How to secure my e-mail
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Tracking is everywhere on the Internet. Over the past year, a drumbeat of tech-industry scandals has acclimated users to the sheer number of ways that personal information can be collected and leaked.
I confess, I'm an outlaw at heart. I like using packet sniffers like tcpdump because it satisfies my base snooping impulses. Packet-sniffing is wiretapping after all, only it's applied to TCP/IP packets, not voice transmissions. Sure, they're my packets on my systems, but still the idea is appealing. Did you know that you can use tcpdump to verify that encryption on your POP email server is working? Find out how in this informative tutorial from Carla Schroder.
In the event that a message is wrong, a sender isn't real or any number of other problems, dealing with bounced messages is a pretty important part of email servers... If you're using Postfix for your email needs... This guide shows how to configure custom Postfix bounce messages.
Do you use Windows? Do you want to use GnuPG? Are you new to GnuPG in a windows environment? Then look no further! This document was written for new users who have never installed or used GnuPG before and have not perhaps done any reading but just wish to "dive right in and get started" using signing and encryption. If this is the case, please take your time to read through the whole document first skipping the update instructions (which make up significant portions of the document now). Be sure that you are comfortable with all the terms etc. before doing anything!
Are you using SpamAssassin, but the rulesets you currently have aren't seeming to do the trick? This article explains how you can download additional SpamAssassin rulesets resp. automatically update these rulesets with a shell scripts called RulesDuJour. These additional rulesets can increase your spam recognition rate dramatically.
This HOWTO, from Howtoforge.com provides a great look into how to leverage the best defense against spam on your mail server. Great overview with setp by step instructions: This document describes how to integrate ASSP (Anti-Spam SMTP Proxy) with embedded ClamAV into a mail server based on Postfix featuring virtual users and domains, i.e. users and domains that are in a MySQL database.
HOWTOForge is a great place to pick up some great guides on setting up your server. Here: This guide describes how to set up a full email solution in Debian Linux (all code is from Debian Etch). I was asked to design a secure, scalable, portable solution for a small company. He goes through every stage, from soup to nuts, of all the issues and steps involved in getting your mail up to the level you want it at.
This document explains how to set up secure POP connections using ssh.
This paper highlights PostX's Messaging Application Platform, which provides an integrated trusted communication framework flexible enough to solve the complete range of secure messaging requirements.
This HOWTO describes how to integrate ClamAV, an anti-virus attachment scanner and Qmail-Scanner, an anti-virus message content scanner, with an existing installation of a qmail email server.
This document provides a general overview of email spoofing and the problems that can result from it.
This document provides a general overview of problems associated with electronic mail bombing and email spamming.
Email has emerged as the most important medium for communications both inside and outside the enterprise. The convenience and ubiquity of email is now threatened, however, by new risks having nothing to do with inbound threats such as spam and viruse
Spammers, virus writers and hackers were once distinct communities with distinct motivations. However, the success of spam has brought the three together in an underground economy with a single purpose: to make money from unsolicited email. This pape
Identity theft, or stealing a person’s credentials to gain access to accounts and information, has become the number one crime in the United States. One of the fastest growing forms of identity theft is phishing, a relatively new form of online fra
This document discusses anti-spam philosophies from a variety of perspectives and provides information about available options for dealing with spam.
This documentation is a step-by-step guide to downloading, compiling and installing Qmail: a Mail Transport Agent (MTA) that was closed to third-party relay *by default*.
This documentation briefly reviews and compares five major email encryption protocols under consideration: MOSS, MSP, PGP, PGP/MIME, and S/MIME. Each is capable of adequate security, but also suffers from the lack of good implementation, in the conte