Your SlideShare is downloading. ×
Secure mail server
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Secure mail server

300

Published on

how to make mail servers with help of redhat servers.

how to make mail servers with help of redhat servers.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
300
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
52
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. By- Richa Gulati Roll No.-08EMTCS092 Secure Mail Server
  • 2. • An application that Sends & receives incoming E- mail from Internet users. • Location is not Fixed. • Why it so Popular in Internet world? 1 . Very Fast 2. Keep The Data 3. Very Cheap 4. Able to send Attachment such as Audio and Video File What is Mail Server?
  • 3. Structure of Mail Server • System uses following protocols for sending e-mail: 1. SMTP -Simple Mail Transfer Protocol 2. ESMTP -extended SMTP • And uses following protocols for receiving e-mail: 1. POP3(Post Office Protocol 3) 2. IMAP(Internet Message Access Protocol) for receiving e-mail.
  • 4. Working of Mail Server
  • 5. Security Problems • Some Other Person can Use your account by Hacking. • You may login to fake Web-site Eg. https://www.citybankindia.com • Path Hacking may be possible • Hacker may get access your user name & password via path Hacking.
  • 6. Reasons Behind Security Problem • If the connection to your Webmail server is “insecure” (i.e. the address is http:// and NOT https://). • SMTP: Does not use TLS in SMTP.
  • 7. Role of POP & IMAP • POP and IMAP: The POP and IMAP protocols require that you send your username and password to login; these credentials are not encrypted. So, your messages and credentials can be read by any eavesdropper listening to the flow of information between your personal computer and your email service provider’s computer.
  • 8. Solutions to problem 1. Symmetric Encryption In symmetric encryption, you and your friend share a “secret” key. Using this key, you can encrypt a message into “cyphertext”.
  • 9. In asymmetric key encryption • In asymmetric key encryption, the two keys that each person possesses are commonly named the “private” and “public” key.
  • 10. Securing Your Email With SSL or TLSSSL is a combination of asymmetric and symmetric key encryption mechanisms.
  • 11. What is spam? • flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get- rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender • Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses. • In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.
  • 12. Span Filters
  • 13. Filtering by header
  • 14. Filtering by body content
  • 15. Filtering by attachment
  • 16. How to make digital certificate
  • 17. THANKYOU!!!
  • 18. QUERIES???
  • 19. Print master • Your Text here • Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. • Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.

×