(12) United States Patent (10) Patent No.: US 7,194,515 B2 Kirsch (45) Date of Patent: *Mar

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 7,194,515 B2 Kirsch (45) Date of Patent: *Mar US0071945.15B2 (12) United States Patent (10) Patent No.: US 7,194,515 B2 Kirsch (45) Date of Patent: *Mar. 20, 2007 (54) METHOD AND SYSTEM FOR SELECTIVELY (56) References Cited BLOCKING DELIVERY OF BULK U.S. PATENT DOCUMENTS ELECTRONIC MAIL 5,815,665 A * 9/1998 Teper et al. ................ 709,229 (75) 6,195,698 B1* 2/2001 Lillibridge et al. ......... 709/225 Inventor: Steven T. Kirsch, Los Altos, CA (US) 6,199,102 B1* 3/2001 Cobb ......................... TO9,206 (73) Assignee: Google Inc., Mountainview, CA (US) * cited by examiner (*) Notice: Subject to any disclaimer, the term of this Primary Examiner Viet D. Vu patent is extended or adjusted under 35 (74) Attorney, Agent, or Firm—Fenwick & West LLP. U.S.C. 154(b) by 588 days. (57) ABSTRACT This patent is Subject to a terminal dis The origin address of an e-mail message is validated to claimer. enable blocking of e-mail from spam e-mail sources, by preparing, in response to the receipt of a predetermined (21) Appl. No.: 10/407,586 e-mail message from an unverified source address, a data key encoding information reflective of the predetermined (22) Filed: Apr. 3, 2003 e-mail message. This message, including the data key, is then issued to the unverified source address. The computer (65) Prior Publication Data system then operates to detect whether a response e-mail US 2003/O1673 11 A1 Sep. 4, 2003 message, responsive to the challenge e-mail message, is received and whether the response e-mail message includes Related U.S. Application Data a response key encoding predetermined information reflec tive of a predetermined aspect of the challenge e-mail (63) Continuation of application No. 09/208,330, filed on message. The unverified source address may be recorded in Dec. 9, 1998, now Pat. No. 6,546,416. a verified source address list. Thus, when an e-mail message is received, the computer may operate to accept receipt of a (51) Int. Cl. predetermined e-mail message on condition that the source G06F 3/00 (2006.01) address of the predetermined e-mail message is recorded in (52) U.S. Cl. ...................... 709/206: 709/225; 709/229; the verified source address list and alternatively on condition 709/237 that the predetermined e-mail message includes the response (58) Field of Classification Search ................ 709/206, key. 709/217, 219, 225, 227, 237,250, 229; 713/201 See application file for complete search history. 6 Claims, 4 Drawing Sheets OUT-BOUND MESSAGE AO IN-BOUND MESSAGE 42 H *EP v. CHALLENGE / 28 4s LIST Y. n.S.1 (e) 44 A6 --~26I (e) REJECT S U.S. Patent Mar. 20, 2007 Sheet 1 of 4 US 7,194,515 B2 F.G. 1 1O OUT-BOUND MESSAGE N-BOUND MESSAGE 42 28 v CHALLENGE/& 48 SL (e)- 46 E-26 U.S. Patent Mar. 20, 2007 Sheet 2 of 4 US 7,194,515 B2 NSERT INTO NBOUND EMP-QUEU FG. 3 64 USER RECEIVE DENTFY SENDER -N-1 6 ACCEPT TRANSFERO PROMPT TO LISTED N-QUEUE UPDATE LISTS UPDATE CHALLENGE U.S. Patent Mar. 20, 2007 Sheet 3 of 4 US 7,194,515 B2 NBOUND INSERT ENTO FG. 4 TEMP-QUEUE 102 ROBOT RECEIVE 100 --/ SWITCH ACCOUNT TRANSFERTO N-QUEUE 116 UPDATE REMOVE FROM CHALLENGE PROMP TO TEMP-QUEUE v LIST UPDATE LISTS 1O 8 'N - - - - 110 118 PREPARE MESSAGE 122 34 USER SEND PREPARE SIGNATURE OUT BOUND 120 ur 13 O 136 F.G. 5 ADDRECIPIENT TO ACCEPT LIST 128 U.S. Patent Mar. 20, 2007 Sheet 4 of 4 US 7,194,515 B2 EXAMINE CHAENGEJST ENTRIES 146 REMOVE FROM TEMP-QUEUE 48 US 7,194,515 B2 1. 2 METHOD AND SYSTEM FOR SELECTIVELY nated Received, are added to the message as the message BLOCKING DELIVERY OF BULK passes through the mailer sub-systems of ISPs and other ELECTRONIC MAIL computer systems as necessary to reach a destination domain user. These Received lines are nominally beyond the BACKGROUND OF THE INVENTION 5 control of individual bulk e-mailers. The definition and use of these header fields is specified in Request for Comments 1. Field of the Invention (RFCs)/Standards (STDs) documents 821/10, 822/11, and The present Invention is generally related to systems and 974/14, among others, which are publicly available from methods of managing communications by electronic mail multiple sources on the Internet. and, in particular, to a method and system for detecting and 10 Bulk e-mailers use anonymous mailers and re-mailers to blocking the receipt of unsolicited commercial electronic obscure the required e-mail header lines of their UCE by mail. specifying non-existent e-mail systems and accounts. Modi 2. Description of the Related Art fied mailers can be used to completely remove header lines With the expansion of the Internet as a medium for the or to substitute addresses of known valid Internet e-mail transport of electronic mail (e-mail), an advertising practice 15 accounts that are not actually associated with the bulk of sending unsolicited commercial e-mail (UCE or "spam) e-mailer. has developed as an annoyance to other uses and users of the These techniques are generally sufficient to prevent the Internet. Indeed, the volume of UCE received by an e-mail UCE recipients from being able to identify and complain to recipient may regularly be a Substantial percentage of all the postmaster of the relevant ISP about the activities of a e-mail received. 2O bulk e-mailer. While the Received lines provide traceable Bulk e-mailers, as the sources of UCE are commonly information, the complexity of filtering through this infor referred to, utilize the resources of the Internet itself, includ mation is usually beyond the level of effort that most UCE ing specifically, the Usenet news network, Web based dis recipients will undertake. Even for those that do, the number cussion groups, Web based indices of users and organiza of public complaints actually received by the ISP is signifi tions, and other public or pseudo-public information sources 25 cantly reduced, often allowing the bulk e-mailer to remain in to gather e-mail addresses. E-mail address lists are also operation, if only for a longer period of time before being available for purchase from various organizations who at forced to find a new ISP to use for their activities. least purport to provide targeted lists. The quality of targeted A variety of techniques have been developed in the recent lists, however, tends to degrade rather quickly over time due past to deal with the growing amount of UCE being received to the fluid nature of the Internet and the changing interests 30 by Internet e-mail users. These techniques primarily include of Internet users. Consequently, there is an obvious interest e-mail client systems Supporting manual e-mail accept and by the bulk e-mailers to oversubscribe their mailing lists reject lists, automated context analysis, use of public shared with any and all e-mail addresses that are possibly relevant lists of known spam sources, and direct challenge systems. targets for the content of any particular UCE. None are completely effective and all impose an additional There is also little commercial constraint limiting the 35 degree of operating complexity on the e-mail client user to lowering of the relevancy threshold used by bulk e-mailers Varying degrees. due to the beneficial cost structure that most bulk e-mailers The typical e-mail accept and reject list approach, as used enjoy. The only actual cost to the bulk e-mailer for sending in the ProntoMail(R) e-mail client, provides for lists of e-mail additional UCE is, at most, the incremental cost of acquiring addresses that are used as gate filters against incoming additional e-mail addresses and the incremental connection 40 e-mail. E-mail with addresses on the accept list are passed, cost required to send a UCE message. Many higher band while messages with addresses on the reject list are dis width Internet connections are structured for continuous carded; the reject list is a blocking filter. By default, e-mail availability at a fixed fee. Bulk e-mailers with these types of addresses not on either list are presented to the user to connections therefore effectively incur no additional cost for determine which list to add the address to. As a result, the sending UCE to as many e-mail addresses they have 45 user sees all of the UCE that originates from any address that acquired. is new to the user's e-mail client. Since the bulk e-mailers Fortunately, there is at least one significant non-economic, to hide or frequently change their return e-mail addresses, or at least not directly economic, cost-of-business faced by almost all of the UCE is seen by the e-mail client user. bulk e-mailers. Internet access for all users is channeled Automated context analysis, such as implemented by through Internet Service Providers (ISPs) at some level. As 50 DeadLetter R, a Eudora.R. plug-in, relies on key word usage predominantly service oriented organizations, these ISPs are and various patterns of advertisement pitches to discern usually responsive to complaints from the general Internet UCE from other e-mail. Suspected UCE is automatically public concerning excessive UCE being sent from any discarded or, more typically, directed to an alternate e-mail domain serviced by a particular ISP or from a subscriber ISP in-box of the client. Since the analysis is not and as a site served by a higher level ISP.
Recommended publications
  • Learning Outcomes - Email Etiquette Training Program (Part A)
    Learning Outcomes - Email Etiquette Training Program (Part A) By the end of this course, participants will: Develop a heightened awareness of the potential perils of digital communication Master effective email structures to achieve clarity and successful communication Learn to write for the reader, starting with effective subject lines Make the most of 'email estate' Carefully consider the email recipients Learn to work within principles or 'rules of thumb' to ensure professional, clear & effective emails Perfect grammar because it matters Format messages for readability Learn to write professionally and brand Broadcast emails Learn to avoid senders regret by proof reading Understand 'netiquette' Master the inbox using some core principles and email functions Program Outline – Email Etiquette Training Program Topic 1 – Introduction As with any form of communication, there are certain rules of behavior which should be considered when using email. Email is written communication, but it does not have the formality of earlier written forms. It has a much more immediate, less formal feel than paper, pen, and stamp mail. Email is also essentially one - way communication. There is no immediate feedback and interaction. Also, written communication by definition allows far fewer context clues to its meaning as face - to -face and telephone conversation. Any written communication must be carefully considered so that it is not misunderstood, but email lends itself to casual interaction. The potential for real misunderstanding is clear. When you compose an email message, pause and read over it again before you send it. Once it is sent, you can't get it back. Remember that your grammar, spelling, and vocabulary send a message as clear as the words.
    [Show full text]
  • Email Policy & Procedures
    EMAIL POLICY & PROCEDURES Issued by: Technology Steering Committee Applies to: All members of the University granted an Email account Effective date: March 2003 Introduction New Jersey City University (NJCU) recognizes the need for efficient communications with its students, faculty, and staff. This policy was established to enable official email communications with students, faculty, and staff. Revised April 2018 1 PURPOSE Electronic Mail (email) is recognized as one of the most effective ways to disseminate information of importance, relevance and interest to members of the University and larger, global community in a timely manner. It is therefore important to define the University’s policy on email and offer appropriate procedures on the use of this technology. This document serves as the University’s policy on email and distribution lists, as well as appropriate procedures and guidelines for their use. SCOPE This information is for all members of the University who are granted an official NJCU email account. In addition to general policy and procedures that apply to all members, specific responsibilities and procedures are provided for both employees and students. DEFINITIONS Email – Electronically delivered messages addressed to specific email account holders. Email Account – A username and password assigned to a user that allows access to email services. Listserv – Software that creates email distribution lists. Email Server – A server-class computer that has been configured to accept and forward email messages on behalf of a registered account holder (the sender), and to receive and deliver messages to members registered to a server (the receiver). MS Exchange® Server – A specialized Microsoft email server that provides extended enterprise capabilities through Microsoft Office Outlook.
    [Show full text]
  • Using MCP EMAIL
    Using MCP EMAIL Using MCP EMAIL Paul Kimpel 2009 UNITE Conference Session MCP-4005 Wednesday, 11 November 2009, 10:30 a.m. Copyright © 2009, All Rights Reserved Paradigm Corporation Using MCP EMAIL 2009 UNITE Conference Minneapolis, Minnesota Session MCP-4005 Wednesday, 11 November 2009, 10:30 a.m. Paul Kimpel Paradigm Corporation San Diego, California http://www.digm.com e-mail: [email protected] Copyright © 2009, Paradigm Corporation Reproduction permitted provided this copyright notice is preserved and appropriate credit is given in derivative materials. 2009 UNITE MCP-4005 1 Using MCP EMAIL Presentation Topics Overview of Email Concepts Email Sending Methods for the MCP MCP OBJECT/EMAIL Utility What is it? Installation and configuration Running the utility Parameter string syntax SEND options Using the EMAIL API Errors, retry, and troubleshooting So, What Good Is It? MCP-4005 2 Today I would like to discuss what is to me one of the nicest facilities of the MCP – the ability to send email messages from MCP-resident applications. I'll start with a brief overview of email in general – the components, protocols, and message formats used. Next, I'll briefly discuss a few methods for sending email from MCP applications, using both bundled and third-party solutions. The bulk of this presentation will be devoted to one of those methods, the OBJECT/EMAIL utility that is bundled with the standard MCP release. I will discuss how to install and run the utility, the components of its command parameter syntax, options it supports for sending email messages, how it can be called from application programs in addition to run as a utility program, and how it handles errors and retry operations.
    [Show full text]
  • The Enigmail Handbook 1.0.0
    openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook Contents 1. Setup and usage.......................................................................... 5 1.1. What do you need?................................................................................... 5 1.2. How to install Thunderbird.........................................................................5 1.3. How do I install Enigmail?......................................................................... 6 2. Quick start guide......................................................................... 8 2.1. The Setup Wizard......................................................................................9 2.2. Start using Thunderbird with Enigmail.....................................................28 3. Key management....................................................................... 30 3.1. Operations on your key pair.................................................................... 31 3.2. Distributing your public key..................................................................... 35 3.3. Importing public keys...............................................................................36 3.4. Validity of public keys.............................................................................. 37 3.5. Importing an existing key pair..................................................................42 3.6. Generating
    [Show full text]
  • Securing E-Mail
    Securing E-Mail Contents Chapter 1 – Introduction and Overview Chapter 2 – E-mail Programs Chapter 3 - What is PGP? Chapter 4 - Set Up Your Gmail Mailbox For IMAP Chapter 5 - Set Up the Mozilla Thunderbird E-mail Client On Your Computer Chapter 6 - Install and Configure PGP with Thunderbird Chapter 7 – Add Public PGP Keys to Thunderbird Chapter 8 – Backup All Your Keys Chapter 9 – Thunderbird and PGP Conclusion Chapter 10 – Confirm it Works Chapter 11 – Setting Up PGP On Another Computer With Thunderbird Chapter 12 – Frequently Asked Questions (FAQ) Chapter 1 – Introduction and Overview If you are in the medical profession then you’re already familiar with Health Insurance Portability and Accountability Act, otherwise referred to as HIPAA. Basically, it has nothing to do with Heath or Insurance. The primary purpose of HIPAA is the protection of personal sensitive medical information that is stored, transferred or transmitted over electronic devices and pathways. Of course, this also includes patient medical information sent via e-mail. Data encryption is one of the most common and effective ways to prevent serious information breaches, such as unauthorized access to PHI. Encryption is such a powerful security measure that breaches of encrypted health information are not considered reportable security incidents unless the encryption key has also been taken. Granted, e-mail encryption is not mandated under HIPAA regulations. However, if a company does not utilize encryption as a security measure, then it must implement an equivalent method for the transfer of sensitive patient information from one entity to another. Presently, many medical professionals utilize 3rd party websites that allowed for controlled protected access to patient information that is uploaded to the third-party server.
    [Show full text]
  • Docusign Signature Appliance Client User Guide Version 8.0
    1 DocuSign Signature Appliance User Guide DocuSign Signature Appliance Client User Guide Version 8.0 221 Main Street, Suite 1000, San Francisco, CA 94105 Ι Tel. 866.219.4318 Ι www.docusign.com Ι © DocuSign, Inc. DocuSign Signature Appliance User Guide 2 Copyright ©2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign Intellectual Property page (https://www.docusign.com/IP) on the DocuSign website. All other trademarks and registered trademarks are the property of their respective holders. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of DocuSign, Inc. Under the law, reproducing includes translating into another language or format. Every effort has been made to ensure that the information in this manual is accurate. DocuSign, Inc. is not responsible for printing or clerical errors. Information in this document is subject to change without notice. DocuSign Signature Appliance Client User Guide, version 8.0 If you have any comments or feedback on our documentation, please send them to us at: [email protected]. 221 Main Street, Suite 1000, San Francisco, CA 94105 Ι Tel. 866.219.4318 Ι www.docusign.com Ι © DocuSign, Inc. DocuSign Signature Appliance User Guide 3 Table of Contents Chapter 1: Overview ............................................................................................................................ 1 Requirements
    [Show full text]
  • United States Patent (10) Patent No.: US 7,194.618 B1 Suominen (45) Date of Patent: Mar
    US0071946.18B1 (12) United States Patent (10) Patent No.: US 7,194.618 B1 Suominen (45) Date of Patent: Mar. 20, 2007 (54) ENCRYPTION AND AUTHENTICATION 5,509,071 A 4, 1996 Petrie, Jr. et al. ............... 380/4 SYSTEMIS AND METHODS 5,533,123 A 7/1996 Force et al. ................... 380/4 5,544,045 A 8, 1996 Garland et al. ........ 364/419.03 (76) Inventor: Edwin A. Suominen, 3355 E. Jump Off Siswk - A 5E, E.Ollill et al.. ..... .- -. .- S. Joe Rd., Valley, WA (US) 99181 5,638,446 A 6/1997 Rubin ........... 380.25 (*) Notice: Subject to any disclaimer, the term of this 5,727,0625,646,992 A 3/19987/1997 Subleris et alsoal. .................. ... 38037380/4 patent is extended or adjusted under 35 5,748,738 A 5/1998 Bisbee et al. ................. 380.25 U.S.C. 154(b) by 593 days. 5,761,686 A 6/1998 Bloomburg .... ... 707/529 5,768,384 A 6/1998 Berson ........................ 380.23 (21) Appl. No.: 10/092,943 (Continued) (22) Filed: Mar. 5, 2002 FOREIGN PATENT DOCUMENTS Related U.S. Application Data EP O 880 254 A2 11/1998 JP 2000224407 A 8, 2000 (60) Provisional application No. 60/273,862, filed on Mar. WO WO 98.17029 4f1998 5, 2001. WO WO O1/35253 5, 2001 (51) Int. Cl. OTHER PUBLICATIONS G06F I/24 (2006.01) “CryptoEx Office; Signature for Electronic Documents.” Web page (52) U.S. Cl. ...................... 713/155: 713/161; 713/168; printout from http://www.cryptoex.com/crytoexv3/office. 713/169; 713/182 aspx?lang=en.
    [Show full text]
  • Netwire Remote Access Trojan (RAT)
    Netwire Remote Access Trojan (RAT) Overview On 22 October, we observed an email campaign distributing the Netwire remote access trojan (RAT), also known as Recam and NetWiredRC.1 Since 2012, threat actors and at least one advanced persistent threat (APT) group2 have been using this publicly available, multiplatform tool in campaigns targeting a variety of systems and industries in the Middle East. Customer Impact Netwire’s capabilities include keylogging and credential stealing, as well as reading, writing and deleting victim data. On 23 September, Fortinet reported finding a new variant that uses anti-sandboxing and anti-debugging techniques to evade attempts at analysis. One of the checks Netwire conducts is to wait for the victim to move their mouse and produce two different cursor positions before continuing to run.3 Fortinet also found that among the software credentials stored on a victim’s computer, Netwire focused on stealing those for 360Chrome, Opera, Mozilla Firefox, Mozilla SeaMonkey, Google Chrome, Comodo Dragon browser, YandexBrowser, Brave-Browser, Mozilla Thunderbird, Microsoft Outlook, and Pidgin. Campaign Analysis In the campaign we observed, the emails spoofed a message from a trading company and claimed to contain a purchase order for October. The body sought to lure the recipient into opening the attached file by requesting that they return the invoice with a corrected number to the manager in the signature block. All the email attachments in the campaign had the same file SHA256 hash. The attachment was a tape archive (TAR) file that was named to look like a Microsoft Excel file, and which decompressed to an EXE of the same name.
    [Show full text]
  • Docusign Signature Appliance Release Notes September 2016
    DocuSign Signature Appliance - Release Notes | September 2016 1 DocuSign Signature Appliance Release Notes September 2016 This file is part of DocuSign Signature Appliance distribution and is covered under the same License Agreement This document contains technical release notes for all DocuSign Signature Appliance versions and complements information written in the DocuSign Signature Appliance User Manual. Please read through the DocuSign Signature Appliance documentation and the release notes before installing the DocuSign Signature Appliance. Updated: October 5, 2016 DocuSign Signature Appliance - Release Notes | September 2016 2 Table of Contents Table of Contents 2 Release Notes – DocuSign Signature Appliance Version 8.2 4 Known Problems/Limitations/Warnings 7 Release Notes – DocuSign Signature Appliance Version 8.3 8 Release Notes – DocuSign Signature Appliance Version 8.1 9 Release Notes – CoSign Version 8.0 13 Release Notes – CoSign Connector for SharePoint 7.3.2 19 Release Notes – CoSign Version 7.5 20 Release Notes – CoSign Version 7.4 26 Release Notes – CoSign Connector for SharePoint 7.3 31 Release Notes – CoSign Connector for SharePoint 7.2 32 Release Notes – CoSign Version 7.1 33 Release Notes – CoSign Connector for SharePoint 7.1 39 Release Notes – CoSign Connectors for SharePoint 6.5.4 41 Release Notes – Client Version 6.2.7 42 Release Notes – CoSign Connectors for SharePoint 6.5.3 43 Release Notes – CoSign Connectors for SharePoint and Nintex 6.5 44 Release Notes – CoSign Version 6.2 46 Release Notes – Appliance Version
    [Show full text]
  • Curating E-Mails: a Life-Cycle Approach to the Management and Preservation of E-Mail Messages
    1 DCC Curation Manual DCC Curation Manual Instalment Curating E-Mails: A life-cycle approach to the management and preservation of e-mail messages Author: Maureen Pennock Date: June 2006 Author Bio Maureen is a Research Officer for the DCC, based at UKOLN at the University of Bath. She has been involved in digital preservation since 2001 when she joined the Dutch government Digital Preservation Testbed research project. She later worked at the Dutch National Archives on the EC-funded ERPANET project, and on the e-government knowledge centre project at the Dutch ICT Foundation (Stichting ICTU). Her main areas of interest lie in strategies for digital preservation, digital record-keeping and digital archiving, digital cultural heritage, and authenticity of digital records. She joined the DCC in Autumn 2005. Maureen Pennock, Curating E-Mails 2 1. Introduction and scope The rise and proliferation of digital technologies has resulted in an expansion of opportunities for institutions to create, manage, and maintain records and documents in digital form. One of the forms which these records often take is e-mail. The first electronic message – e-mail for short – was sent in the 1960's over a single mainframe system and network e-mail followed shortly after in the early 1970's. Sadly, the message that was sent was not recorded for posterity. The subject of the message is unclear and the contents of the message have been lost to the so-called 'digital dark ages'. This initial failure to preserve was indicative of what was to follow: modern companies in the twenty-first century have collectively been fined billions of dollars for failing to adequately manage and preserve corporate e-mail records, and others have been similarly fined for creating and retaining inappropriate e-mail records.1 Despite the fact that e-mail forms the backbone of communications in many modern institutions and organisations, it is often badly managed and the long-term preservation of e-mail messages is a challenge for which most solutions have yet to be put to the test.
    [Show full text]
  • Protection and Firewalls
    Lectures on Distributed Systems System Protection and Firewalls Paul Krzyzanowski INTRODUCTION Computer security was an issue since the earliest days of digital computers. The ear- liest computers, such as the eniac1 and the Colossus2 were designed for military use, the former to compute ballistic firing tables and the latter to decipher German Lo- renz3 codes. These were primitive machines: running no operating system, running a single “process,” and operated by a single user. Nevertheless, security of their data (or even of their existence, in the case of Colossus) was of paramount importance. This was achieved via physical security – guarded buildings, armed guards, face-to-face authentication. Things have changed since then. We have sensitive data coexisting with data of others on the same file servers. Multiple processes run on the same machine. As we started to work a distance and use data communication networks, those networks be- came avenues for snooping: authentication sessions and data transfers could be grabbed. To make matters even more complex, we actually want to run other peo- ple’s code on our machines. It’s unlikely that we will write all the code that runs on our machines, so we rely on externally-produced operating systems, compilers, and applications. We are somewhat at ease when these come from trustworthy sources (trusted vendors, such as Adobe, Macromedia, Apple, et alia) but we also want to run applications from random parties – applets that are loaded with our web pages or miscellaneous games that we may spontaneously download. This can open up a Pan- dora’s box of problems: how do we know that the applications are not performing malicious acts behind their innocent façade? 1 Completed in 1945 at the Moore School of Electrical Engineering at the University of Pennsylvania.
    [Show full text]
  • GFI Software Help
    EMAIL CLIENTS GUIDE Discover how to use various email clients with Kerio Connect. The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind, either express or implied, including without limitation any warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software disclaims and in no event shall be liable for any losses or damages of any kind, including any consequential or incidental damages in connection with the furnishing, performance or use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no warranty, promise or guarantee about the completeness, accuracy, recency or adequacy of information contained in this document and is not responsible for misprints, out-of-date information, or errors. GFI reserves the right to revise or update its products, software or documentation without notice. You must take full responsibility for your use and application of any GFI product or service. No part of this documentation may be reproduced in any form by any means without prior written authorization of GFI Software. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical. GFI and Kerio Connect are trademarks or registered trademarks of GFI Software or its affiliates in the US and other countries. Any other trademarks contained herein are the property of their respective owners. Kerio Connect is copyright of Kerio.
    [Show full text]