The threat of e-mail. Email is one of the communication channels that are fast and efficient, and is considered to be essential for human life, the age of the Internet. For business meetings or a different data exchange needs to be told to address the so-called "E-mail Address", even if the mail is useful in daily life, but there is a danger that the e-mail that came with the disclosure. Non-disclosure and sometimes trick us into coming to the lost come to know the featured four e-mails that each of us do the same! E-mail virus (Virus Attached E-mail) The e-mail attachment virus. There is a great quantity. The format of the mail formats or sent them often have the following characteristics: -The page of interest to invite to open a letter. -Sent from someone I don't know, but sometimes it is a bogus e-mail that is sent to us, we know, but usually has a short text is in English. If your friend doesn't like the English people we guess that he is not sure. -In the file name extension email is weird like lamak .vbs, .exe, .bat, .com, etc. Forging e-mail (E-mail Spoofing). Generally, to receive the e-mail Edition of grateful tattoo. The first thing we noticed is that the people who are sent to us. So that we can ensure that there is no spam or viruses; To e-mail a larabu who is sent. Sometimes, we simply cannot be trusted, because in today's fake sent can be made. We get a false sender "E-mail Spoofing." Forging e-mail can be done in several ways, from Telnet into port 25 to port a STMP (Semple Portocol Mail Transport), which is part of the Protocol in sending e-mail, or you may use the software helped to forge e-mail usage is not different with the program MS Outlook, but do more than send a regular e-mail, where the increase in the part of the sender only. Email scams (Phishing) lalok This scam method Such as how ingenious and skilled than a lot fraud. He will create a Web site that is similar to the Web site of the financial institution or the victim is of the members then sending e-mails disguised. With the similarities, as though from the financial institution or employer. If the target is not a victim, paranoid people often fall victim. When the victim fall, it will follow that email (fake) then tell whether clicking on a link that is sent to a fake Web site. To wait for their prey to makrok information, such as credit card number, User Name Password number, ID card, etc. Junk e-mail (Spam Mail). In another e-mail, one channel is used in advertising by advertising costs and still have.According to a group of customers. The email applied to succession But the advertising products on demand to fit. Fixed the recipients are satisfied with many of the item has been read news, we are interested in, but if the email is not lakhotna to come, saith. Send a free life. Send every day every hour, every minute. To send this form, we called the "spam mail (Spam mail)" How to protect your spam mail, it is not possible, such as name, e-mail, there were large. Do not disclose our email, others know if broadly applied to various Web-based, 1 person will be using a newsreader spam robot, called the Spider Program is made to suck on our e-mail address to use, or if you use a free mail applications. Web, it often has the e-mail Option in the filter; We can set to block e-mail that we think is spam mail. Finally, if you do not. Need to install interception much like spam mail that has SpamKiller, SpamNet, SpamPal, etc.
การแปล กรุณารอสักครู่..
