Authenticating Your Email Domain With DKIM

Spammers and phishers often forge email “from” addresses to make their messages look legit. DKIM (DomainKeys Identified Mail) is a tool designed to help these forgeries. The idea behind DKIM is straightforward: an outgoing mail server digitally signs an email message and the receiving system, or perhaps the mail client itself, verifies the signature. In […]
Read More ›

Dovecot is Now My Favorite Unix/Linux IMAP Mail Download Server

As you may know, there are two kinds of email systems: Outlook, and everything else. The non-Outlook-based email world consists mainly of three kinds of software: MDAs, MUAs, and anti-spam/antivirus. Dovecot is the glue between your MDA and your MUA.[gview file=”https://blog.learningtree.com/wp-content/uploads/pdf/dovecot-email-flow.pdf”] MDAs are the mail delivery agents, such as SendMail, PostFix, OpenSMTPD, and more. An […]
Read More ›

Big Changes For Yahoo-Hosted Email

Frontier has been sending messages to its customers saying that the company has noticed their use of “a lower security sign-in that is sometimes used in third-party mail applications such as Outlook, IncrediMail, MacMail, Mozilla Thunderbird and others.” The message is somewhat vague and misleading. It gives the impression that these “third-party” tools don’t encrypt […]
Read More ›

Two Steps to Emails That Get Read

When you go to write your next email, start by realizing that your recipient probably doesn’t want to read your email at all. Fortunately, you can use that your advantage. Back when I had a job, I mentioned to my boss that I rewrote my emails two or three times before I sent them to him. […]
Read More ›

Skeptical Looks at Cryptography

We cannot have cyber security without cryptography! Confidentiality requires encryption of the sensitive data. Integrity is important, hash functions let us detect inappropriate modification of data and system configurations. Authentication of users and hosts can be done in many ways, and the more secure methods involve hash functions, encryption, or some combination of the two. […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.