Hacking For Beginners – Manthan Desai

2010

Email Service Protocols

SMTP

 SMTP stands for Simple Mail Transfer Protocol. SMTP is used when Email is delivered from an Email client, such asOutlook Express, to an Email server or when Email is delivered from one Email server to another. SMTP uses port25.

POP3

 POP3 stands for Post Office Protocol. POP3 allows an Email client to download an Email from an Email server. Thethat the Emaildisconnects. POP3

 IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. It, too, is aprotocol that an Email client can use to download Email from an Email server. However, IMAP includes manymore features than POP3. The IMAP protocol is designed to let users keep their Email on the server. IMAPrequires more disk space on the server and more CPU POP3, as all Emails are stored on the server.IMAP normally uses port 143.

Configuring an Email Server

 Email server software like Post cast Server, Hmailserver, can be used to convert your Desktop PCinto an Email sending server.

 HMailServer is an Email server for Microsoft Windows. It allows you to handle all your Email yourself withouthaving to rely on an Internet service provider (ISP) to manage it. Compared to letting your ISP host your Email,HMailServer adds flexibility and security and gives you the full control over spam protection.

Email Security

 Now let’s check how secure this fast mean of communic ation is. There are so many attacks which are applied onEmails. There are people who are the masters of these Email attacks and they always look for the innocent peoplewho are not aware of these Email tricks and ready to get caught their trap.

 You have to make sure that you are not an easy target for those people. You have to secure your Email identityand profile, make yourself a tough target.

 If you have an Email Id Do not feel that it does not matters if hacked because there is no important information inthat Email account, because you do not know if someone gets your Email id password and uses your Email to senda threatening Email to the Ministry or to the News Channels.

 Attacker is not bothered about your data in the Email. He just wants an Email ID Victim which will be used in theattack. There are a lots of ways by which one can use your Email in wrong means, i am sure that you would havecome across some of the cased where a student gets an Email from his friends abusing him or cases on PornEmails where the owner of the Email does not anything about the sent Email.

www.hackingtech.co.tv

Page 20