ط
Addressed companies Google, Microsoft, and Yahoo for Internet services, weaknesses in blades secure e-mail systems have, and that can allow for a professional breakthrough information networks Send a fake can penetrate systems confirm the identity of the owner of the email address means calculation.
The weakness that affect what is known as'' domain keys to an identifier'' or'' de. K.. Viz. M.'' a secure system used by major corporate e-mail in order to protect the e-mail addresses of users of the theft. This system analyzes the signature-CODE any e-mail to make sure the domain name that the message was sent, which helps further distinguish real messages for fraudulent messages.
Foundation'' says Yu. S. - C. E. R. T'' for information security consulting The problem lies in the fact that the increasing power of computers and the ability to handle larger amounts of data allows professionals to become data theft to circumvent this security system.
It was discovered this problem mathematician Zachary Harris in Florida, when he managed through calculations Send an e-mail message from no own thing and do not know its password.
Google Inc. has been confirmed the existence of this problem when the message was sent fake Sergey Brin, Larry Page and are the founders of Google.
Three companies have succeeded Google, Yahoo and Microsoft to eliminate these gaps in order to ensure greater insurance for e-mail.

Addressed companies Google, Microsoft, and Yahoo for Internet services, weaknesses in blades secure e-mail systems have, and that can allow for a professional breakthrough information networks Send a fake can penetrate systems confirm the identity of the owner of the email address means calculation.
The weakness that affect what is known as'' domain keys to an identifier'' or'' de. K.. Viz. M.'' a secure system used by major corporate e-mail in order to protect the e-mail addresses of users of the theft. This system analyzes the signature-CODE any e-mail to make sure the domain name that the message was sent, which helps further distinguish real messages for fraudulent messages.
Foundation'' says Yu. S. - C. E. R. T'' for information security consulting The problem lies in the fact that the increasing power of computers and the ability to handle larger amounts of data allows professionals to become data theft to circumvent this security system.
It was discovered this problem mathematician Zachary Harris in Florida, when he managed through calculations Send an e-mail message from no own thing and do not know its password.
Google Inc. has been confirmed the existence of this problem when the message was sent fake Sergey Brin, Larry Page and are the founders of Google.
Three companies have succeeded Google, Yahoo and Microsoft to eliminate these gaps in order to ensure greater insurance for e-mail.
ليست هناك تعليقات:
إرسال تعليق