Wednesday, 26 September 2012

Email


Email

 
To be able to send emails you first need a mail server and a mail client. An email client is a program run by a user to send and receive emails. It retrieves all email for its user from the mail server to what it’s connected to. All mail is then sent from its user to the same mail server, which distributes to other email users on different servers.

A client is a program such as Outlook Express, on a computer connected to the internet, or an online client such as email services provided by Hotmail or Yahoo. Email has now progressed to technology such as mobile phones or even game stations, using GPRS, WAP or even SMS. Messages are sent using an SMPT server (simple mail transfer protocol-port 25) and received using a POP3 (post office protocol-port 110)or an IMAP (internet mail access protocol-port 143) server.
There are many advantages to email, due to its simplicity. Not only is it easy to use but it’s a fast method of providing permanent record of communication, unlike using a phone. Being able to send attachments means you’re able to deliver almost any message and file type to almost any recipient or group.
There are however, disadvantages to email. Its simplicity means that is often misused, ranging from inappropriate messages, to viruses, worms and Trojans which can be attached very easily. Spam mail can block up mailboxes and whole areas of the internet itself.


Spoofing and spamming
It is easy for users to write a program that will give a fake address in the ‘From’ section of an email, which misleads the user into thinking it’s from a reliable source. It’s very popular from virus emails. Many individuals also find it funny to convince email users that they are different people, normally significant figures of the general public. This is known as spoofing. Spamming is using email to conduct a junk mail campaign, which is so easy to do it can lead to flooding email users inbox.
Virus
A virus is a harmful piece of code that attaches itself to programs or files. Once opened the virus is capable of replicating itself.
Worm
This is a specific type of virus, when once installed, it is capable of replicating itself in great volumes without any further files being opened. Due to this virus being capable of ‘burrowing’ into a system without human assistance, some worms allow their ‘creator’ to take control of the computer systems remotely.
Trojan
This is another virus in the form of a code, named after the Trojan horse. It is usually covered up by a attachment or download but may harbour an unwelcomed payload. Once installed on a user’s machine it can do damage to the users system and possibly take control of the user’s machine.






No comments:

Post a Comment