TechTutorials - Free Computer Tutorials  







Email






Tutorials (12)

Total Tutorials: 6572  |  Added today: 0 Tutorials updated: 09/15/2018



Sort Tutorials By:


7 Tips to Keep in Mind When Choosing an Anti-Spam Solution
 
This article lists some of the most effective features to look for in an anti-spam solution.
Added: 07/20/2012, Hits: 2,105, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Email security
 
This white paper provides useful background information on email security issues. It will help you examine the security threats facing your corporate email system and determine what kind of email security solution your company needs.
Added: 06/26/2002, Hits: 1,713, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Is it Time to Start Encrypting Your E-mail?
 
Longing for a little privacy? Thinking it might be time to start encrypting your e-mail? This article looks at the pros and cons, examines e-mail encryption technologies, and provides some tips for getting the most out of e-mail encryption.
Added: 12/17/2004, Hits: 1,629, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Multipurpose Internet Mail Extensions
 
MIME is a specification for enhancing the capabilities of standard Internet electronic mail. It offers a simple standardized way to represent and encode a wide variety of media types for transmission via email.
Added: 05/08/2000, Hits: 2,805, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Protecting your Email from Viruses and Other MalWare
 
Virus writers, who used to spread their virtual "diseases" via infected floppies and network shares, have seized the opportunity posed by email programs that support attached files, HTML messages, and embedded scripts to send viruses and other malicious software (called "malware") to hundreds or thousands of people with just a few keystrokes. In this article, we will look at how email viruses work and what you can do to protect your computer and network from them.
Added: 06/09/2004, Hits: 1,759, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Protecting your network against email threats: How to block email viruses and attacks
 
This white paper describes various methods used by email viruses and worms to penetrate a protected network. Such methods include attachment files containing harmful code, social engineering attacks, crafted MIME headers, malicious use of HTML Script and similar technologies. A URL is provided where you can test whether your email system is vulnerable to threats like these. This document also examines the ways through which email can be sanitized and filtered of malicious code.
Added: 10/08/2003, Hits: 1,372, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Setting up your email client program
 
Before you can use your email account you must set up your email program. The following give step-by-step instructions for setting up most common mail programs.
Added: 05/08/2000, Hits: 1,625, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The problems with Secure Email
 
Find out why "Silver Bullet" Email security is problematic. Learn to fully protect your data simply and securely while avoiding complex interactions between proprietary systems.
Added: 03/12/2003, Hits: 1,408, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

The Pros and Cons of Behavioral Based, Signature Based and Whitelist Based Security
 
Taking a look at multiple security approaches, how they operate, and the strengths and weaknesses of each, along with a brief discussion of sandboxing and virtualization as security mechanisms.
Added: 11/14/2008, Hits: 1,961, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Understanding E-mail Spoofing
 
A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it.
Added: 10/20/2004, Hits: 1,873, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Understanding the SMTP Protocol
 
Who amongst us doesn’t like getting email? We all do of course! It is just like looking in the mailbox every morning after the postman comes by. How does email work though, and just what makes it arrive to our inbox? This will all be explained in this article giving you a far better understanding of how email works.
Added: 10/14/2005, Hits: 1,780, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating

Why Bayesian filtering is the most effective anti-spam technology
 
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, ‘statistical intelligence’ technique that is much harder to circumvent by spammers. It also explains why the Bayesian approach is the best way to tackle spam once and for all, as it overcomes the obstacles faced by more static technologies such as blacklist checking, databases of known spam and keyword checking.
Added: 09/29/2003, Hits: 1,104, Rating: 0, Votes: 0
Add To Favorites  |  Add Rating
Items Per Page:







7 Seconds Resources, Inc.




IT Showcase