Protocols POP3
POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.
IMAP
IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25.
Client Server Communication
Server and Client are the two main elements in all Internet Applications. The client sends requests and the server listens to those requests and responds/accomplishes the required task. The server and client communicate with each other through a common protocol. In Web NMS, the common communication protocol is either TCP Socket or RMI. The Client-Server communication denotes the communication between FE server/FE component of combo BE server and the Clients. In the Web NMS context, the Server-side comprises of BE server and FE server and the Client-side comprises of FE and Clients.
SMTP commands:
HELO command, to initiate dialog with identifying itself in the parameter
MAIL command, to establish the return address.
RCPT command, to establish a recipient of this message. This command can be issued multiple times, one for each recipient. These addresses are also part of the envelope.
DATA to signal the beginning of the message text. It consists of a message header and a message body separated by an empty line. DATA is actually a group of commands, and the server replies twice: once to the DATA command proper, to acknowledge that it is ready to receive the text, and the second time after the end-of-data sequence, to either accept or reject the entire message.
QUIT command ends the session.
POP/IMAP commands:
USER. It allows the authentication. Always it must be followed by a user name.
PASS. It allows specify the password of the previous user.
STAT. Info about the messages of server.
USER. It allows the authentication. Always it must be followed by a user name.
PASS. It allows specify the password of the previous user.
STAT. Info about the messages of server.
NNTP Protocol
The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
E-mail mailbox
E-mail mailbox is a storage device where electronic mail messages are delivered. A mailbox is identified by an email address. The mail system allows user to scan mailbox copy it to a file, delete it, print it or forward to another user.
The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
E-mail mailbox
E-mail mailbox is a storage device where electronic mail messages are delivered. A mailbox is identified by an email address. The mail system allows user to scan mailbox copy it to a file, delete it, print it or forward to another user.
Email Parameter
1) maximum size of mailbox
2) maximum size of sent messages
3) maximum size of received messages
4) number of available domains
5) period of inactivity
6) servers
Email Aliases
An alias is a name you have used besides your real name. Email Alias is an alternative email address which points to existing email account but It is not a email account. If we assign aliases to one email address, messages sent to all those aliases will be delivered to our mailbox.
Email Address
An email address identifies an email box to which email messages are delivered. Email address is made up of a local part, an @ symbol, then a domain part.
E-mail structure
Electronic mail (e-mail) is a method of exchanging digital messages from an author to one or more recipients.
Internet email messages consist of two major sections:
Header - structured into fields such as From, To, Bcc, Cc (Carbon copy), Subject, Date, Message-ID, In-Reply-To, Content-Type (eg. text/html). It is separated from the body by a blank line.
Body - the basic content, as unstructured text. Sometimes containing a signature block at the end.
Email Address
An email address identifies an email box to which email messages are delivered. Email address is made up of a local part, an @ symbol, then a domain part.
E-mail structure
Electronic mail (e-mail) is a method of exchanging digital messages from an author to one or more recipients.
Internet email messages consist of two major sections:
Header - structured into fields such as From, To, Bcc, Cc (Carbon copy), Subject, Date, Message-ID, In-Reply-To, Content-Type (eg. text/html). It is separated from the body by a blank line.
Body - the basic content, as unstructured text. Sometimes containing a signature block at the end.
Header
The header, a set of lines containing information about the message's transportation, such as the sender's address, the recipient's address, or time stamps showing when the message was sent by intermediary servers to the transport agents, which act as a mail sorting office.
Separator
It is used for separating the list of e-mail addresses by domains and then arranging the addresses within domain.
Attachments
It is any computer file that is sent along with an email . It is the way to share documents and images.
E-mail Coding
Email coding prevents from finding email address in the webpage source.
Separator
It is used for separating the list of e-mail addresses by domains and then arranging the addresses within domain.
Attachments
It is any computer file that is sent along with an email . It is the way to share documents and images.
E-mail Coding
Email coding prevents from finding email address in the webpage source.
MIME
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).
Mailing List
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. At least two types of mailing lists can be defined: an announcement list is closer to the original sense, where a "mailing list" of people was used as a recipient for newsletters, periodicals or advertising. Traditionally this was done through the postal system, but with the rise of email, the electronic mailing list became popular. The second type allows members to post their own items which are broadcast to all of the other mailing list members. This second category is usually known as a discussion list.
E-Mail gate
A server than transfers electronic mail between two networks using different mail systems.
E-mail Security
Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information. From an individual/end user standpoint, proactive email security measures include:
Strong passwords
Password rotations
Spam filters
Desktop-based anti-virus/anti-spam applications
A blacklist (or black list) is a list or register of entities or people who, for one reason or another, are being denied a particular privilege, service, mobility, access or recognition. The blacklist test will check a mail server IP address against over 100 DNS based email blacklists. (Commonly called Realtime blacklist, DNSBL or RBL). If your mail server has been blacklisted, some email you send may not be delivered. Email blacklists are a common way of reducing spam.
Graylists
Graylist is a method of defending e-mail users against spam. A mail transfer agent (MTA) using graylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.
Spam Filtering
A spam filtering is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
SSL
SSL stands for Secure Socket Layer - it is a protocol designed to send messages safely in the network. It ensures confidentiality of data transfer and security of logins and passwords
TLS
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
PGP
PGP stands for Pretty Good Privacy - a tool used for coding and decoding electronic mail. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
Signature Spam
Spam is unwanted electronic message. Spam can be spread across electronic mail, internet communicators or even SMS. Usually spam is sent in mass, contains a lot of commercial information and has the same content. The aim of spam is to achieve material benefits by the sender.
Blacklist
Graylists
Graylist is a method of defending e-mail users against spam. A mail transfer agent (MTA) using graylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.
A spam filtering is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
0 comments:
Post a Comment