Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security IT

E-Mail Security 5

LogError writes "In this audio learning session, Joseph Zacharias, Managing Director at Kerio Technologies UK, discusses the major aspects of e-mail security, including viral threats and different anti-spam techniques. He especially focuses on the new Microsoft Caller ID technology."
This discussion has been archived. No new comments can be posted.

E-Mail Security

Comments Filter:
  • by hkon ( 46756 ) on Monday August 23, 2004 @09:40AM (#10044480) Homepage

    I don't have the mp3 plugin installed on my Fedora box, so I cant .. eh.. hear the fscking article, but is there really anything here that requires this to be mp3? What fascinating aspects of a text-based medium is there that can't be described properly as text? Even for people who can play mp3 on their computer, would they really be read to than read themselves? I bet this guy talks a lot slower than I can read. And don't even get me started about how idiotic this must seem for hearing-impaired people. Also, non-english speakers might have gotten something out of babelfish if they were really interested, but not much chance of that now. Oh, and did I mention the waste of bandwidth?


  • Darn. Forget "rtfa", you think anyone here is actually going to LISTEN TO the fine article? Not likely.
  • E mail is important (Score:4, Informative)

    by Marxist Hacker 42 ( 638312 ) <seebert42@gmail.com> on Monday August 23, 2004 @02:28PM (#10048345) Homepage Journal
    But more important than *every other form of communication*? Isn't that a bit of an overstatement?

    Recommendations as I hear them:

    1. Antivirus on network, server, and client (gee, like you didn't know that)

    2. Strong password security on the server.(DUH!)

    3. Stability on the server (to protect against DOS attacks).'nother duh

    4. Bayesian spam filter on client (not everybody knows this, but it's obvious to any slashdot reader)

    His explaination of CallerID was interesting- tracing the packets to make sure mail is coming from where it claims to be coming from. Recommendation for this one- make sure your MX records are up to date.

    It ends with a recommendation that no actuall giant killer exists- so we need to use all of these techniques in combination.
  • that in most buisinesses you can afford to build your firewalls, mail filters, etc. backwards (block everything but the whitelist). On my company email account, almost all the mail the mail I've actually wanted came from someone within the company or from someone on the outside I was expecting mail from (mom, wife, children).
    Perhaps we're all just clinging to a hope of hearing from long lost friends, but only allowing the whitelist is often the best option for me.

How much net work could a network work, if a network could net work?

Working...