Loading


Add to Google
Showing posts with label email. Show all posts
Showing posts with label email. Show all posts

Saturday, December 14, 2013

How To Send Password Protected Documents Via Email




Matters of privacy and online safety have been progressively tossed around in the media in recent years. More and more people fear that their privacy is constantly being invaded and that their emails are being read. Whether that is true or not, I can't really say. For those of you who believe this is the case and you want to send sensitive data via email, I can teach you how you can protect it. Using passwords is a very basic cryptic method, but it ensures that only you and the party you're sending the message to can read it (provided they have the password). 

Monday, November 4, 2013

Phone vs. Text vs. E-mail




What type of person are you?

Phone:
 
Yes:”The only way to do business aside from in person.” Sort-of:”It is easier to understand nuances, humor, and intonation.” No:”Ugh, it’s so stressful having to actually talk to someone. A phone call is an invasion of privacy.”

Text:
 
Yes:”Easiest and most convenient by far.” Sort-of:”That’s a lot of typing on a small keyboard.” No: “What’s texting? So unprofessional.”

E-mail:

Yes:”Very clear, easy, and always have a record of the convo.” Sort-of: “Well you can respond when it’s convenient.” No: “What’s email? It’s hard to tell what people really mean.”

Wednesday, May 30, 2012

The Revolution of Email

Follow @ryderskull88


Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging.


Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages. An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.




Browse more Computer infographics.



Enhanced by Zemanta

Tuesday, August 9, 2011

Computer 101: Google 2-Step Authentication for All your Google Accounts.

Everyone that have internet access or uses that internet regularly for gaming, research, business and many more have an email account, this email account can be a corporate or an organization based or the paid email accounts from different providers and the most common of all the free email account which is available everywhere in the internet. One such provider of free email accounts is Google.com which is a very big internet based company. They have a free email account service called the G MAIL or Google Mail, aside from that they also have a lot of free services being offered like blogger.com for creating your own personal blog in the internet. All this free account is link within the Google system, if you lo-gin to one account then you can access another by configuring a few option without typing a username and password again and again. This setup is very useful if you’re going to jump from one account to another within Google.

Now how do we use our email account? Well we use it for personal communication and transaction over the internet, some sensitive information has also been stored in our email. Now is this free email account really secure? Well yes they are secure because if not, in the first place no one will use them if they are not secure. The first level of security for these email services is the password. Yup that all important passwords, the things that we always keep forgetting is not used frequently or we have already to many password to memorize. Also the user name we used in combination with the all important password, the more complex the password the more secure it or the longer the password the more secure it also. Now nobody can access your accounts if they not know the username and password. But wait what if those two important information has been stolen form you? You say what, how they got my information?

An example of a phishing e-mail, disguised as ...Image via Wikipedia
Well every heard of the term hacking and Phishing? Simply put it, theses terms means to get or acquire in this case sensitive personal information from one account. There are many ways on how to implement this technique. One is using software another is using link from email send to your email accounts from some one you though you know. Please click the link to see a more details and historical explanation for Phishing and for hacking. To cut it short, rather that securing your email account with just the username and password why not use another layer of security. Well this is where the Google 2-step authentication process comes in for all Google accounts users. This process although will take longer to access your G mail account is very important in keeping your account safe. It will add another layer of security. When we log-in to our email account the first thing that we do is we put the username and the password then we wait for the contents to display on our screen.


But with added feature security the second step for verification or authentication is it will send a code to your very own personal phone, via text or voice call. And you will encode the code on the box provided to verify that you’re the real owner of that account. After verifying the code is correct it will proceed in displaying the content of your G mail account. Also there is an option on the verification process that the computer that you are using can be remembered for 30 days. This feature allows the user to enter the verification only once within 30 days for the same computer. This is very helpful if you are using your own laptop or PC we don’t have to type in that code every time we log-in to our G mail account. This second layer of protection is also very handy while we access our G mail accounts from public computers.


Now the next questions are how do we activate this G mail verification process? To activate the process on your G mail account please click the link provided, it is the official blog for Google Email protection.  For other email service pleas check if they provide for free accounts. 


Enhanced by Zemanta

Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more

Rydertech

↑ Grab this Headline Animator


Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...