Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Find Out if an Email Address is Valid

b2ap3_thumbnail_email_address_found_400.jpgHave you ever spent time writing an email to somebody that you haven’t emailed before, hit send, and then wondered if the email address is even valid? For the active email user, this is an all-too-common scenario. How can you know for sure if an email address is valid before sinking time into writing a message?

One scenario where a business person might experience this struggle comes from trying to decipher a handwritten email address, perhaps from a sales convention signup sheet. To get to the bottom of these scribbles, you could call in a forensics team, or better yet, use free online tools.

Email Verification Tools
There are many email address verification websites available online, and they all do the same thing. One of the top ones is Verify-Email.org. To use it, simply enter into the form the email address in question, and then select Verify. It takes a moment or two to check, but after the process is completed, you’ll be presented with the information you’re looking for of whether or not the address is valid. Now you can proceed to type your message with the confidence that it will actually end up in someone’s inbox.

Search the Web and Social Media
While the email verification tool works great if you have a good idea of what the email address might be, what if the scribbled address is so jumbled that you can’t even make out entire words? For a hard-to-read address like this, performing a basic Internet search and taking advantage of social media may yield enough clues to point you in the right direction.

For example, many email addresses will include a person’s last name, along with the initial of their first name, or a string of numbers. If you can’t figure out what the name in the email address is (and let’s face it, there are some wacky last names out there), try taking a stab at the name on your favorite social network’s search form. If you and the person you're looking for have some mutual contacts and can reasonably be connected in one way or another, then their profile will be generated in the search just by typing a few of the legible letters.

Or, if you know any additional information about the email address, like what town the person is from or what business they represent, then you can search for their name and the additional information in an Internet search engine like Google Search. After trying a few variations of the name’s spelling (and a little luck), you might find a website with the name’s correct spelling, and possibly the email address you’re looking for. Armed with this information, you can now plug the email address with the correct spelling into the email verification tool listed above in order to see if it’s real or not.

You will never know what business opportunities you may miss out on by sending an email to a nonexistent address. However, with a little investigative work, you can know for sure that your message is going where it’s supposed to. Do you have any email tricks that have helped you in a pinch? Tell us your tips and tricks in the comments.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 March 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Computer Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Hardware Network Security Ransomware Facebook Microsoft Office Office Operating System Backup Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Windows Small Business Data Experience Phishing App Mobile Computing Big Data communications Safety Unified Threat Management Mobile Device Management Money Network Smartphones Quick Tips Managed Service Provider Outlook Firewall Content Filtering Wireless Technology Cybercrime Android Website Apple Best Practice Alert Employer-Employee Relationship Networking Data storage Two-factor Authentication History Cryptocurrency Laptop IBM Displays Router Google Docs Education Office 365 Cleaning Holiday YouTube Analytics Processors End of Support Saving Money Black Market Office Tips LiFi Lithium-ion battery Staffing intranet BYOD Downtime Streaming Media Help Desk Writing Passwords Micrsooft Visible Light Communication Disaster Social Networking Public Speaking Data Management IP Address Virtualization Business Growth Robot Advertising Recovery Government Society Sports Spam Augmented Reality Retail Keyboard Google Wallet Information Technology Search Running Cable User Windows 8 Internet of Things Hard Drives Windows XP Remote Computing IT Services Managed IT services Shortcut Hosted Solution Artificial Intelligence DDoS Documents Heating/Cooling Word Tech Support Compliance Bluetooth Drones Social Automation Business Management Printer Browser Virtual Desktop Wireless Memory Unified Communications Securty Competition Presentation Deep Learning Entrepreneur Document Management Encryption Law Enforcement SaaS Domains VoIP BDR Hacker Cortana Vendor Management Proactive IT Network Congestion Save Money Application Customer Service Monitors Music
QR-Code