Location to e-mail messages are saved, Computer Network Security

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive component, a special file connected with permission restrictions so that only the owner that is the authorized user might have the capability of accessing it. The messages are saved until the recipient checks their electronic mailboxes (which means opens and reads them). Hence, the user should check the electronic mailbox frequently. Though, most of the systems provide an alert whenever a mail is received in the inbox. After thee-mail message has been read. The user can store it in the form of a text file, reply to it if needed, forward it to the other users, delete it copy if it is useless or take a print of it. Since, mailboxes are not quite stable, the e-mail message can be stored by copying it to a file or the document.

Posted Date: 7/20/2012 6:25:03 AM | Location : United States

Related Discussions:- Location to e-mail messages are saved, Assignment Help, Ask Question on Location to e-mail messages are saved, Get Answer, Expert's Help, Location to e-mail messages are saved Discussions

Write discussion on Location to e-mail messages are saved
Your posts are moderated
Related Questions
What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at