Top Banner
Kevin Patel Block 4 03/05/09
9
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: E Mail Ppt 2

Kevin PatelBlock 4

03/05/09

Page 2: E Mail Ppt 2

A hard bounce is a e-mail sent to the sender of an e-mail who’s recipient could not be found.

A soft bounce is a similar error message sent to a patron due to the fact that the recipients inbox is full

Page 3: E Mail Ppt 2

Computer spam is the sending of e-mails that have bad intentions; these can range from credit card spam to identity theft.

Page 4: E Mail Ppt 2

The internet is the wide connection of servers all across the world. These servers can be “surfed” with internet browsers such as Mozilla Firefox, or Internet Explorer.

Intranet is similar but over a small number of servers or computers

Page 5: E Mail Ppt 2

In computing, the Post Office Protocol version 3 (POP3) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both.

Page 6: E Mail Ppt 2

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites (YouTube, Facebook, MySpace, Windows Live Messenger), auction sites (eBay

Page 7: E Mail Ppt 2

In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge. Decryption is the opposite.

Page 8: E Mail Ppt 2

Netiquette is internet etiquette it is an essential skill to have so that surfing is a safe ,easy ,and fun process

Page 9: E Mail Ppt 2

Routers re-route internet to all the parts of you’re house so you can have it. This is routed by the us of Ethernet cables which allow you to use the internet.