fit 2001 > Email > Vergleich Which security protocols does Pine and Outlook Express have and can support?
 
"Which security protocols does Pine and Outlook Express have and can support?"
 
Pine  Pine
  • Using of non-standard directory and file names

    Pine used non-standard directory and file names to avoid any unauthorized person try to find any files in a user system. The user can use one of the program (%HOME%, "Program Files," or "Msgs").

  • Using attachment protocol
     
    • How to process an attachment in Pine

      If the user wants to open an attachments, in pine he must in the first view the message in the message screen and by pressing v the attachment index appear and then he can select the attachment he wants to use, and by pressing A find what this attachments is about.

      • User must press E to exit from the attachment screen go back to attachment index and then do one the following:
      • Press Enter or > or V or double click on the attachment name to open the attachment by using "display method" that appears in the attachment screen.
      • Press S to save the attachment on a hard disk
         
    • Avoiding Microsoft Word viruses

      By using a macro (which is part of a Microsoft Word document), user sets up the system that when the word documents are received via Pine, that are not viewed in Word, but they are viewed in Word Viewer or WordPad. If the user wants to view the word documents he must tell Pine which programs are used by typing the following line in the file:

      %HOME%\Pine\mailcap:
      application/MSWORD;C:\Program Files\Accessories\wordpad.exe %s
      application/MSWORD;C:\Program Files\WordView\wordview.exe %s

    • Avoiding other application viruses

      To avoid "ILOVEYOU" virus used the following lines have to be written:

      %HOME%\Pine\mailcap:
      application/*;""
      application/*;C:\Progra~1\Vim\Runtime\gvim.exe -R %s
      application/*;C:\Path\your-favorite-editor.exe %s on

    • The following program was written to avoid "PC-Pine, I Kiss You" virus that sent to comp.mail.pine.

      Pine 4.33 ABOUT ATTACHMENT
       
      Details about Attachment #2:
       
      Type:           Application
      Subtype:        OCTET-STREAM
      Encoding:       BASE64
      Parameters:     NAME = IKissYou.TXT.vbs
      Description:    "Message from Mahir to you!"
      Disposition:    ATTACHMENT; FILENAME=IKissYou.TXT.vbs
      Approx. Size:   27 bytes
      Display Method: "via Windows-specific method"
       

    • Avoiding HTML viruses

      To avoid a HTML virus the user can type the line:

      text/html;C:\Progra~1\Lynx\lynxbat.bat %s

  • Sending password not in plaintext
     
    • Using Secure Sockets Layer (SSL), CRAM-MD5, Kerberos or One-Time Password (OTP)

      By using one of these protocols, user can connect to the server without doing plaintext by using one of the following:

      {your.imap.server/user=LoginName/ssl}
      {your.imap.server/user=LoginName/secure}
      {your.imap.server/user=LoginName/ssl/secure}
      :

    • Using Secure Shell (SSH) Port Forwarding

      If the system does not support a SSL, CRAM-MD5, Kerberos or OTP the system can download the SSH port forwarding to secure the user password.

Outlook Express   Outlook Express
  • Scanning for viruses before opening an Office document

    By using Microsoft Office 2000, users can protect documents from a macro virus and other viruses.

  • Using security features

    There are two ways of getting a secure message from the internet. For both methods two keys are used (private key and public key)

    • Digital signatures

      An owner of an authorized digital signature, someone who owns the matching public key to that signature, that confirms the authenticity.

    • Certificate

      Part of the Public key which uses the S/MIME internet security standard that allows users to exchange secure internet message between them.

  • Using attachment protocol
     
    • Avoiding macro viruses

      The digital box protect, users' internet messages from the macro virus. User must install it before opening documents.

    • Worm.Explore.Zip email virus can be avoided by installing the latest anti-virus software.
       
    • Avoiding other applications viruses

      To avoid the "ILOVEYOU" virus user must do the following standard step to avoid getting infected by:

      • Not execute any attachments the purpose and origin is not understood.
      • Users must have good virus scanners.
      • Users must always update virus scanner's signature files.
  • Protecting work with passwords and other security measures
     
    • If users want to protect files, the easiest way is to set a password for the file and encrypt this password in order to make the password unreadable. For opening the file the user have to possess the password.
       
    • Other security measures
      • Using user-level security.
      • Using file-system access control using password to open or password to modify.
>Weiter Can Pine or Outlook Express used with modern technologies?
   
>Zurück Why use Pine rather than Outlook Express?