Location to e-mail messages are saved, Computer Network Security

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive component, a special file connected with permission restrictions so that only the owner that is the authorized user might have the capability of accessing it. The messages are saved until the recipient checks their electronic mailboxes (which means opens and reads them). Hence, the user should check the electronic mailbox frequently. Though, most of the systems provide an alert whenever a mail is received in the inbox. After thee-mail message has been read. The user can store it in the form of a text file, reply to it if needed, forward it to the other users, delete it copy if it is useless or take a print of it. Since, mailboxes are not quite stable, the e-mail message can be stored by copying it to a file or the document.

Posted Date: 7/20/2012 6:25:03 AM | Location : United States







Related Discussions:- Location to e-mail messages are saved, Assignment Help, Ask Question on Location to e-mail messages are saved, Get Answer, Expert's Help, Location to e-mail messages are saved Discussions

Write discussion on Location to e-mail messages are saved
Your posts are moderated
Related Questions
A  half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmi

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Discuss how developers should apply the following countermeasures to improve the security of their code:

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev