Matters of privacy and online safety have been progressively tossed around in the media in recent years. More and more people fear that their privacy is constantly being invaded and that their emails are being read. Whether that is true or not, I can't really say. For those of you who believe this is the case and you want to send sensitive data via email, I can teach you how you can protect it. Using passwords is a very basic cryptic method, but it ensures that only you and the party you're sending the message to can read it (provided they have the password).
Showing posts with label email. Show all posts
Showing posts with label email. Show all posts
Saturday, December 14, 2013
How To Send Password Protected Documents Via Email
Follow @ryderskull88
Labels:
Computer security,
email,
Email address,
encryption,
Facebook,
Google,
HTTP Secure,
Microsoft Word,
Password,
security,
Windows
Monday, November 4, 2013
Phone vs. Text vs. E-mail
Follow @ryderskull88
What type of person are you?
Phone:
Yes:”The only way to do business aside from in person.” Sort-of:”It is easier to understand nuances, humor, and intonation.” No:”Ugh, it’s so stressful having to actually talk to someone. A phone call is an invasion of privacy.”
Text:
Yes:”Easiest and most convenient by far.” Sort-of:”That’s a lot of typing on a small keyboard.” No: “What’s texting? So unprofessional.”
E-mail:
Yes:”Very clear, easy, and always have a record of the convo.” Sort-of: “Well you can respond when it’s convenient.” No: “What’s email? It’s hard to tell what people really mean.”
What type of person are you?
Phone:
Yes:”The only way to do business aside from in person.” Sort-of:”It is easier to understand nuances, humor, and intonation.” No:”Ugh, it’s so stressful having to actually talk to someone. A phone call is an invasion of privacy.”
Text:
Yes:”Easiest and most convenient by far.” Sort-of:”That’s a lot of typing on a small keyboard.” No: “What’s texting? So unprofessional.”
E-mail:
Yes:”Very clear, easy, and always have a record of the convo.” Sort-of: “Well you can respond when it’s convenient.” No: “What’s email? It’s hard to tell what people really mean.”
Wednesday, May 30, 2012
The Revolution of Email
Follow @ryderskull88
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging.
Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages.
An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.
Tuesday, August 9, 2011
Computer 101: Google 2-Step Authentication for All your Google Accounts.
Everyone that have internet access or uses that internet regularly for gaming, research, business and many more have an email account, this email account can be a corporate or an organization based or the paid email accounts from different providers and the most common of all the free email account which is available everywhere in the internet. One such provider of free email accounts is Google.com which is a very big internet based company. They have a free email account service called the G MAIL or Google Mail, aside from that they also have a lot of free services being offered like blogger.com for creating your own personal blog in the internet. All this free account is link within the Google system, if you lo-gin to one account then you can access another by configuring a few option without typing a username and password again and again. This setup is very useful if you’re going to jump from one account to another within Google.
Now how do we use our email account? Well we use it for personal communication and transaction over the internet, some sensitive information has also been stored in our email. Now is this free email account really secure? Well yes they are secure because if not, in the first place no one will use them if they are not secure. The first level of security for these email services is the password. Yup that all important passwords, the things that we always keep forgetting is not used frequently or we have already to many password to memorize. Also the user name we used in combination with the all important password, the more complex the password the more secure it or the longer the password the more secure it also. Now nobody can access your accounts if they not know the username and password. But wait what if those two important information has been stolen form you? You say what, how they got my information?
Well every heard of the term hacking and Phishing? Simply put it, theses terms means to get or acquire in this case sensitive personal information from one account. There are many ways on how to implement this technique. One is using software another is using link from email send to your email accounts from some one you though you know. Please click the link to see a more details and historical explanation for Phishing and for hacking. To cut it short, rather that securing your email account with just the username and password why not use another layer of security. Well this is where the Google 2-step authentication process comes in for all Google accounts users. This process although will take longer to access your G mail account is very important in keeping your account safe. It will add another layer of security. When we log-in to our email account the first thing that we do is we put the username and the password then we wait for the contents to display on our screen.
But with added feature security the second step for verification or authentication is it will send a code to your very own personal phone, via text or voice call. And you will encode the code on the box provided to verify that you’re the real owner of that account. After verifying the code is correct it will proceed in displaying the content of your G mail account. Also there is an option on the verification process that the computer that you are using can be remembered for 30 days. This feature allows the user to enter the verification only once within 30 days for the same computer. This is very helpful if you are using your own laptop or PC we don’t have to type in that code every time we log-in to our G mail account. This second layer of protection is also very handy while we access our G mail accounts from public computers.
Now the next questions are how do we activate this G mail verification process? To activate the process on your G mail account please click the link provided, it is the official blog for Google Email protection. For other email service pleas check if they provide for free accounts.
Subscribe to:
Posts (Atom)
Here Are Some of My Most Popular Posts Since Day One.
-
Smartphones are widely used in our daily live. In the article we will look at some of the security features and apps for iPhone, one of the...
-
Let’s go back so far several items have been mentioned as being connected to the motherboard, they a...
-
This article is a guest post from mobiledeals of http://www.best-mobile-contracts.co.uk/. Phones have come a long way since the ubiqu...
-
First for those who are not familiar with System Restore here is a description of what it does in Windows based system. The function of Sys...
-
With the advancement of science and technology, the computer technology has changed in your workplace. As such, it has also changed in the ...
-
A lot of topic has been discussed about this one major component of the personal computer. Then why create one and add more to the confusio...
-
Windows 8 task manager can be considered as one of the revamped aspect of Microsoft’s latest desktop operating system. The new task manager...
-
Follow @ryderskull88 The iPad comes with several applications, including Safari, Mail, Photos, Video, YouTube, iPod, iTunes, App Store,...
-
Follow @ryderskull88 We all know what a car alarm is – basically, some sensors connected to a siren. A very simple alarm would have a ...
-
Is your USB Flash disk ever been infected by a virus and the result is all you files and folder are gone? But wait when went to the techni...
Subscribe via email
|