Protocols

SMTP, POP3 and IMAP are TCP/IP protocols used for mail delivery. If you plan to set up an email server such as hMailServer, you must know what they are used for. Each protocol is just a specific set of communication rules between computers.

SMTP

SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25.

POP3

POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.

IMAP

IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143.

Client Server Communication

Server and Client are the two main elements in all Internet Applications. The client sends requests and the server listens to those requests and responds/accomplishes the required task. The server and client communicate with each other through a common protocol. In Web NMS, the common communication protocol is either TCP Socket or RMI. The Client-Server communication denotes the communication between FE server/FE component of combo BE server and the Clients. In the Web NMS context, the Server-side  comprises of BE server and FE server and the Client-side comprises of FE and Clients.

Signature Spam

Spam signature is an element or set of elements of an email that may lead an anti-spam filter to consider this email as a spam.

Spam signatures impact spam scores.

PGP

PGP stands for Pretty Good Privacy  is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications

TLS

Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).

SSL

SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.

E-mail Security

Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information. From an individual/end user standpoint, proactive email security measures include:

Strong passwords
Password rotations
Spam filters
Desktop-based anti-virus/anti-spam applications

Parameter

In information technology, a parameter is an item of information - such as a name, a number, or a selected option - that is passed to a program by a user or another program. Parameters affect the operation of the program receiving them.

Aliases 

An alias is a name you have used besides your real name. Its so they can check all the records for you, in case some aren't under you legal name. If you've never used any other name besides your birth name, then skip the question. If not, list any names you have used, especially if you used them on official documents or w/e. 


E-Mail gate
The e-Mail gate web site is dedicated to battle spam by helping people to protect their email addresses against email crawlers, also known as "spambots". 

A spambot is a program similar to the web-crawlers used by search engines to index the web. The main difference is that spambots search and store all the email addresses it encounters while crawling the web. There are several commercial as well as free spambots available, ranging from the most simple crawlers to integrated group mailers with highly sophisticated methods of detecting email addresses within a web page. Since spambots provides free updated lists of email addresses they have quickly become the favorite choice for spammers.

Mailing List

A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is referred to as "the mailing list", or simply "the list".

MIME

 MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).

Header 

The header, a set of lines containing information about the message's transportation, such as the sender's address, the recipient's address, or time stamps showing when the message was sent by intermediary servers to the transport agents (MTAs), which act as a mail sorting office. The header begins with a From line and is changed each time it passes through an intermediary server. Using headers, you can see the exact path taken by the email, and how long it took each server to process.


Share this:

CONVERSATION

0 comments:

Post a Comment