Login
May 11, 2021
Views: 245

What Are The Different Types of End-to-End Email Encryption?

Imran Hussain

Electronic mail has been around since 1978 and is being used by billions of users on a daily basis. Privacy was not a big concern when it was introduced, and therefore, it lacks the essential security features necessary for private communication. ...

May 7, 2021
Views: 258

How to Spot IRS Email Scams

Blake Cohen

There are many scammers out there that try impersonating the IRS to fool unsuspecting victims into sending money or sensitive financial documents to them. Many of these are through phishing emails. Sending any information to these scammers could result ...

Jan 18, 2021
Views: 535

Alternative to SpamAssassin

Hong Gu Yoon

Alternative to SpamAssassin SpamAssassin is a free and open source spam filtering solution. It helps block many emails by using a scoring system. When an email comes in, SpamAssassin uses rules to see if the filter matches. The total score will determi ...

Nov 29, 2020
Views: 1703

Alternative to Postfix

Hong Gu Yoon

When it comes to email servers, there are benefits to hosting a in-house email server. These advantages include having full control of your server as well as having privacy where no third party will have access to your emails. There are numerous in-house ...

Nov 18, 2020
Views: 1620

Alternative to Barracuda Spam Filter

Blake Cohen

Today alone, the average office worker will receive over 120 emails, of which, over 50% will be considered spam messages. When you need to respond to emails to conduct business, having to sift through dozens of junk messages can be a pain. This is preci ...

Oct 8, 2020
Views: 977

How to be HIPAA Compliant with Emails

Hong Gu Yoon

HIPAA and Emails Working in the medical field requires you to be in constant, quick contact with not you’re your colleagues but patients as well. Emails are quick, efficient, and accessible to everyone. However, while sending both personal and private ...

Sep 14, 2020
Views: 1869

How to Monitor Secure Logins

Hong Gu Yoon

As an administrator, it's crucial for all of your users to make sure they are connected securely. Data being compromised is no joke; sensitive information such as credit card, social security, tax return numbers and even passwords are exchanged through mu ...

Sep 2, 2020
Views: 2241

Preventing Hackers From Stealing Passwords

Imran Hussain

Intruders enter through available doors. The more doors you have the more cautious you need to be to ensure no one can steal the identities of your users. In technical terms, these doors are analogous to servers listening for clients to connect. A typ ...

Sep 6, 2019
Views: 3122

Tricky Spam Emails

Blake Cohen

Phishing emails are a common occurance where malicious senders will attempt to steal your personal information or passwords by pretending to be a trusted sender. Typically, you would receive an email that appeared to come from a trusted sender, such as a ...

Jun 29, 2018
Views: 457533

Introducing SynRBL

Hong Gu Yoon

There are many methods of catching spam emails. Some of these methods include; content filters which inspect the message content to determine if a message is junk or not, Bayesian filters that calculate the probability of a message being spam based on th ...

May 31, 2017
Views: 346546

Step-by-step guide to Install ClamAV & Integrate with Xeams

Mudit Bhatt

What is ClamAV?ClamAV includes a number of utilities: a command-line scanner, automatic database updater and a scalable multi-threaded daemon, running on an anti-virus engine. ClamAV includes a multi-threaded scanning daemon, command line utilities for on ...

Jan 5, 2017
Views: 6335

Importance of rejecting invalid email addresses

Imran Hussain

There are two schools of thought when it comes to accepting emails sent to invalid addresses in an SMTP server: Reject the message without accepting it Accept an incoming message and then generate an NDR (non-delivery report) This difference ...

Jan 5, 2017
Views: 76748

Steps to run email server in 10 minutes

Mudit Bhatt

Follow these steps to run your own email server in 10 minutes. Step 1: Domain Name Get a domain name for yourself or your business. This can be done by visiting http://godaddy.com ( or another registrar of your choice). We will assume that your domain n ...

May 18, 2016
Views: 154981

What is a Reverse NDR Attack

Hong Gu Yoon

The non-delivery report (NDR) is generated when an email message is not able to be sent to the next hop. Spammers can use NDR as a method to generate spam towards victims by using the victim's email address as the sender. This is called a reverse NDR Att ...

Apr 20, 2016
Views: 325369

How to Monitor Emails flowing in and out of Microsoft Exchange

Hong Gu Yoon

Microsoft Exchange is a well-known mail, calendar, and groupware program that is used for businesses all around the world. Exchange allows administrators to achieve better productivity by simplifying tasks such as sending email messages, calendaring, p ...