Location to e-mail messages are saved, Computer Network Security

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive component, a special file connected with permission restrictions so that only the owner that is the authorized user might have the capability of accessing it. The messages are saved until the recipient checks their electronic mailboxes (which means opens and reads them). Hence, the user should check the electronic mailbox frequently. Though, most of the systems provide an alert whenever a mail is received in the inbox. After thee-mail message has been read. The user can store it in the form of a text file, reply to it if needed, forward it to the other users, delete it copy if it is useless or take a print of it. Since, mailboxes are not quite stable, the e-mail message can be stored by copying it to a file or the document.

Posted Date: 7/20/2012 6:25:03 AM | Location : United States







Related Discussions:- Location to e-mail messages are saved, Assignment Help, Ask Question on Location to e-mail messages are saved, Get Answer, Expert's Help, Location to e-mail messages are saved Discussions

Write discussion on Location to e-mail messages are saved
Your posts are moderated
Related Questions
(a) Explain the importance of the Euler Totient function in Cryptography. Calculate Euler Totient function value, φ(1280). (b) Explain the role of the Authentication Server (

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif


Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

implementing password policy in organisation

how to access tomcat by internet

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

IPV6 DATAGRAM FORMAT It is given in the figure below: