Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ To teach you how to safely send mail     - Ceph single / multi-node installation summary Powered by CentOS 6.x (Server)

- DBCA Error: ORA-19809: limit exceeded for recovery files process (Database)

- Kubernetes resolve application deployment model (Server)

- Android design patterns - state mode (Programming)

- Linux Quick Install MongoDB (Database)

- Findbugs installation documentation (Linux)

- The method of CentOS-7.0. The installation and configuration of Tomcat-7 (Server)

- Go performed using iOS and Android programming (Programming)

- Experience CoreCLR stack unwinding characteristics of initial implementation on Linux / Mac (Linux)

- GAMIT learning materials finishing (Linux)

- To_explore Linux system boot process (Linux)

- Linux directory configuration (Linux)

- PostgreSQL 9.3.5 database installation under Ubuntu Server 14.04 (Database)

- How to install the NVIDIA 358.16 driver in Ubuntu 15.10,14.04 (Linux)

- Linux operation and maintenance engineers face questions Intermediate (Linux)

- Linux ban single-user mode to enhance system security (Linux)

- Three binary tree traversal (recursive, non-recursive traversal and Morris) (Programming)

- ARP Linux-related operations (Linux)

- Java NIO in the world (Programming)

- VSFTPD Security (Linux)

  To teach you how to safely send mail
  Add Date : 2018-11-21      
  Email original intention was to facilitate the mutual exchange of scientists or professionals between. The first idea is only able to send messages to each other mutual trust between the two, so the beginning of the invention of e-mail security issues did not arouse attention. Unfortunately, this new form of communication became popular in spammers and hackers, in which case you want to redesign the system is already impossible. Because of its inherent security flaws by using additional security behavior modification and use of e-mail can be greatly enhanced security for e-mail.

1. Use first-class e-mail program

Despite all the e-mail program to send mail there is no difference in terms, but in terms of security performance is very different. A valid e-mail program should be able to filter spam in your inbox, while also providing basic scanning e-mail attachments.


G-mail is a good web-based e-mail program, a high level of security through its spam filtering function will ensure that your inbox free of junk mail of the disaster. But all virus scanning does not always satisfactory so actually, before you download the attachment, you would be best to use your personal virus scanner check.

Mozilla's Thunderbird is also a very good e-mail program. E-mail protocol used by Thunderbird and Microsoft Outlook are the same, are POP (Post Office Protocol Post Office Protocol, is used to receive e-mail) or IMAP (Internet Message Access Protocol, Internet Message Access Protocol).

2. Carefully handle e-mail attachments

When you download the attachment, your computer will assume that you know are doing the behavior. Therefore, your firewall will not go to check whether the security annex, then between your computer and accessories to protect the little cat is a simple sweep. Because of the annex setting the security level is too low, hackers use malicious attachments attack event also flattering. In fact, it was concluded that 90% of computer viruses is through this mode of transmission. In summary, when dealing with inbox email attachments, must be cautious.


Do not open attachments from strangers over the immediate well-known companies does not work, no matter how the message looks official or formal. Spammers make an email look legitimizing spared no effort and do well. So just before downloading mail scanning is not enough. Instead, you should strongly prohibit any attachments from strangers or companies directly related to the company's site to download the information you need.

If a friend's computer is infected, you will most likely also receive messages from them toxic. From this layer sense, even if it is an acquaintance sent me an attachment unreliable. If you do not want to use attachments before downloading attachments, you can call, use instant messaging software to confirm that they have sent you an attachment.

3. Do not click on random link in the email

Common phishing technique is seemingly normal attachment in e-mail containing a link, and then lead you to a malicious Web site. These e-mail messages will generally attract users to click on a link and then taking personal information to obtain the victim's financial information, or trick users subscribe to one they've never heard of a magazine or newspaper. Another variant is, after you click the link in your computer security virus directly, using technology called "push download." Whatever the threat posed is, one thing is for sure is hidden in the malicious e-mail link will lead to a huge PC security risks.


Do not click on the problem message. Some well-known companies will send you an email to inform you of a problem with the account, but will not be provided with a link may lose all of your information.

Even if you are in full compliance with these safety regulations, the consent of family members using e-mail account may also be accidentally click on malicious links. Therefore, the language you want to disable HTML mail in your e-mail so that the presence of a malicious link lost function, but also educate family members basic knowledge about e-mail security.

4. Set up mail filters

Some well-known Internet service providers have recently been committed to the development of new spam filtering mechanism so as to minimize the amount of spam. This can be reduced from the outside into your inbox spam, you can set up an internal network filtering mechanism recently. Although together can significantly reduce the number of your ISP spam filters and filter e-mail program, but only by the establishment of a filtering mechanism containing artificial factors in order to achieve seamless.


The first to use a valid e-mail application and the corresponding filters, Gmail allows users to design a series of e-mail address corresponding with the current e-mail alias, so you can e-mail will be sent based on different standards to different folder. If you have a news and information will be sold to name some spammers, you can directly Fengdiao this pseudonym, so you can stop the spam message.

If you can not set up an e-mail alias, you can also register for free e-mail account and then one of them as a dedicated communications account. If you do not want to use these accounts, you can use the same self-destruct like 10minutemail mail account to confirm your newsletter subscription or a service, so you will not be exposed to a real risk account.
- Parts of the partition is not recognized after Debian mount mobile hard disk (Linux)
- How to become a better Node.js developers in 2016 (Programming)
- On the Web application attack techniques Common (Linux)
- Manage SQL Server services login (start) account and password (Database)
- Linux systems for entry-learning - Install Go language in Linux (Linux)
- Sniffer install applications in Linux supplement (Linux)
- Oracle query start with connect by tree (Database)
- The difference between Objective-C language nil, Nil, NULL, NSNull (Programming)
- Use mdadm tool to create software RAID 0 (Linux)
- To create a problem by the statement date comparison of the difference between MySQL and Oracle (Database)
- Linux common commands: nslookup, ls md5sum, uname, history, etc. (Linux)
- How to set up HTTPS policies for older browsers (Server)
- Zabbix configuration of SNMP (Server)
- Win8 mount disk partitions under Ubuntu (Linux)
- To use slay kill user processes (Linux)
- Java Generics Introduction --HashMap summary (Programming)
- Nginx concerning the location and rewrite applications proxy_pass (Server)
- Kubernetes cluster deployment (Server)
- How Bluetooth turned off by default in Ubuntu 14.04 (Linux)
- RocketMQ Message Queuing simple deployment (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.