<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?action=history&amp;feed=atom&amp;title=Email_Security</id>
		<title>Email Security - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?action=history&amp;feed=atom&amp;title=Email_Security"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;action=history"/>
		<updated>2026-04-06T23:23:56Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6135&amp;oldid=prev</id>
		<title>Shamsh at 00:46, 13 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6135&amp;oldid=prev"/>
				<updated>2009-04-13T00:46:13Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 00:46, 13 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.itsecurity.com/features/email-security-for-dummies/ Email Security] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;is to ensure &lt;/del&gt;that no unauthorized person has access to &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;email account, the sender of &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;email is known and &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;email can be sent and received. Email Security is needed to protect the computer from threats and to ensure that no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if someone unintentionally end up sending a malware within &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.itsecurity.com/features/email-security-for-dummies/ Email Security] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;ensures &lt;/ins&gt;that no unauthorized person has access to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an &lt;/ins&gt;email account, the sender of &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an &lt;/ins&gt;email is known and email can be sent and received. Email Security is needed to protect the computer from threats and to ensure that no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if someone unintentionally end up sending a malware within &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an &lt;/ins&gt;email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 81:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 81:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.somewhatfrank.com/2005/10/email_managemen.html Email Management]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.somewhatfrank.com/2005/10/email_managemen.html Email Management]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;12&lt;/del&gt;:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;20&lt;/del&gt;, 12 April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;08&lt;/ins&gt;:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;45&lt;/ins&gt;, 12 April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6134&amp;oldid=prev</id>
		<title>Shamsh at 16:21, 12 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6134&amp;oldid=prev"/>
				<updated>2009-04-12T16:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 16:21, 12 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 45:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 45:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Image:manage_email.jpg|100px|right]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one [http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/ email account]. The email users must have at least three email accounts, one for work, one should be for personal use and the third one for general purposes which can be used to sign up for newsletters etc. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one [http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/ email account]. The email users must have at least three email accounts, one for work, one should be for personal use and the third one for general purposes which can be used to sign up for newsletters etc. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that the email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, if the browser window is not closed, after logging out of email, it might still be displaying the email address but not the password, which is not good for the email security. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that the email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, if the browser window is not closed, after logging out of email, it might still be displaying the email address but not the password, which is not good for the email security. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 73:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 76:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.itsecurity.com/features/99-email-security-tips-112006/ Email: 99 Tips to Make you More Secure and Productive]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.itsecurity.com/features/99-email-security-tips-112006/ Email: 99 Tips to Make you More Secure and Productive]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;pcit&lt;/del&gt;.com&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;/computer_security/e-mail_security&lt;/del&gt;/ Secure Email, Spam Blokcer, Anti-Spam, Spam Filter]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;messagedefence&lt;/ins&gt;.com/ Secure Email, Spam Blokcer, Anti-Spam, Spam Filter]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;pcit&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;com&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;computer_security&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;e-mail_security&lt;/del&gt;/ Malware Host]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;homotron&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;net&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2008&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;07&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;blogspot_number_one_malware_ho.html &lt;/ins&gt;Malware Host]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;www&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;pcit&lt;/del&gt;.com/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;computer_security/e-mail_security/ &lt;/del&gt;How Phishing Works]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;computer&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;howstuffworks&lt;/ins&gt;.com/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;phishing.htm &lt;/ins&gt;How Phishing Works&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*[http://www.somewhatfrank.com/2005/10/email_managemen.html Email Management&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;10&lt;/del&gt;:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;50&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;11 &lt;/del&gt;April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;12&lt;/ins&gt;:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;20&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;12 &lt;/ins&gt;April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6133&amp;oldid=prev</id>
		<title>Shamsh at 16:12, 12 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6133&amp;oldid=prev"/>
				<updated>2009-04-12T16:12:44Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 16:12, 12 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 22:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 22:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Image:ill_malware_400.jpg|100px|right]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without owner's knowledge. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without owner's knowledge. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 30:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 33:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted behaviour of a computer system &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted behaviour of a computer system &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[[Image:phishing-1.jpg|100px|right]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing === &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;nbsp; &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Phishing is a method to steal personal information like passwords, credit card details, and bank account numbers etc. The most common way of stealing personal information is a link sent through an email which directs the user to a fake website, that site ask the user to enter the personal information. This kind of website is only set up to steal the user's information. To avoid phishing attacks, be careful while entering personal information over the internet &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Phishing is a method to steal personal information like passwords, credit card details, and bank account numbers etc. The most common way of stealing personal information is a link sent through an email which directs the user to a fake website, that site ask the user to enter the personal information. This kind of website is only set up to steal the user's information. To avoid phishing attacks, be careful while entering personal information over the internet &amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Image:spam_stops_here.jpg|70px|right]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses, mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses, mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6132&amp;oldid=prev</id>
		<title>Shamsh at 15:55, 12 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6132&amp;oldid=prev"/>
				<updated>2009-04-12T15:55:11Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 15:55, 12 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an [http://www.softheap.com/emlsec.html email&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;] &lt;/del&gt;message, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the administrator, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an [http://www.softheap.com/emlsec.html email message&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the administrator, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure [http://www.itsecurity.com/features/99-email-security-tips-112006/ privacy]. Also do not use the personal email to send any information/data regarding the company. Always use company’s email for this purpose, so that company's security is not at risk. Do not give company's email account to everyone, only company's employees and close family members should know that email address. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure [http://www.itsecurity.com/features/99-email-security-tips-112006/ privacy]. Also do not use the personal email to send any information/data regarding the company. Always use company’s email for this purpose, so that company's security is not at risk. Do not give company's email account to everyone, only company's employees and close family members should know that email address. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 65:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 65:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.itsecurity.com/features/99-email-security-tips-112006/ Email: 99 Tips to Make you More Secure and Productive]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.itsecurity.com/features/99-email-security-tips-112006/ Email: 99 Tips to Make you More Secure and Productive]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Secure Email, Spam Blokcer, Anti-Spam, Spam Filter]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Malware Host]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.pcit.com/computer_security/e-mail_security/ How Phishing Works]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] 10:50, 11 April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] 10:50, 11 April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6131&amp;oldid=prev</id>
		<title>Shamsh at 03:00, 12 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6131&amp;oldid=prev"/>
				<updated>2009-04-12T03:00:33Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 03:00, 12 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 66:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 66:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;3&lt;/del&gt;:&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;08&lt;/del&gt;, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;10 &lt;/del&gt;April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;--[[User:Shamsh|Shamsh]] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;10&lt;/ins&gt;:&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;50&lt;/ins&gt;, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;11 &lt;/ins&gt;April 2009 (EDT)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6130&amp;oldid=prev</id>
		<title>Shamsh at 02:58, 12 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6130&amp;oldid=prev"/>
				<updated>2009-04-12T02:58:54Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 02:58, 12 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Email Security is to ensure that no unauthorized person has access to the email account, the sender of the email is known and the email can be sent and received. Email Security is needed to protect the computer from threats and to ensure that no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if someone unintentionally end up sending a malware within the email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://www.itsecurity.com/features/email-security-for-dummies/ &lt;/ins&gt;Email Security&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;] &lt;/ins&gt;is to ensure that no unauthorized person has access to the email account, the sender of the email is known and the email can be sent and received. Email Security is needed to protect the computer from threats and to ensure that no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if someone unintentionally end up sending a malware within the email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an email message, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the administrator, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://www.softheap.com/emlsec.html &lt;/ins&gt;email&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;] &lt;/ins&gt;message, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the administrator, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure privacy. Also do not use the personal email to send any information/data regarding the company. Always use company’s email for this purpose, so that company's security is not at risk. Do not give company's email account to everyone, only company's employees and close family members should know that email address. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://www.itsecurity.com/features/99-email-security-tips-112006/ &lt;/ins&gt;privacy&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;. Also do not use the personal email to send any information/data regarding the company. Always use company’s email for this purpose, so that company's security is not at risk. Do not give company's email account to everyone, only company's employees and close family members should know that email address. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Avoid forwarding email messages. But if there is still a need to forward email, be careful while doing so. Before forwarding email to a list of friends, delete the previously listed emails to save bunch of email users from getting spammed.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Avoid forwarding email messages. But if there is still a need to forward email, be careful while doing so. Before forwarding email to a list of friends, delete the previously listed emails to save bunch of email users from getting spammed.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Be careful while writing and sending emails, the emails can reside in email box for years. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Be careful while writing and sending emails, the emails can reside in email box for years. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one email account. The email users must have at least three email accounts, one for work, one should be for personal use and the third one for general purposes which can be used to sign up for newsletters etc. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/ &lt;/ins&gt;email account&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;. The email users must have at least three email accounts, one for work, one should be for personal use and the third one for general purposes which can be used to sign up for newsletters etc. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that the email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, if the browser window is not closed, after logging out of email, it might still be displaying the email address but not the password, which is not good for the email security. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that the email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, if the browser window is not closed, after logging out of email, it might still be displaying the email address but not the password, which is not good for the email security. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If a public computer is used, always delete browser history to prevent the information to go in wrong hands, because most of the browsers keep track of all visited web pages, passwords and personal information.&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If a public computer is used, always delete browser history to prevent the information to go in wrong hands, because most of the browsers keep track of all visited web pages, passwords and personal information.&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6129&amp;oldid=prev</id>
		<title>Shamsh at 21:33, 10 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6129&amp;oldid=prev"/>
				<updated>2009-04-10T21:33:25Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 21:33, 10 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Email Security is to ensure that no unauthorized person has access to the email account, the sender of the email is known and the email can be sent and received. Email Security is needed to protect the computer from threats and to ensure no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if unintentionally end up sending a malware within the email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Email Security is to ensure that no unauthorized person has access to the email account, the sender of the email is known and the email can be sent and received. Email Security is needed to protect the computer from threats and to ensure &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;that &lt;/ins&gt;no hidden malware is sent or received within the email or attachment that can damage the computer system, data and records. On the other hand one can be held responsible for any damage to a third party, if &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;someone &lt;/ins&gt;unintentionally end up sending a malware within the email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;There are several things to keep in mind while sending and receiving emails.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an email message, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Administrator&lt;/del&gt;, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When someone sends an email message, it does not go directly to recipient mailbox. The Internet Service Provider stores the copies of all email messages on its mail server before it delivers them. All the information kept on the servers can be easily accessed by the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;administrator&lt;/ins&gt;, so try not to send private and important information through email or encrypt the message before sending the email.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*When an email is sent to a number of people, the recipients can see each other’s email addresses. It is a good practice to use Bcc (blind carbon copy) to enter email addresses of the recipients, so that email addresses do not appear in the message. The email addresses listed in To and CC fields appear in the email message and every recipient can see all To and Cc recipients, but cannot see Bcc recipients.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure privacy. Also do not use the personal email to send any information/data regarding the company&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, that way company’s security might be at risk&lt;/del&gt;. Always use company’s email for this purpose. Do not give company's email account to everyone, only company's employees and close family members should know that &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;account&lt;/del&gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try not to send personal messages from work or with the company account to ensure privacy. Also do not use the personal email to send any information/data regarding the company. Always use company’s email for this purpose&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, so that company's security is not at risk&lt;/ins&gt;. Do not give company's email account to everyone, only company's employees and close family members should know that &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;email address&lt;/ins&gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Avoid forwarding email messages&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, but still &lt;/del&gt;if there is a need to forward email be careful while doing so. Before forwarding email to list of friends delete the previously listed emails&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, that way &lt;/del&gt;bunch of email users &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;will be saved &lt;/del&gt;from getting spammed&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, in case a spammer gets hold of email addresses&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Avoid forwarding email messages&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. But &lt;/ins&gt;if there is &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;still &lt;/ins&gt;a need to forward email&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, &lt;/ins&gt;be careful while doing so. Before forwarding email to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;a &lt;/ins&gt;list of friends&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, &lt;/ins&gt;delete the previously listed emails &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;to save &lt;/ins&gt;bunch of email users from getting spammed.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Be careful while writing and sending emails, the emails can reside in email box for years. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Be careful while writing and sending emails, the emails can reside in email box for years. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If some unknown group is sending emails, do not try to unsubscribe &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;that way &lt;/del&gt;more emails &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;might &lt;/del&gt;be received from that group, instead add that email address to the block list.&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If some unknown group is sending emails, do not try to unsubscribe &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;because &lt;/ins&gt;more emails &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;may &lt;/ins&gt;be received from that group, instead add that email address to the block list.&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Install antivirus on computer and run it regularly&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, some &lt;/del&gt;viruses take addresses from the contact list and send spams to the addresses saved in contact list.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Install antivirus on computer and run it regularly&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. Some &lt;/ins&gt;viruses take addresses from the contact list and send spams to the addresses saved in contact list.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try to minimize the receipt of spams by setting the junk email filter and blocking unknown senders.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Try to minimize the receipt of spams by setting the junk email filter and blocking unknown senders.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 22:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 22:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the knowledge of the &lt;/del&gt;owner. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without owner&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;'s knowledge&lt;/ins&gt;. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Spyware ====&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Spyware ====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spyware is a software that is installed on the computer without &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/del&gt;knowledge of the owner, it monitors the user's activities. It collects personal information, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;like &lt;/del&gt;sites that a user has visited, personal data such as email address, password and credit card details&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, it &lt;/del&gt;can also change the computer settings. It uses the memory and system resources which results in slow performance of the computer system. The unwanted &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;behavior &lt;/del&gt;of the computer system, poor system performance and slow internet connection are the clear signs that &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;indicates that &lt;/del&gt;the computer is infected with a spyware&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. Spyware can be removed by running anti-spyware software on the infected computer &lt;/del&gt;&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spyware is a software that is installed on the computer without knowledge of the owner, it monitors the user's activities. It collects personal information, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;for example &lt;/ins&gt;sites that a user has visited, personal data such as email address, password and credit card details&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. It &lt;/ins&gt;can also change the computer settings. It uses the memory and system resources which results in slow performance of the computer system. The unwanted &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;behaviour &lt;/ins&gt;of the computer system, poor system performance and slow internet connection are the clear signs that &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;indicate &lt;/ins&gt;the computer is infected with a spyware &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Virus ====&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Virus ====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;behavior &lt;/del&gt;of a computer system&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. Viruses can be removed by running antivirus software on the infected computer &lt;/del&gt;&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;behaviour &lt;/ins&gt;of a computer system &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 34:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 34:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, &lt;/ins&gt;mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists &amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one email account&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, &lt;/del&gt;email &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;user &lt;/del&gt;must have at least three email accounts, one for work, one should be for personal use and the third one for general &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;purpose, that means that email &lt;/del&gt;can be used to sign up for newsletters etc&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;. and for other purposes&lt;/del&gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is not a good practice to use just one email account&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;. The &lt;/ins&gt;email &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;users &lt;/ins&gt;must have at least three email accounts, one for work, one should be for personal use and the third one for general &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;purposes which &lt;/ins&gt;can be used to sign up for newsletters etc. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;after logging out of the email account &lt;/del&gt;the browser window is not closed, it might still be displaying the email address but not the password, which is not good for the email security&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;, that way some unknown person will know the email address&lt;/del&gt;.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/ins&gt;email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;if &lt;/ins&gt;the browser window is not closed&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;, after logging out of email&lt;/ins&gt;, it might still be displaying the email address but not the password, which is not good for the email security. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If a public computer is used, always delete browser history to prevent &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;this &lt;/del&gt;information to go in wrong hands, because most of the browsers keep track of all visited web pages, passwords and personal information. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*If a public computer is used, always delete browser history to prevent &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;the &lt;/ins&gt;information to go in wrong hands, because most of the browsers keep track of all visited web pages, passwords and personal information. &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*While replying to email, be careful in using “Reply” vs “Reply all” button, so that only the right person receives the reply, unless one wants to send reply to all addresses.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*While replying to &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;an &lt;/ins&gt;email, be careful in using “Reply” vs “Reply all” button, so that only the right person receives the reply, unless one wants to send reply to all addresses.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is a good practice to back up your emails, by exporting emails to a folder and then burn a cd.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*It is a good practice to back up your emails, by exporting emails to a folder and then burn a cd.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Do not think that deleted email is gone forever. The deleted messages still exist in backup folders on remote servers and can be retrieved.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;*Do not think that deleted email is gone forever. The deleted messages still exist in backup folders on remote servers and can be retrieved.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6128&amp;oldid=prev</id>
		<title>Shamsh at 20:48, 10 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6128&amp;oldid=prev"/>
				<updated>2009-04-10T20:48:23Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 20:48, 10 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 19:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 19:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Email Security Threats ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Email Security Threats ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;The email may contain content that can affect the security and privacy. The most common threats to email security are discussed below.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;The email may contain content that can affect the security and privacy. The most common threats to email security are discussed below &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Malware ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without the knowledge of the owner. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Malware is short for &amp;quot;malicious software&amp;quot;, it is a software/program that can damage a computer system, server, or a computer network without the knowledge of the owner. Malware can affect the computer system by deleting or corrupting the data/files on the local disks. It includes viruses that can destroy the computer system, and spywares that can steal personal information &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Spyware ====&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Spyware ====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spyware is a software that is installed on the computer without the knowledge of the owner, it monitors the user's activities. It collects personal information, like sites that a user has visited, personal data such as email address, password and credit card details, it can also change the computer settings. It uses the memory and system resources which results in slow performance of the computer system. The unwanted behavior of the computer system, poor system performance and slow internet connection are the clear signs that indicates that the computer is infected with a spyware. Spyware can be removed by running anti-spyware software on the infected computer. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spyware is a software that is installed on the computer without the knowledge of the owner, it monitors the user's activities. It collects personal information, like sites that a user has visited, personal data such as email address, password and credit card details, it can also change the computer settings. It uses the memory and system resources which results in slow performance of the computer system. The unwanted behavior of the computer system, poor system performance and slow internet connection are the clear signs that indicates that the computer is infected with a spyware. Spyware can be removed by running anti-spyware software on the infected computer &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;/ins&gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Virus ====&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;==== Virus ====&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted behavior of a computer system. Viruses can be removed by running antivirus software on the infected computer.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;A computer virus is another kind of malware. Computer virus is a software which is installed on a computer system without owner's permission and corrupts data on the computer system. It can transfer from one computer to another. Computer viruses can be easily downloaded on the machine with the email attachment. The symptoms of a computer infected with a virus are slow system performance and unwanted behavior of a computer system. Viruses can be removed by running antivirus software on the infected computer &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;/ins&gt;.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Phishing ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Phishing is a method to steal personal information like passwords, credit card details, and bank account numbers etc. The most common way of stealing personal information is a link sent through an email which directs the user to a fake website, that site ask the user to enter the personal information. This kind of website is only set up to steal the user's information. To avoid phishing attacks, be careful while entering personal information over the internet. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Phishing is a method to steal personal information like passwords, credit card details, and bank account numbers etc. The most common way of stealing personal information is a link sent through an email which directs the user to a fake website, that site ask the user to enter the personal information. This kind of website is only set up to steal the user's information. To avoid phishing attacks, be careful while entering personal information over the internet &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;/ins&gt;. &amp;nbsp;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;=== Spam ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Spam is a unwanted or junk e-mail sent to multiple email addresses mostly for commercial purposes. Some companies send emails to a collection of e-mail addresses to promote a product or service. The spammers can collect email addresses by using different kind of programs which collects e-mail addresses and add them to spamming lists &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;/ins&gt;. Spams can be avoided by setting the junk e-mail filter, blocking the unknown senders or by using the anti-spam software.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 52:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 52:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== References ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== References ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;del style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Malware&amp;quot;, Wikipedia, Retrieved on April 04, 2009 &amp;lt;http://en.wikipedia.org/wiki/Malware&amp;gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;# &amp;quot;Malware&amp;quot;, Retrieved on April 04, 2009 &amp;lt;http://www.onguardonline.gov/topics/malware.aspx&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;# &amp;quot;Malware&amp;quot;, Retrieved on April 04, 2009 &amp;lt;http://www.onguardonline.gov/topics/malware.aspx&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;# &amp;quot;Spyware&amp;quot;, Wikipedia, Retrieved on April 05, 2009 &amp;lt;http://en.wikipedia.org/wiki/Spyware&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;# &amp;quot;Spyware&amp;quot;, Wikipedia, Retrieved on April 05, 2009 &amp;lt;http://en.wikipedia.org/wiki/Spyware&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6127&amp;oldid=prev</id>
		<title>Shamsh at 20:31, 10 April 2009</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=Email_Security&amp;diff=6127&amp;oldid=prev"/>
				<updated>2009-04-10T20:31:14Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;

		&lt;table style=&quot;background-color: white; color:black;&quot;&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;col class='diff-marker' /&gt;
		&lt;col class='diff-content' /&gt;
		&lt;tr valign='top'&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
		&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 20:31, 10 April 2009&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 37:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Managing Email Account ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;-&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*It is not a good practice to use just one email account, email user must have at least three email accounts, one for work, one should be for personal use and the third one for general purpose, that means that email can be used to sign up for newsletters etc. and for other purposes. &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*Always log out of email account and then close the browser window after checking the emails. Closing the browser window does not mean that email account has been logged out. Someone else might still be able to access the account because the cookies contain all the information. Similarly, after logging out of the email account the browser window is not closed, it might still be displaying the email address but not the password, which is not good for the email security, that way some unknown person will know the email address.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*If a public computer is used, always delete browser history to prevent this information to go in wrong hands, because most of the browsers keep track of all visited web pages, passwords and personal information. &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*While replying to email, be careful in using “Reply” vs “Reply all” button, so that only the right person receives the reply, unless one wants to send reply to all addresses.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*It is a good practice to back up your emails, by exporting emails to a folder and then burn a cd.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;*Do not think that deleted email is gone forever. The deleted messages still exist in backup folders on remote servers and can be retrieved.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== See also ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== See also ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Phishing]]&amp;lt;BR&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Malware]]&amp;lt;BR&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Internet Cookies and Confidentiality]]&amp;lt;BR&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== References ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== References ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Malware&amp;quot;, Wikipedia, Retrieved on April 04, 2009 &amp;lt;http://en.wikipedia.org/wiki/Malware&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Malware&amp;quot;, Retrieved on April 04, 2009 &amp;lt;http://www.onguardonline.gov/topics/malware.aspx&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Spyware&amp;quot;, Wikipedia, Retrieved on April 05, 2009 &amp;lt;http://en.wikipedia.org/wiki/Spyware&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Computer viruses: description, prevention, and recovery&amp;quot;, Retrieved on April 07, 2009 &amp;lt;http://support.microsoft.com/kb/129972&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# Cocca, Pam [http://www.sans.org/reading_room/whitepapers/email/email_security_threats_1540?show=1540.php&amp;amp;cat=email Email Security Threats]. Published in SANS Institute, 2004&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;What is Phishing?&amp;quot;, Retrieved on April 08, 2009 &amp;lt;http://www.webopedia.com/TERM/p/phishing.html&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;# &amp;quot;Spam&amp;quot;, Retrieved on April 09, 2009 &amp;lt;http://www.bewebaware.ca/english/spam.aspx&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== External links ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== External links ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.itsecurity.com/features/25-common-email-security-mistakes-022807/ The 25 Most Common Mistakes in Email Security]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.itsecurity.com/features/email-security-for-dummies/ Email Security for Dummies]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.softheap.com/emlsec.html Email Privacy and Security Tools]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.itsecurity.com/features/99-email-security-tips-112006/ Email: 99 Tips to Make you More Secure and Productive]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;*[http://www.pcit.com/computer_security/e-mail_security/ Stop Spam|Viruses|Spyware]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;nbsp;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;--[[User:Shamsh|Shamsh]] 3:08, 10 April 2009 (EDT)&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;!-- diff generator: internal 2026-04-06 23:23:56 --&gt;
&lt;/table&gt;</summary>
		<author><name>Shamsh</name></author>	</entry>

<tr><td colspan="2" class="diff-lineno"><!--LINE 1--></td>
<td colspan="2" class="diff-lineno"><!--LINE 1--></td></tr>
<tr><td class='diff-marker'>-</td><td class='diff-deletedline'><div>Email Security is to ensure that no unauthorized person has access to <del class="diffchange diffchange-inline">your </del>email account, <del class="diffchange diffchange-inline">you know </del>the sender of the email and <del class="diffchange diffchange-inline">you </del>can <del class="diffchange diffchange-inline">send </del>and <del class="diffchange diffchange-inline">receive emails</del>. Email Security is needed to protect the computer from threats and to ensure <del class="diffchange diffchange-inline">that you do not send or receive </del>hidden malware within the email or attachment that can damage <del class="diffchange diffchange-inline">your </del>computer system, data and records. On the other hand <del class="diffchange diffchange-inline">you </del>can be held responsible for any damage to a third party, if <del class="diffchange diffchange-inline">you </del>unintentionally end up sending a malware within the email.</div></td><td class='diff-marker'>+</td><td class='diff-addedline'><div>Email Security is to ensure that no unauthorized person has access to <ins class="diffchange diffchange-inline">the </ins>email account, the sender of the email <ins class="diffchange diffchange-inline">is known </ins>and <ins class="diffchange diffchange-inline">the email </ins>can <ins class="diffchange diffchange-inline">be sent </ins>and <ins class="diffchange diffchange-inline">received</ins>. Email Security is needed to protect the computer from threats and to ensure <ins class="diffchange diffchange-inline">no </ins>hidden malware <ins class="diffchange diffchange-inline">is sent or received </ins>within the email or attachment that can damage <ins class="diffchange diffchange-inline">the </ins>computer system, data and records. On the other hand <ins class="diffchange diffchange-inline">one </ins>can be held responsible for any damage to a third party, if unintentionally end up sending a malware within the email.</div></td></tr>
<tr><td class='diff-marker'> </td><td class='diff-context'></td><td class='diff-marker'> </td><td class='diff-context'></td></tr>
<tr><td class='diff-marker'> </td><td class='diff-context'></td><td class='diff-marker'> </td><td class='diff-context'></td></tr>
<tr><td colspan="2" class="diff-lineno"><!--LINE 8--></td>
<td colspan="2" class="diff-lineno"><!--LINE 8--></td></tr>
<tr><td class='diff-marker'> </td><td class='diff-context'><div>There are several things to keep in mind while sending and receiving emails.</div></td><td class='diff-marker'> </td><td class='diff-context'><div>There are several things to keep in mind while sending and receiving emails.</div></td></tr>
<tr><td class='diff-marker'> </td><td class='diff-context'></td><td class='diff-marker'> </td><td class='diff-context'></td></tr>
