Anda di halaman 1dari 12

Electronic mail (email or e-mail) is a method of exchanging messages ("mail")

between people using electronic devices. Email first entered limited use in the
1960s and by the mid-1970s had taken the form now recognized as email. Email
operates across computer networks, which today is primarily the Internet. Some
early email systems required the author and the recipient to both be online at the
same time, in common with instant messaging. Today's email systems are based
on a store-and-forward model. Email servers accept, forward, deliver, and store
messages. Neither the users nor their computers are required to be online
simultaneously; they need to connect only briefly, typically to a mail server or
a webmail interface, for as long as it takes to send or receive messages.b

Types[edit]
Web-based email[edit]
Main article: Webmail
Many email providers have a web-based email client (e.g. AOL
Mail, Gmail, Outlook.com, Hotmail and Yahoo! Mail). This allows users to log into the
email account by using any compatible web browser to send and receive their email.
Mail is typically not downloaded to the client, so can't be read without a current
Internet connection.
POP3 email services[edit]
The Post Office Protocol 3 (POP3) is a mail access protocol used by a client
application to read messages from the mail server. Received messages are often
deleted from the server. POP supports simple download-and-delete requirements for
access to remote mailboxes (termed maildrop in the POP RFC's).[59]
IMAP email servers[edit]
The Internet Message Access Protocol (IMAP) provides features to manage a
mailbox from multiple devices. Small portable devices like smartphones are
increasingly used to check email while travelling, and to make brief replies, larger
devices with better keyboard access being used to reply at greater length. IMAP
shows the headers of messages, the sender and the subject and the device needs to
request to download specific messages. Usually mail is left in folders in the mail
server.
MAPI email servers[edit]
Messaging Application Programming Interface (MAPI) is used by Microsoft
Outlook to communicate to Microsoft Exchange Server - and to a range of other
email server products such as Axigen Mail Server, Kerio
Connect, Scalix, Zimbra, HP OpenMail, IBM Lotus Notes, Zarafa, and Bynari where
vendors have added MAPI support to allow their products to be accessed directly via
Outlook.

Procedure

Follow these step-by-step instructions to email a document

Step 1: Log in to your email account so that you are on the dashboard (front page)
of your mail account.

Step 2: Click Compose. Alternatively, you can reply to an email that you’ve received
by double-clicking on it in your list of received emails, then following the same steps.

Step 3: Once your new email is open, type your recipient’s email address in the ‘To’
field. Then put a title for your email in the ‘Subject’ box and type your message.

Step 4: Click on the paper clip icon at the bottom of the compose window.

Step 5: Browse through your Windows folders until you reach the document you
want to attach to your email. Highlight this by clicking on it and then clickOpen. This
will add the document as an attachment to your email.

Step 6: You can tell that your document has been attached to you email by its file
name appearing in blue text at the bottom of the compose window.

Step 7: If you want to attach another document, click the paperclip icon again and
repeat steps 4 and 5.
Step 8: When you’re ready to send your email, click Send.

Basic structure of an HTML document


An HTML document has two* main parts:
1. head. The head element contains title and meta data of a web document.
2. body. The body element contains the information that you want to display on a
web page.
* To make your web pages compatible with HTML 4, you need to add a document
type declaration (DTD) before the HTML element. Many web authoring software add
DTD and basic tags automatically when you create a new web page.
In a web page, the first tag (specifically, <html>) indicates the markup language that
is being used for the document. The <head> tag contains information about the web
page. Lastly, the content appears in the <body> tag. The following illustration
provides a summary.
Summary of Basic HTML Tags

HTML Tags
The most important characters in HTML are:
1 -- angle brackets (< >), which enclose HTML codes, and
2 -- the forward slash (/), which is used to "close" HTML expressions
HTML tags enclose the elements or sections of the web page they're intended to
affect. Tags are differentiated -- and hidden -- from the content of the web page by
the presence of angle brackets, i.e., < >. If I wanted to bold the word HTML in code it
would look like <b>HTML</b>, or<strong>HTML</strong>
Note that tags affecting a section of the text must be closed. This means adding a
forward slash (/) before the tag is repeated at the end of the section, e.g., </p>
Document Structure Tags

Document Structure Tags


Web pages have two basic containers: the head and the body:
 the <head> tag, which contains information, or metadata, about the web
page, such as a title for the page, javascripts, styles (CSS), meta information,
and more. Whatever is inside the <head> tag does not display on the web
page itself.
 the <body> tag, containing the content that actually displays in a browser
For example:
[COPY THE CODE BELOW AND PASTE IT INTO A PLAIN-TEXT EDITOR]
<html>
<head>
<title> The title of your Web page goes here</title>
</head>
<body>
The text and images on your Web page go here
</body>
</html>
[END COPY]
Page Structure Tags
<p>...</p> paragraph: starts a new line with an empty line inserted
<br /> line break: starts a new line with no extra line inserted; a "self-closing"
tag
Also (for use with CSS, or cascading stylesheets):
<div>...</div> division: enables you do designate sections of text for styling;
will insert an extra line
<span>...</span> span: enables you to designate sections of text for styling
without inserting any extra space.

Alignment
<center>...</center> centers text and images
<blockquote>...</blockquote> indents text from the left margin

Headings
If you want to divide your web page into clearly labeled sections, you might use a
heading tag (e.g., <h1>, <h2>, etc.) By default, heading tags bold the text, begin on
a new line and leave a space above and below. The headings on this page are
<h3>.
For example: <h1>h1 size heading</h1> =
h1 size heading
h2 size heading
Headings 3 through 5 grow proportionally smaller, until:
h6, which is the smallest heading

Horizontal Rule
You can also separate sections with a horizontal line, as you see above, by using
the <hr /> tag.
Because nothing is contained within it, <hr /> is a self-closing tag. Best practice is
to include the forward slash after the "hr," but most web browsers will display
normally if you forget.

Commenting
Sometimes you may need to add comments within the html -- notes to yourself or
to another person who manages the web site -- that should not be publicly
displayed. Comments can be inserted as shown here:
<!-- Here is where the project description begins -->
Begin with a left angle bracket, followed by an exclamation point and two dashes.
Enter the note, then close with two dashes and a right angle bracket.

Preformatted Text
To insert preformatted text -- from, for example, a Word document -- into a web
page, use the <pre>...</pre> tag.
This will preserve the spacing, tabbing, etc. of the text, BUT will by default display in
the Courier font face:

Encryption is the process of using an algorithm to transform information to make it


unreadable for unauthorized users. This cryptographic method protects sensitive
data such as credit card numbers by encoding and transforming information into
unreadable cipher text. This encoded data may only be decrypted or made
readable with a key. Symmetric-key and asymmetric-key are the two primary
types of encryption.

Encryption is essential for ensured and trusted delivery of sensitive information.

1. VeraCrypt
Free encryption for everyone
Platforms: Windows, macOS, Linux | Resources covered: Encryption and brute-
force attack protection | Cloud-based: No | Integrations: No | Free trial: N/A
Basic version is completely free
Provides effective encryption
Selective approach
Initial download is a bit confusing
VeraCrypt is one of the most popular security tools, providing you with enterprise-
grade encryption for important data.
The system is quite easy to use, and all it really does is add encrypted passwords to
your data and partitions. All you have to do is give the tool a few details about your
data, such as volume size, location and specified hashing algorithms – and then the
program does its thing.
What’s also nifty about VeraCrypt is that it’s immune to brute-force attacks, so you
never have to worry about hackers decrypting your passwords and other sensitive
data. The basic version of the software is completely free, as well.
2. AxCrypt
Encryption for small teams and individuals
Platforms: Windows, macOS | Resources covered: Encryption, password
protection, mobile apps | Cloud-based: Yes | Integrations: Google Docs, Dropbox
| Free trial: 30 days (fully free version also available)
Strong encryption for personal use
Free version available
Mainly mobile-oriented
While free software can be convenient for some, it’s not always as powerful as
premium offerings, and AxCrypt is a good bet if you want something reliable. The
software has been designed specifically for individuals and small teams within
businesses.
It provides strong security, with files protected by either 128-bit or 256-bit AES
encryption, which should thwart any intruders. There are also cloud storage
capabilities thrown into the mix – the software will automatically protect files saved
on services such as Google Drive and Dropbox.
AxCrypt is fully multilingual, and it can work with languages such as Dutch, French,
German, Italian, Korean, Spanish, Swedish, Russian and Portuguese – with more
support planned for the future. As well as this, there’s passport management, and
you can access your encrypted files through a smartphone app.
The Premium package is $27 per year (roughly £20, AU$34), while there is a free
version which has much fewer options.

3. Folder Lock
Effective encryption for individuals
Platforms: Windows, Android, iOS | Resources covered: Encryption, password
protection, brute-force attack prevention | Cloud-based: Yes |Integrations: No
| Free trial: N/A
Free to download basic version
Effective personal encryption
Mainly mobile oriented
Although it’s important to protect assets on company computers, it’s also crucial to
add protection to any device that stores critical data. For instance, most employees
have access to their company emails and other accounts on their smartphones, and
they need to be protected.
Folder Lock is a good option when it comes to adding encryption to your mobile
devices. The app can protect your personal files, photos, videos, contacts, wallet
cards, notes and audio recordings stored in your handset.
There are some other hidden security features, too. Not only is there encryption, but
you can also set a decoy password, hacker deterrents, log unauthorised login
attempts, back up all your passwords and get notified on potential brute-force
attacks. The basic app is free to download, with a pro version available if you want
more.

4. CryptoExpert 8
Powerful protection indeed
Platforms: Windows | Resources covered: Encryption, password protection, brute-
force attack prevention | Cloud-based: No | Integrations: No | Free trial: 30 days
Uses multiple encryption methods
Powerful encryption
It may be too complicated for some
Windows-only
CryptoExpert is Windows desktop software which offers secure data vaults for all
your data, ensuring it’s always protected from potential breaches.
Advertisement
It provides more powerful encryption than some of the other tools and apps listed in
this article, boasting fast on-the-fly operation. The system can back up a range of
different files, including certificates, Word, Excel and PowerPoint files, multimedia
files and email databases.
The best thing about CryptoExpert 8 is that it can secure vaults of unlimited size, and
it uses Blowfish, Cast, 3DES and AES-256 encryption algorithms. The latter are
highly effective and industry-acclaimed. It’ll work with 32-bit and 64-bit versions of
Windows 7, 8 and 10.

5. CertainSafe
A quality cloud-based solution
Platforms: Desktop | Resources covered: Encryption, password protection, brute-
force attack prevention, secure file storage | Cloud-based: Yes |Integrations: No
| Free trial: 30 days
Completely cloud-based
Affordable monthly plan
Not everyone wants cloud-based security
CertainSafe is highly effective cloud-based encryption software which attempts to
mitigate all aspects of risk and is compliant with industry regulations.
With the platform, you can store and share documents, private messages, photos,
videos and other files without exposing them to third-party sources. You can even
collaborate and communicate with colleagues through the system, with all
correspondence encrypted.
CertainSafe also adds automated security for business databases and applications,
meaning you don’t always have to do things manually. You can subscribe for a
monthly plan, but before making any decisions, there’s the option to get a free trial
and try things out that way.
Network security is an organization’s strategy and provisions for ensuring the
security of its assets and all network traffic. Network security is manifested in an
implementation of security hardware andsoftware. For the purposes of this
discussion, the following approach is adopted in an effort to view network security
in its entirety.

Policy
The IT Security Policy is the principle document for network security. Its goal is to
outline rules for ensuring the security of organizational assets. Employees today
often utilize several tools and applications to conduct business productively.
Policy driven from the organization’s culture supports these routines and focuses
on safely enabling these tools for employees. Enforcement and auditing
procedures for any regulatory compliance to which an organization is subject
must be mapped out in the policy as well.

Hacking tools here means the tools or the software used to gather information of
network or website. These tools could also be used by most of the hackers. There
are a number of tools for different purposes. The tools listed here widely used.
Moreover make sure you have the permission to run these tools otherwise it is
illegal.
1. Nmap (Network Mapper): To explore the networks Nmap is mostly used tool.
Nmap is a free and also an open source tool. Security auditing could be easy with
the use of this tool. Rapidly scanning of network is its major task. With the use of IP
packets it determines what type of hosts are present in a network along with
information on the applications being used by them. Nmap also gives information
about the operating systems used by the networks. It is helpful to identify the
firewalls in a network and many more other characteristics of any given host.
2. Wireshark: Wireshark is a packet analyzer. It is a free and also an open-source.
A network engineer use wireshark for troubleshooting, network analysis, education,
software and communication protocol development. It’s original named was Ethereal,
but in May 2006 the project was renamed with a new name Wireshark. It happens
only due to trademark issue.
3. Nessus: Nessus Remote Security Scanner has become closed source software in
the year 2005, but the engine that runs the software is still free of cost. 75000
organizations world-wide are using the Nessus Security Scanner. So Nessus has
been become the world’s most popular scanner. Many have befitted from this
software and it is being used extensively in auditing critical enterprise devices.
4. Kismet: For 802.11 wireless LANs, Kismet works as network detector, packet
sniffer, and intrusion detection system. It is also compatible with all the wireless
cards, which supports raw monitoring mode, and can sniff 802.11a, 802.11b,
802.11g, and 802.11n traffic. This is available for Linux, FreeBSD, NetBSD,
OpenBSD, and Mac OS X. Kismet is also available for Microsoft Windows in GUI
version. Aside from all external drones, Kismet is only supported wireless hardware
available as packet source.
5. LCP: In Windows NT/2000/XP/2003, LCP could be used for user account
passwords auditing and recovery, Brute force session distribution, Hashes
computing and Passwords recovery. It is very good free alternative to L0phtcrack.

6. Yersinia: In different Layer 2 protocols there are some weaknesses. So this


network tool has been designed to take advantage of these weaknesses. It acts like
a solid framework for analyzing and testing the deployed networks and systems, but
in actual it is not a framework. Currently, the following network protocols are
implemented: IEEE 802.1q, Spanning Tree Protocol (STP), Dynamic Host
Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP), Dynamic Trunking Protocol
(DTP), Cisco Discovery Protocol (CDP).
7. Nikto: It is an Open Source (GPL) web server scanner which performs
comprehensive tests against web servers for multiple items, including over 3200
potentially dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. The plugins used by it needs to be update at proper
timess and it could be updated automatically.
8. SuperScan: SuperScan is a very powerful tool which works as connect-based
TCP port scanner, pinger and hostname resolver. This program is extremely fast and
versatile due to multithreaded and asynchronous techniques which developers used
to make it. For network administrators, this is first and foremost tool. Do not scan
those systems which are not under your control. It will be illegal. To use this program
against computers on the Internet that you have no right to scan since you are highly
likely to be tracked down and attract the attention of your ISP, possibly resulting in
your account being terminated.
9. John the Ripper: John the Ripper is a fast password cracker, currently available
for many flavours of Unix, DOS, Win32, BeOS, and OpenVMS. The weak passwords
of any operating system could be crack by using it. Besides several crypt password
hash types most commonly found on various Unix flavours, supported out of the box
are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more
with contributed patches.
10. Cain and Abel: In Microsoft Operating Systems Cain and Abel works as a
password recovery tool. With the help of decoding scrambled passwords, recording
VoIP conversations, sniffing the network, cracking encrypted passwords using
Dictionary, Brute-Force and Cryptanalysis attacks, uncovering cached passwords,
recovering wireless network keys, revealing password boxes, and analyzing routing
protocols, it allows easy recovery of various type of passwords.

Anda mungkin juga menyukai