Location to e-mail messages are saved, Computer Network Security

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive component, a special file connected with permission restrictions so that only the owner that is the authorized user might have the capability of accessing it. The messages are saved until the recipient checks their electronic mailboxes (which means opens and reads them). Hence, the user should check the electronic mailbox frequently. Though, most of the systems provide an alert whenever a mail is received in the inbox. After thee-mail message has been read. The user can store it in the form of a text file, reply to it if needed, forward it to the other users, delete it copy if it is useless or take a print of it. Since, mailboxes are not quite stable, the e-mail message can be stored by copying it to a file or the document.

Posted Date: 7/20/2012 6:25:03 AM | Location : United States







Related Discussions:- Location to e-mail messages are saved, Assignment Help, Ask Question on Location to e-mail messages are saved, Get Answer, Expert's Help, Location to e-mail messages are saved Discussions

Write discussion on Location to e-mail messages are saved
Your posts are moderated
Related Questions
Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame