between people using electronic devices. Email first entered limited use in the
1960s and by the mid-1970s had taken the form now recognized as email. Email
operates across computer networks, which today is primarily the Internet. Some
early email systems required the author and the recipient to both be online at the
same time, in common with instant messaging. Today's email systems are based
on a store-and-forward model. Email servers accept, forward, deliver, and store
messages. Neither the users nor their computers are required to be online
simultaneously; they need to connect only briefly, typically to a mail server or
a webmail interface, for as long as it takes to send or receive messages.b
Types[edit]
Web-based email[edit]
Main article: Webmail
Many email providers have a web-based email client (e.g. AOL
Mail, Gmail, Outlook.com, Hotmail and Yahoo! Mail). This allows users to log into the
email account by using any compatible web browser to send and receive their email.
Mail is typically not downloaded to the client, so can't be read without a current
Internet connection.
POP3 email services[edit]
The Post Office Protocol 3 (POP3) is a mail access protocol used by a client
application to read messages from the mail server. Received messages are often
deleted from the server. POP supports simple download-and-delete requirements for
access to remote mailboxes (termed maildrop in the POP RFC's).[59]
IMAP email servers[edit]
The Internet Message Access Protocol (IMAP) provides features to manage a
mailbox from multiple devices. Small portable devices like smartphones are
increasingly used to check email while travelling, and to make brief replies, larger
devices with better keyboard access being used to reply at greater length. IMAP
shows the headers of messages, the sender and the subject and the device needs to
request to download specific messages. Usually mail is left in folders in the mail
server.
MAPI email servers[edit]
Messaging Application Programming Interface (MAPI) is used by Microsoft
Outlook to communicate to Microsoft Exchange Server - and to a range of other
email server products such as Axigen Mail Server, Kerio
Connect, Scalix, Zimbra, HP OpenMail, IBM Lotus Notes, Zarafa, and Bynari where
vendors have added MAPI support to allow their products to be accessed directly via
Outlook.
Procedure
Step 1: Log in to your email account so that you are on the dashboard (front page)
of your mail account.
Step 2: Click Compose. Alternatively, you can reply to an email that you’ve received
by double-clicking on it in your list of received emails, then following the same steps.
Step 3: Once your new email is open, type your recipient’s email address in the ‘To’
field. Then put a title for your email in the ‘Subject’ box and type your message.
Step 4: Click on the paper clip icon at the bottom of the compose window.
Step 5: Browse through your Windows folders until you reach the document you
want to attach to your email. Highlight this by clicking on it and then clickOpen. This
will add the document as an attachment to your email.
Step 6: You can tell that your document has been attached to you email by its file
name appearing in blue text at the bottom of the compose window.
Step 7: If you want to attach another document, click the paperclip icon again and
repeat steps 4 and 5.
Step 8: When you’re ready to send your email, click Send.
HTML Tags
The most important characters in HTML are:
1 -- angle brackets (< >), which enclose HTML codes, and
2 -- the forward slash (/), which is used to "close" HTML expressions
HTML tags enclose the elements or sections of the web page they're intended to
affect. Tags are differentiated -- and hidden -- from the content of the web page by
the presence of angle brackets, i.e., < >. If I wanted to bold the word HTML in code it
would look like <b>HTML</b>, or<strong>HTML</strong>
Note that tags affecting a section of the text must be closed. This means adding a
forward slash (/) before the tag is repeated at the end of the section, e.g., </p>
Document Structure Tags
Alignment
<center>...</center> centers text and images
<blockquote>...</blockquote> indents text from the left margin
Headings
If you want to divide your web page into clearly labeled sections, you might use a
heading tag (e.g., <h1>, <h2>, etc.) By default, heading tags bold the text, begin on
a new line and leave a space above and below. The headings on this page are
<h3>.
For example: <h1>h1 size heading</h1> =
h1 size heading
h2 size heading
Headings 3 through 5 grow proportionally smaller, until:
h6, which is the smallest heading
Horizontal Rule
You can also separate sections with a horizontal line, as you see above, by using
the <hr /> tag.
Because nothing is contained within it, <hr /> is a self-closing tag. Best practice is
to include the forward slash after the "hr," but most web browsers will display
normally if you forget.
Commenting
Sometimes you may need to add comments within the html -- notes to yourself or
to another person who manages the web site -- that should not be publicly
displayed. Comments can be inserted as shown here:
<!-- Here is where the project description begins -->
Begin with a left angle bracket, followed by an exclamation point and two dashes.
Enter the note, then close with two dashes and a right angle bracket.
Preformatted Text
To insert preformatted text -- from, for example, a Word document -- into a web
page, use the <pre>...</pre> tag.
This will preserve the spacing, tabbing, etc. of the text, BUT will by default display in
the Courier font face:
1. VeraCrypt
Free encryption for everyone
Platforms: Windows, macOS, Linux | Resources covered: Encryption and brute-
force attack protection | Cloud-based: No | Integrations: No | Free trial: N/A
Basic version is completely free
Provides effective encryption
Selective approach
Initial download is a bit confusing
VeraCrypt is one of the most popular security tools, providing you with enterprise-
grade encryption for important data.
The system is quite easy to use, and all it really does is add encrypted passwords to
your data and partitions. All you have to do is give the tool a few details about your
data, such as volume size, location and specified hashing algorithms – and then the
program does its thing.
What’s also nifty about VeraCrypt is that it’s immune to brute-force attacks, so you
never have to worry about hackers decrypting your passwords and other sensitive
data. The basic version of the software is completely free, as well.
2. AxCrypt
Encryption for small teams and individuals
Platforms: Windows, macOS | Resources covered: Encryption, password
protection, mobile apps | Cloud-based: Yes | Integrations: Google Docs, Dropbox
| Free trial: 30 days (fully free version also available)
Strong encryption for personal use
Free version available
Mainly mobile-oriented
While free software can be convenient for some, it’s not always as powerful as
premium offerings, and AxCrypt is a good bet if you want something reliable. The
software has been designed specifically for individuals and small teams within
businesses.
It provides strong security, with files protected by either 128-bit or 256-bit AES
encryption, which should thwart any intruders. There are also cloud storage
capabilities thrown into the mix – the software will automatically protect files saved
on services such as Google Drive and Dropbox.
AxCrypt is fully multilingual, and it can work with languages such as Dutch, French,
German, Italian, Korean, Spanish, Swedish, Russian and Portuguese – with more
support planned for the future. As well as this, there’s passport management, and
you can access your encrypted files through a smartphone app.
The Premium package is $27 per year (roughly £20, AU$34), while there is a free
version which has much fewer options.
3. Folder Lock
Effective encryption for individuals
Platforms: Windows, Android, iOS | Resources covered: Encryption, password
protection, brute-force attack prevention | Cloud-based: Yes |Integrations: No
| Free trial: N/A
Free to download basic version
Effective personal encryption
Mainly mobile oriented
Although it’s important to protect assets on company computers, it’s also crucial to
add protection to any device that stores critical data. For instance, most employees
have access to their company emails and other accounts on their smartphones, and
they need to be protected.
Folder Lock is a good option when it comes to adding encryption to your mobile
devices. The app can protect your personal files, photos, videos, contacts, wallet
cards, notes and audio recordings stored in your handset.
There are some other hidden security features, too. Not only is there encryption, but
you can also set a decoy password, hacker deterrents, log unauthorised login
attempts, back up all your passwords and get notified on potential brute-force
attacks. The basic app is free to download, with a pro version available if you want
more.
4. CryptoExpert 8
Powerful protection indeed
Platforms: Windows | Resources covered: Encryption, password protection, brute-
force attack prevention | Cloud-based: No | Integrations: No | Free trial: 30 days
Uses multiple encryption methods
Powerful encryption
It may be too complicated for some
Windows-only
CryptoExpert is Windows desktop software which offers secure data vaults for all
your data, ensuring it’s always protected from potential breaches.
Advertisement
It provides more powerful encryption than some of the other tools and apps listed in
this article, boasting fast on-the-fly operation. The system can back up a range of
different files, including certificates, Word, Excel and PowerPoint files, multimedia
files and email databases.
The best thing about CryptoExpert 8 is that it can secure vaults of unlimited size, and
it uses Blowfish, Cast, 3DES and AES-256 encryption algorithms. The latter are
highly effective and industry-acclaimed. It’ll work with 32-bit and 64-bit versions of
Windows 7, 8 and 10.
5. CertainSafe
A quality cloud-based solution
Platforms: Desktop | Resources covered: Encryption, password protection, brute-
force attack prevention, secure file storage | Cloud-based: Yes |Integrations: No
| Free trial: 30 days
Completely cloud-based
Affordable monthly plan
Not everyone wants cloud-based security
CertainSafe is highly effective cloud-based encryption software which attempts to
mitigate all aspects of risk and is compliant with industry regulations.
With the platform, you can store and share documents, private messages, photos,
videos and other files without exposing them to third-party sources. You can even
collaborate and communicate with colleagues through the system, with all
correspondence encrypted.
CertainSafe also adds automated security for business databases and applications,
meaning you don’t always have to do things manually. You can subscribe for a
monthly plan, but before making any decisions, there’s the option to get a free trial
and try things out that way.
Network security is an organization’s strategy and provisions for ensuring the
security of its assets and all network traffic. Network security is manifested in an
implementation of security hardware andsoftware. For the purposes of this
discussion, the following approach is adopted in an effort to view network security
in its entirety.
Policy
The IT Security Policy is the principle document for network security. Its goal is to
outline rules for ensuring the security of organizational assets. Employees today
often utilize several tools and applications to conduct business productively.
Policy driven from the organization’s culture supports these routines and focuses
on safely enabling these tools for employees. Enforcement and auditing
procedures for any regulatory compliance to which an organization is subject
must be mapped out in the policy as well.
Hacking tools here means the tools or the software used to gather information of
network or website. These tools could also be used by most of the hackers. There
are a number of tools for different purposes. The tools listed here widely used.
Moreover make sure you have the permission to run these tools otherwise it is
illegal.
1. Nmap (Network Mapper): To explore the networks Nmap is mostly used tool.
Nmap is a free and also an open source tool. Security auditing could be easy with
the use of this tool. Rapidly scanning of network is its major task. With the use of IP
packets it determines what type of hosts are present in a network along with
information on the applications being used by them. Nmap also gives information
about the operating systems used by the networks. It is helpful to identify the
firewalls in a network and many more other characteristics of any given host.
2. Wireshark: Wireshark is a packet analyzer. It is a free and also an open-source.
A network engineer use wireshark for troubleshooting, network analysis, education,
software and communication protocol development. It’s original named was Ethereal,
but in May 2006 the project was renamed with a new name Wireshark. It happens
only due to trademark issue.
3. Nessus: Nessus Remote Security Scanner has become closed source software in
the year 2005, but the engine that runs the software is still free of cost. 75000
organizations world-wide are using the Nessus Security Scanner. So Nessus has
been become the world’s most popular scanner. Many have befitted from this
software and it is being used extensively in auditing critical enterprise devices.
4. Kismet: For 802.11 wireless LANs, Kismet works as network detector, packet
sniffer, and intrusion detection system. It is also compatible with all the wireless
cards, which supports raw monitoring mode, and can sniff 802.11a, 802.11b,
802.11g, and 802.11n traffic. This is available for Linux, FreeBSD, NetBSD,
OpenBSD, and Mac OS X. Kismet is also available for Microsoft Windows in GUI
version. Aside from all external drones, Kismet is only supported wireless hardware
available as packet source.
5. LCP: In Windows NT/2000/XP/2003, LCP could be used for user account
passwords auditing and recovery, Brute force session distribution, Hashes
computing and Passwords recovery. It is very good free alternative to L0phtcrack.