine Shareware Program of the Year 2000, was developed from the ground-up to protect users from viruses and spam that plague other commonly used products. This means that PocoMail is powerful, fast, secure, safe and easy to use and maintain. Features include: a fresh look with easy-to-use user interface and a flexible Application Toolbar and layouts; vertical Index Pane with a full-page preview pane; POP, IMAP and SSL support; PocoConsole that gives direct access to newly received email without the need to open the main application window; linked message support; mailbox-specific display options; comprehensive Templates support; multiple email accounts with many per-account options; Events that allow triggering of actions based on certain message conditions like replying to a message; powerful Search feature that collects and stores links to found items; running scripts to process messages; Filters that support many conditions and actions with unique message processors like Sanitize HTML that retains HTML formatting while rendering the message harmless from tracking and spying HTML bugs; ability to toggle Sanitize HTML and Strip HTML right from the preview pane to ensure that messages you view are always safe.
Apart from those powerful features, PocoMail also supports more basic email functionality: intelligent junk-mail filters, mailing list support, HTML support, multiple address books, multiple signatures, nested mailboxes, optional skins to change application appearance, fully multi-threaded operation, display attachments inline without launching external viewer, automatic backup of your mail and program data, and many more. PocoMail even has an as-you-type spell-checker. For administrators, moving PocoMail installation from one computer to another is as simple as copying the install directory, as PocoMail does not install any DLLs in the user's system directory. PocoMail focuses on making email work for you.
Efforts to detect fake news are not as advanced as they would appear, given that the best practices so far rely on pattern detection that can itself be exploited by malicious actors, according to new research from MIT.