Security Guideline
Handling Email Storm generated from Worms with Spoofed Sender
Description Latest computer viruses employed email harvesting techniques to get email addresses from the victim's hard disk, and insert these email addresses in both the sender and recipient fields of the infected email and it is therefore difficult to trace the origin of the sender...
Release Date: 29 Jan 2004
6342 Views
Guideline for Pretty Good Privacy
Introduction To protect your electronic mail and files stored on your hard-drive, Pretty Good Privacy (PGP) program is one of the choices for encryption. PGP can encrypt files and email. It uses digital signatures and certified keys in the encryption. History PGP...
Release Date: 1 Nov 2001
6130 Views