"Fake stupid but not crazy" means that anyone who has done things generally has good plans, plans in the dark, and then does not show any expression before taking action. In the security prevention of E-mail, we can also use the "fake foolish" strategy to create a security line for E-mail from various aspects such as system, anti-virus, and anti-black...
A brief analysis of safety hazards of E-mail
As the most widely used communication tool in interpersonal communication on the Internet, its security issues have attracted attention from all parties several years ago. Simply put, the security issues of E-mail mainly include the following direct or indirect aspects:
●Password stolen
Many methods such as *s, violent guessing, software vulnerabilities, and sniffing may make the email password give it to others without realizing it.
●Email content was intercepted
●The attachment contains a large number of viruses
It often takes advantage of people's eagerness to receive emails and is easily attracted by email subjects, and sneaks into and destroys computers and the Internet. At present, the harm of email viruses is far greater than that of traditional viruses.
●Email bomb attack
●Defects in their own design
Below, we will discuss some practical and feasible prevention measures based on the various threats that email may pose to us, starting from the purpose of ensuring the security of email and email, and the security of the system.
Email client software usage restrictions
Since email client software (such as Foxmail) is an operating environment for sending and receiving mail, we can regard it as the first line of defense to restrict the use of email client software. Taking Foxmail as an example, depending on the operating system, there are usually several restrictions:
1. In operating systems with incomplete security design such as Windows 98, third-party security tools such as PC Security can be used to complete the use of Foxmail. After installing the software, just right-click the Foxmail icon and select "PC Security" and "Lock" in the pop-up shortcut menu to achieve the "lock" restriction effect. When you need to use Foxmail, you must enter the corresponding unlock password before you can use Foxmail.
2. When using systems with better security such as Windows XP, in addition to third-party encryption tools such as PC Security, you can also use the encryption function of the system itself. The premise is that the Foxmail software should be installed in the NTFS partition, and then you can right-click the icon, select "Properties" in the pop-up menu, click to switch to the "Security" tab setting interface, and set up users who are authorized to use this program as needed.
Security measures for email passwords
Email passwords are one of the most easily cracked registration passwords. Their harm and wide range cannot be ignored. Therefore, we should adopt the following measures to minimize risks:
1. It is strongly recommended to use "unregular password combinations of sufficient length + passwords that are replaced regularly".
2. Setting a password prompts questions and answers should be complicated. When registering an email, you will need to set up a password to prompt the problem, which is used when restoring your password. But this will sometimes give hackers the opportunity to "guess"! For example, some users’ prompt question is 123, and the answer is 321. Then a little experienced hacker will first test such questions and answers, so as to crack the email address without any effort. Therefore, for this prompt question and password, it is better to give a problem password that is both meaningful and easy to remember and not easily guessed by hackers.
Encryption of emails
Email encryption is a relatively effective security precaution against email content, and HotCrypt is such a software for email encryption, which is very suitable for beginners. HotCrypt adopts advanced encryption algorithms, which can effectively ensure the security of data. It supports any mail program or other file editing window, and can be quickly encrypted through hotkeys, making it easy to use. Next, we will introduce in detail how to encrypt email under Foxmail:
Step 1: After running HotCrypt and editing content in the Foxmail email compilation window, press the key combination "Ctrl+E" to call up the HotCrypt's encryption window to encrypt the email
Step 2: After entering the password in the text box below "Enter Password", click the "OK" button to return to the email editing window. You will find that the content of the email text has become an encrypted ciphertext.
Tip: HotCrypt can only encrypt content in the uppermost current window. When a friend receives this email, he also needs to press the key combination "Ctrl+D" to call up the password input window and enter the correct password before he can read the content of the email normally.
Prevention of email viruses
As emails become an important means of daily communication, the shadow of the virus has also begun to surround the emails. Today, more than 70% of computer viruses are spread by email. So how can we block email viruses more comprehensively? Usually the following measures can be used:
1. Forbid other programs to send emails in secret
In order to prevent the email virus from automatically querying the user's address book, it will be sent to the user's relatives and friends in the name of the user. Taking Outlook Express 6.0 as an example, we can set it as follows:
Click "Tools → Options → Security" in sequence, and click the check box before the "Warn me when another application tries to send emails in my name" option in the settings interface, so that any silent "underground mail sending activity" will be discovered and reported to the user immediately.
2. Start the self-antivirus option of Outlook Express 6.0
Since most email viruses are transmitted by loading email attachments, you can use the method of prohibiting OE from opening attachments to prevent such viruses from invading them. The method is as follows: Run OE6.0, click "Tools", "Options", and "Safe", and then select the check box in the settings interface before the "Don't allow saving or opening attachments that may have viruses" tab, so that the OE's self-protection mechanism function can be enabled.
3. Modify the association
Some worms are spread through mail attachments in formats such as .vbs. To reduce the risks brought by such viruses, an easy way is to modify the associated properties of the file so that when opening the script file (for example, the user double-clicks an attachment) it will not run automatically. Open the Control Panel of Windows XP, double-click the "Folder Options", select the "File Type" tab, and select the .vbs file type.
Then change its default operation to Notepad (rather than running with VBScript by default), click the "Advanced" button, select "Edit" in the "Edit File Type" dialog box, and specify the open program as Notepad in the "Edit this type of operation" dialog box that pops up.
Tip: The same modification can be made to file types such as .vbe, .wsf, .wsh, .js and .jse. The method of modifying file association attributes cannot isolate all risks.
After modifying the associated properties of the file, when you click on a script file, it will no longer run automatically as it used to be, but will be opened with Notepad and in editing state. If you want to run a script, you must explicitly specify in the script's shortcut to open the script file.
4. Use antivirus software
Now most antivirus software provides the function of virus detection on email content. For example, Rising antivirus software can do this well. It allows us to automatically detect viruses on emails when sending and receiving emails to prevent the system from being "poisoned".
Prevention of mailbox bombs
The prevention of mail bombs is complicated and it is difficult to ensure that it is foolproof. However, we can use the following methods to avoid mail bomb attacks and handle aftermath as much as possible:
●Don't disclose your mailbox address at will
●Hide your email address
If you change shy@ when entering, everyone knows that this is actually an email address, but some email automatic search software cannot recognize such a "email address".
● Use the automatic reply function with caution
The original intention of the "automatic reply" function is very good, but it may also be used to create mail bombs! Just imagine, if both the receiving and sending parties set the "automatic reply" setting, and neither party reads the letter in time, an email bomb will be created in the repeated "automatic reply".
Patch it well
In software design, some unexpected errors and vulnerabilities often occur, bringing hidden dangers to the program in terms of security and stability. Therefore, keeping software updates frequently is the easiest and most direct way to ensure system security. Taking the SP1 Simplified Chinese version download and installing Outlook Express 6.0 as an example, the download URL of the patch is: /downloads /?familyid = 0cf81200-dd86- 4636 - 8ae5 - 3f4af4e829d8&&displaylang =zh-cn
Mail backup
When it comes to email security, we must not talk about the topic of backup, but since the methods of email backup are often used due to different software, many methods can be used, so this article is not convenient to describe in detail. However, basically, you should set up a special directory for the received emails and export the "Address Book" and other backup operations.
Defense IE: 7 IE maintenance techniques
Home page settings are blocked and locked
Attack features: Home page settings are disabled, the address bar turns gray and blocks.
Clear method: Open the registry editor, open it in the following order: HKEY_LOCAL_USERSofwareMicrosoft Internet ExplorerMain branch, create a new "ControlPanel" primary key, and then create a new DWORD value with the key value named "HomePage" under this primary key, and the value is "000000000", press F5 to refresh and take effect.
The default search engine is modified
Attack Features: Change IE's default search engine.
Clear method: Open the registry editor and open it in the following order: [HKEY_LOCAL_MACHINESoftwareMicrosoft Internet ExplorerMain branch, find the "SearchPage" key value name, click "Modify" in the right window, and enter its key value as: {SUB _RFC1766}/srchasst/, and then find the "CustomizeSearch" key value name, modify its key value to://srchasst/, and press F5 to refresh and take effect.
Illegal information was added to the IE title bar
Attack features: By modifying the registry, the IE title bar is forcibly added to the advertising information of the website, and there is a "htttp://www.*********.com" tail on the blue title bar at the top of the IE.
Clear method: Open the Registry Editor, open the HKEY_CURRENT_USERSoftwareMicrosoft Internet ExplorerMain branch in the following order, find the "Window Title" key value name, enter the key value as Microsoft Internet Explorer, and press F5 to refresh. Then open it in the following order: HKEY_LOCAL_MACHINESoftware Microsoft Internet ExplorerMain branch, find the "Window Title" key value name, enter the key value as Microsoft Internet Explorer, press F5 to refresh and take effect.
Tip: If you are a user of Windows 2000/XP/Server 2003, the above three examples can be modified using the system group policy. Enter the "" command in the "Running Bar" of "Start" to call up the "Group Policy Editor" window, click to expand "User Configuration", "Windows Settings", "Internet Explorer Maintenance", and "URL" layer by layer. Double-click the "Important URL" item in the right window, click the "Custom Home URL" check box in the pop-up dialog box, and enter the required URL in the text box that is activated.
Illegal link was added to the right-click menu
Attack features: By modifying the registry, links to illegal sites are added to the right-click pop-up menu.
Clear method: Open the registry editor and open it in the following order: HKEY _CURRENT_USERSoftwarePoliciesMicrosoft Internet Explorer MenuExt branch. In the left window, all primary keys that belong to illegal links are deleted. Press F5 to refresh and take effect.
Right-click menu is disabled
Attack features: By modifying the registry, the right mouse button pop-up menu function is completely banned in IE browser, and right click in IE has no response.
Clear method: Open the registry editor and open it in the following order: HKEY _CURRENT_USERSoftwarePoliciesMicrosoft Internet ExplorerRestrictions branch, find the "NoBrowserContextMenu" key value name, set its key value to "00000000", and press the F5 key to refresh and take effect.
IE favorites were forcibly added to the address link of the illegal website
Attack features: By modifying the registry, link information of illegal websites is automatically added to the IE favorites.
Clear method: Please clear it manually, right-click to move to the illegal website information, right-click to pop up the menu, and select Delete.
IE toolbar was illegally added to buttons
Attack Features: Add an illegal button icon in the toolbar.
Clear method: Click the icon directly, in the right mouse button pop-up menu, and select "Delete".
A brief analysis of safety hazards of E-mail
As the most widely used communication tool in interpersonal communication on the Internet, its security issues have attracted attention from all parties several years ago. Simply put, the security issues of E-mail mainly include the following direct or indirect aspects:
●Password stolen
Many methods such as *s, violent guessing, software vulnerabilities, and sniffing may make the email password give it to others without realizing it.
●Email content was intercepted
●The attachment contains a large number of viruses
It often takes advantage of people's eagerness to receive emails and is easily attracted by email subjects, and sneaks into and destroys computers and the Internet. At present, the harm of email viruses is far greater than that of traditional viruses.
●Email bomb attack
●Defects in their own design
Below, we will discuss some practical and feasible prevention measures based on the various threats that email may pose to us, starting from the purpose of ensuring the security of email and email, and the security of the system.
Email client software usage restrictions
Since email client software (such as Foxmail) is an operating environment for sending and receiving mail, we can regard it as the first line of defense to restrict the use of email client software. Taking Foxmail as an example, depending on the operating system, there are usually several restrictions:
1. In operating systems with incomplete security design such as Windows 98, third-party security tools such as PC Security can be used to complete the use of Foxmail. After installing the software, just right-click the Foxmail icon and select "PC Security" and "Lock" in the pop-up shortcut menu to achieve the "lock" restriction effect. When you need to use Foxmail, you must enter the corresponding unlock password before you can use Foxmail.
2. When using systems with better security such as Windows XP, in addition to third-party encryption tools such as PC Security, you can also use the encryption function of the system itself. The premise is that the Foxmail software should be installed in the NTFS partition, and then you can right-click the icon, select "Properties" in the pop-up menu, click to switch to the "Security" tab setting interface, and set up users who are authorized to use this program as needed.
Security measures for email passwords
Email passwords are one of the most easily cracked registration passwords. Their harm and wide range cannot be ignored. Therefore, we should adopt the following measures to minimize risks:
1. It is strongly recommended to use "unregular password combinations of sufficient length + passwords that are replaced regularly".
2. Setting a password prompts questions and answers should be complicated. When registering an email, you will need to set up a password to prompt the problem, which is used when restoring your password. But this will sometimes give hackers the opportunity to "guess"! For example, some users’ prompt question is 123, and the answer is 321. Then a little experienced hacker will first test such questions and answers, so as to crack the email address without any effort. Therefore, for this prompt question and password, it is better to give a problem password that is both meaningful and easy to remember and not easily guessed by hackers.
Encryption of emails
Email encryption is a relatively effective security precaution against email content, and HotCrypt is such a software for email encryption, which is very suitable for beginners. HotCrypt adopts advanced encryption algorithms, which can effectively ensure the security of data. It supports any mail program or other file editing window, and can be quickly encrypted through hotkeys, making it easy to use. Next, we will introduce in detail how to encrypt email under Foxmail:
Step 1: After running HotCrypt and editing content in the Foxmail email compilation window, press the key combination "Ctrl+E" to call up the HotCrypt's encryption window to encrypt the email
Step 2: After entering the password in the text box below "Enter Password", click the "OK" button to return to the email editing window. You will find that the content of the email text has become an encrypted ciphertext.
Tip: HotCrypt can only encrypt content in the uppermost current window. When a friend receives this email, he also needs to press the key combination "Ctrl+D" to call up the password input window and enter the correct password before he can read the content of the email normally.
Prevention of email viruses
As emails become an important means of daily communication, the shadow of the virus has also begun to surround the emails. Today, more than 70% of computer viruses are spread by email. So how can we block email viruses more comprehensively? Usually the following measures can be used:
1. Forbid other programs to send emails in secret
In order to prevent the email virus from automatically querying the user's address book, it will be sent to the user's relatives and friends in the name of the user. Taking Outlook Express 6.0 as an example, we can set it as follows:
Click "Tools → Options → Security" in sequence, and click the check box before the "Warn me when another application tries to send emails in my name" option in the settings interface, so that any silent "underground mail sending activity" will be discovered and reported to the user immediately.
2. Start the self-antivirus option of Outlook Express 6.0
Since most email viruses are transmitted by loading email attachments, you can use the method of prohibiting OE from opening attachments to prevent such viruses from invading them. The method is as follows: Run OE6.0, click "Tools", "Options", and "Safe", and then select the check box in the settings interface before the "Don't allow saving or opening attachments that may have viruses" tab, so that the OE's self-protection mechanism function can be enabled.
3. Modify the association
Some worms are spread through mail attachments in formats such as .vbs. To reduce the risks brought by such viruses, an easy way is to modify the associated properties of the file so that when opening the script file (for example, the user double-clicks an attachment) it will not run automatically. Open the Control Panel of Windows XP, double-click the "Folder Options", select the "File Type" tab, and select the .vbs file type.
Then change its default operation to Notepad (rather than running with VBScript by default), click the "Advanced" button, select "Edit" in the "Edit File Type" dialog box, and specify the open program as Notepad in the "Edit this type of operation" dialog box that pops up.
Tip: The same modification can be made to file types such as .vbe, .wsf, .wsh, .js and .jse. The method of modifying file association attributes cannot isolate all risks.
After modifying the associated properties of the file, when you click on a script file, it will no longer run automatically as it used to be, but will be opened with Notepad and in editing state. If you want to run a script, you must explicitly specify in the script's shortcut to open the script file.
4. Use antivirus software
Now most antivirus software provides the function of virus detection on email content. For example, Rising antivirus software can do this well. It allows us to automatically detect viruses on emails when sending and receiving emails to prevent the system from being "poisoned".
Prevention of mailbox bombs
The prevention of mail bombs is complicated and it is difficult to ensure that it is foolproof. However, we can use the following methods to avoid mail bomb attacks and handle aftermath as much as possible:
●Don't disclose your mailbox address at will
●Hide your email address
If you change shy@ when entering, everyone knows that this is actually an email address, but some email automatic search software cannot recognize such a "email address".
● Use the automatic reply function with caution
The original intention of the "automatic reply" function is very good, but it may also be used to create mail bombs! Just imagine, if both the receiving and sending parties set the "automatic reply" setting, and neither party reads the letter in time, an email bomb will be created in the repeated "automatic reply".
Patch it well
In software design, some unexpected errors and vulnerabilities often occur, bringing hidden dangers to the program in terms of security and stability. Therefore, keeping software updates frequently is the easiest and most direct way to ensure system security. Taking the SP1 Simplified Chinese version download and installing Outlook Express 6.0 as an example, the download URL of the patch is: /downloads /?familyid = 0cf81200-dd86- 4636 - 8ae5 - 3f4af4e829d8&&displaylang =zh-cn
Mail backup
When it comes to email security, we must not talk about the topic of backup, but since the methods of email backup are often used due to different software, many methods can be used, so this article is not convenient to describe in detail. However, basically, you should set up a special directory for the received emails and export the "Address Book" and other backup operations.
Defense IE: 7 IE maintenance techniques
Home page settings are blocked and locked
Attack features: Home page settings are disabled, the address bar turns gray and blocks.
Clear method: Open the registry editor, open it in the following order: HKEY_LOCAL_USERSofwareMicrosoft Internet ExplorerMain branch, create a new "ControlPanel" primary key, and then create a new DWORD value with the key value named "HomePage" under this primary key, and the value is "000000000", press F5 to refresh and take effect.
The default search engine is modified
Attack Features: Change IE's default search engine.
Clear method: Open the registry editor and open it in the following order: [HKEY_LOCAL_MACHINESoftwareMicrosoft Internet ExplorerMain branch, find the "SearchPage" key value name, click "Modify" in the right window, and enter its key value as: {SUB _RFC1766}/srchasst/, and then find the "CustomizeSearch" key value name, modify its key value to://srchasst/, and press F5 to refresh and take effect.
Illegal information was added to the IE title bar
Attack features: By modifying the registry, the IE title bar is forcibly added to the advertising information of the website, and there is a "htttp://www.*********.com" tail on the blue title bar at the top of the IE.
Clear method: Open the Registry Editor, open the HKEY_CURRENT_USERSoftwareMicrosoft Internet ExplorerMain branch in the following order, find the "Window Title" key value name, enter the key value as Microsoft Internet Explorer, and press F5 to refresh. Then open it in the following order: HKEY_LOCAL_MACHINESoftware Microsoft Internet ExplorerMain branch, find the "Window Title" key value name, enter the key value as Microsoft Internet Explorer, press F5 to refresh and take effect.
Tip: If you are a user of Windows 2000/XP/Server 2003, the above three examples can be modified using the system group policy. Enter the "" command in the "Running Bar" of "Start" to call up the "Group Policy Editor" window, click to expand "User Configuration", "Windows Settings", "Internet Explorer Maintenance", and "URL" layer by layer. Double-click the "Important URL" item in the right window, click the "Custom Home URL" check box in the pop-up dialog box, and enter the required URL in the text box that is activated.
Illegal link was added to the right-click menu
Attack features: By modifying the registry, links to illegal sites are added to the right-click pop-up menu.
Clear method: Open the registry editor and open it in the following order: HKEY _CURRENT_USERSoftwarePoliciesMicrosoft Internet Explorer MenuExt branch. In the left window, all primary keys that belong to illegal links are deleted. Press F5 to refresh and take effect.
Right-click menu is disabled
Attack features: By modifying the registry, the right mouse button pop-up menu function is completely banned in IE browser, and right click in IE has no response.
Clear method: Open the registry editor and open it in the following order: HKEY _CURRENT_USERSoftwarePoliciesMicrosoft Internet ExplorerRestrictions branch, find the "NoBrowserContextMenu" key value name, set its key value to "00000000", and press the F5 key to refresh and take effect.
IE favorites were forcibly added to the address link of the illegal website
Attack features: By modifying the registry, link information of illegal websites is automatically added to the IE favorites.
Clear method: Please clear it manually, right-click to move to the illegal website information, right-click to pop up the menu, and select Delete.
IE toolbar was illegally added to buttons
Attack Features: Add an illegal button icon in the toolbar.
Clear method: Click the icon directly, in the right mouse button pop-up menu, and select "Delete".