Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

A few tips to ensure the security of e-mails

  Measures to ensure the safety of e-mails in the distance are not limited to choosing a secure password to access the POP server or IMAP. Most probably, at this point the main thing - norovit not create problems to yourself. I wrote Why I am talking about security in bulk and that my Granny talked about IT-security. At the moment, let's talk about the five basic methods of protecting e-mail to everyone.

  1.Otklyuchite auto fill of addresses. With the accumulation of automatic functions designed to facilitate users being, obmishuritsya risk increases substantially. The world to sample - the great and terrible autofill addresses in Microsoft Outlook, presented as a drop-down list, from which it is easy to mistakenly choose the wrong recipient. This can lead to serious problems and misunderstandings, especially when discussing private matters and confidential business information.

  2.Polzuytes function of "blind" mailing copies (Blind Carbon Copy, BCC) when sending messages to multiple recipients at once. From the standpoint of safety and common courtesy to inform the addresses of additional recipients of the letter to those whom they do not touch - very bad idea. When addresses are specified in the 'To "(To:) and" Copy "(Carbon Copy, CC:), they see all the recipients of the letter, because that address is not intended to be placed on public display, should be addressed in the" Bcc " (BCC:). In this case, any recipient will be mature, that the message was addressed to him, but he can not see the addresses of other recipients.

  3.Hranite letter to reliably secure location. No encryption of messages can not guarantee the confidentiality of information submitted in the case received and decrypted messages are stored as plain text files on your computer is accessible to other users. Sarah Palin on their own bitter experience that the e-mail service providers protect the confidentiality of our correspondence not close is not as reliable as we would like. Yes, and personal user computers - is also not a bastion security, particularly in the case of the home directory of MS Windows is configured as a shared folder CIFS and weak passwords.

  4.Ispolzuyte for private correspondence private is e-mail addresses. Each "lighted" in the Internet e-mail address will inevitably become the object of interest of many spammers are not only bombarded the mailbox of their advertising, but also use it as a cover for mass mailings. The more spammers and phishers exploit address so that the greater the possibility that it will get blacklisted by ISPs and lazy admins of mail servers, and so sent him a letter cease reach the recipient.

  5.Chutko check the address of the recipient, once you post, especially in the case of newsletters. In principle, the accidental sending of reply to the sender of the message to the list, instead of answering the very mailing list - not such a rather big security risk, but it is very inconvenient. Allowed because that did not come to know that the message did not get on the intended use. But the reverse situation is much worse: in case of accident to send a mass mailing letter, designed to a specific recipient, is not forbidden not only to inform the world about the very intimate problems, but also to divulge the secret of meaningful thousands of unfamiliar users.

  These tips are designed to protect users from their own negligence rather than from malicious hackers and intruders. Irresponsibility which sometimes creates a rather big security threat than deliberate external influence, because careful not to create unnecessary problems yourself!

Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта