Location to e-mail messages are saved, Computer Network Security

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive component, a special file connected with permission restrictions so that only the owner that is the authorized user might have the capability of accessing it. The messages are saved until the recipient checks their electronic mailboxes (which means opens and reads them). Hence, the user should check the electronic mailbox frequently. Though, most of the systems provide an alert whenever a mail is received in the inbox. After thee-mail message has been read. The user can store it in the form of a text file, reply to it if needed, forward it to the other users, delete it copy if it is useless or take a print of it. Since, mailboxes are not quite stable, the e-mail message can be stored by copying it to a file or the document.

Posted Date: 7/20/2012 6:25:03 AM | Location : United States







Related Discussions:- Location to e-mail messages are saved, Assignment Help, Ask Question on Location to e-mail messages are saved, Get Answer, Expert's Help, Location to e-mail messages are saved Discussions

Write discussion on Location to e-mail messages are saved
Your posts are moderated
Related Questions
Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Describe the process a proposed standard goes through to become an RFC

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

Question : (a) "Pulse Code Modulation (PCM), as used in telephony, samples a signal at 8 kHz using 256 quantization levels". Outline how this scheme works with the help of ske

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would