Kmail, Evolution, Thunderbird, and Claws Mail GOT MAIL Jürgen Acker, Photocase.Com

Total Page:16

File Type:pdf, Size:1020Kb

Kmail, Evolution, Thunderbird, and Claws Mail GOT MAIL Jürgen Acker, Photocase.Com REVIEWS Email Suites YOU’VEKMail, Evolution, Thunderbird, and Claws Mail GOT MAIL Jürgen Acker, photocase.com Acker, Jürgen We examine the strengths and weaknesses of four popular mail clients: Post Office Protocol (POP) and Internet Message Access Protocol (IMAP). BY MIRKO ALBRECHT KMail, Evolution, Thunderbird, and Claws Mail. The ability to communicate with a se- lected user group via mailing lists is also n early challenge of the Internet Whether you use mail at the office or useful. Mail clients should support this pioneers was to find a way to at home, spam is a major concern. In by providing appropriate functions. On a Asend small text messages across fact, the bulk of all mail traffic is unso- modern desktop, the ability of a system a network. Despite criticism that sending licited advertising, and important mes- to integrate seamlessly is a major usabil- snippets of text was “not an important sages easily disappear into the black ity factor, and an essential application motivation for a network of scientific hole of the spam filter. Current mail cli- like a mail client should have intuitive computers” [1], email quickly became ents need a simple, flexible, reliable way controls. Also, a full-fledged address one of the world’s most important forms to filter spam. book or the ability to integrate an exist- of communication. Some computer users also like to en- The simple console-based text pro- crypt messages to provide protection GLOSSARY grams used by those Internet pioneers against sniffing or to have a digital sig- would never work today. Modern email nature to validate the sender. PIM: Personal Information Manager. clients must contend with new irritants The increased volume of mail traffic Software that manages personal data and documents such as contacts, ap- such as spam, intrusion, and skyrocket- makes effective sorting mechanisms es- pointments, tasks, notes, email, and ing volumes of email traffic. sential. At the same time, most users the like. have more than one account and may Sweeter Suites Mbox: A storage format for email where use their accounts for completely differ- all messages are stored in a large file. Email clients have evolved into elaborate ent purposes, but they still might want Maildir: Directory structure for storing suites that fulfill the user’s every wish. to read the mail from the same interface. emails in which each message is stored This article compares four popular email Any measure of a mail client is its sup- in a separate file. tools for Linux environments. port for popular mail protocols, such as 44 ISSUE 86 JANUARY 2008 044-050_email.indd 44 14.11.2007 18:49:19 Uhr Email Suites REVIEWS Figure 2: The simple wizard takes most of the headaches out of setting up an email account in KMail. vate). A dialog will prompt you to first enter a name and possibly the name of your organization, which it then adds to your email correspondence. The remaining tags are for configuring Figure 1: Freely selectable folder structures for managing multiple identities and intelligent your identity. For example, you can set filter rules keep KMail tidy. up an existing GPG key in Cryptography to attach the key to your messages and ing address book makes life easier for program window. The wizard does not specify a valid signature for the identity the user. offer presets for popular providers such you are configuring. as GMX or Google Mail. KMail The Settings | Configure KMail entry Advanced KMail [2] is part of the popular KDE gives you access to the client’s compre- In the area below Advanced, you can de- desktop (Figure 1). The software has hensive configuration options. fine the storage location for the Sent, been assigned a new release number to Besides the ability to create accounts Templates, and Drafts folders, and this is match the new desktop version; the lat- with different providers, KMail also lets also where you modify message tem- est version when this issue went to print you set up various identities, which is plates in the Templates tab. Check the was 1.9.8 (on KDE 3.5.7). useful if you want to separate private Use Custom Templates box and modify The software is not just an integrated communications from business mail the text for Reply to Sender, for example. KDE system component, but also part of (Figure 3). The Insert command button helps you KDE’s PIM solution, Kontact, which also add field commands for these templates. includes a newsreader, an address book, Identify Yourself The Image tab includes a gimmick: a calendar, an RSS reader, and a task To add an identity, click Add in Identities KMail will transmit a monochrome manager, all with a standardized GUI. and enter a name for your new identity photo or logo of 48x48 pixels along with KMail is also available as a standalone (e.g., Google Mail business, GMX pri- the message. application. When you launch the program for the first time, a wizard pops up to help you set up a mail account (Figure 2). As a user, you simply supply your name, mail address, and provider’s server addresses, and up comes the traditional three-panel KMail Overview The score in the overview shows the rating out of a possible total of 5. Usability/ system integration AAAAA Configurability AAAAA Filtering AAAAA POP account management AAAAA Security GPG/ HTML AAAAB Spam filter AAAAA Mailing lists AAAAA Address book/ contacts AAAAA Figure 3: KMail gives users many options in configuration dialogs. JANUARY 2008 ISSUE 86 45 044-050_email.indd 45 14.11.2007 18:49:29 Uhr REVIEWS Email Suites As a genuine KDE program, KMail in- tegrates seamlessly with the system, as long as you have KDE. An icon in the kicker will notify you of incoming mail, if so desired. Many major programs, in- cluding OpenOffice, offer to integrate KMail as the default email client and will pop up a message window with an address in it as needed. KAddressbook leaves little to be de- sired with respect to input options, and it also collaborates nicely with other low-level applications such as Kopete (IM) or konversation (IRC client). Evolution Evolution [3] is to Gnome and other Gtk- based environments as KMail is to KDE. Figure 4: Evolution is not available as a single email client, but as a complete PIM suite. This said, Evolution is not part of a PIM suite – it is a PIM suite (Figure 4). Be- Unfortunately, most mail programs If you do not know what kind of secu- sides email functionality, Evolution of- just ignore the free gift. rity your provider offers, you can press fers contacts, appointments, tasks, and Check server capabilities. It makes sense notes. The program does not let you Configuring Access to take a closer look at the versatile con- switch off the additional features and The Accounts tab lets you set up your figuration dialogs in KMail at least once. just use the mail client. The application mail accounts. KMail can access local Many of the functions take you to intelli- is thus fairly cluttered from an overdose mailboxes, Mbox and Maildir boxes, gent tools that can help take the head- of menu entries. IMAP servers, and POP servers, which aches out of daily mail handling if you will be used by most users. As a user, get them set up right. Evolution Identity you can specify whether to keep mes- Creating an account in Evolution is just sages on the server or have KMail delete Security as easy as in KMail; although users only messages on the server after retrieving. From a security point of view, KMail is have one identity, they can set up multi- Also, you can specify how long to keep state of the art. Click on Security in the ple accounts for it. To compensate for messages on the POP server. setup dialog to integrate your GnuPG key this drawback, you can assign different You can define up front how often and use keys provided by other contacts, names and organizations to the same KMail will attempt to retrieve new mail, and you can specify whether to use a identity. The program does not let you which target folder messages for the ac- key automatically or on request only. use different templates for different ac- count will use, and what message size to Also, it is just as easy to set up how counts, however. reject. The Tools tab gives you access to KMail will handle suspicious HTML mail You can enter a signature, although secure access methods. in the Read tab. You can opt to view the the function is slightly hidden, in Edit | mail or download linked content off the Preferences | Composer preferences | Sig- TIP: KMail in Firefox web. Security-conscious users will want natures. If you enter multiple signatures To use KMail in Firefox for frequent to avoid “features” of this kind. for different situations, you need to se- mailto links, enter about:config in the lect the right signature on the right of the browser’s address box. Then right-click Antispam and Antivirus Compose window. Other settings for anywhere in the window to drop down KMail has two useful wizards for inte- email are fairly uncomplicated, although the menu and select New | String. In the grating antivirus and antispam pro- first dialog field, type network.proto- grams; both links are located in the Tools Evolution Overview col-handler.app.mailto and then menu. KMail will automatically search The score in the overview shows the kmailservice. The changes are applied for installed software, such as Spam- rating out of a possible total of 5.
Recommended publications
  • MASTERCLASS GNUPG MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS GNUPG MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! SECURE EMAIL WITH GNUPG AND ENIGMAIL Send encrypted emails from your favourite email client. our typical email is about as secure as a The first thing that you need to do is create a key to JOHN LANE postcard, which is good news if you’re a represent your identity in the OpenPGP world. You’d Ygovernment agency. But you wouldn’t use a typically create one key per identity that you have. postcard for most things sent in the post; you’d use a Most people would have one identity, being sealed envelope. Email is no different; you just need themselves as a person. However, some may find an envelope – and it’s called “Encryption”. having separate personal and professional identities Since the early 1990s, the main way to encrypt useful. It’s a personal choice, but starting with a single email has been PGP, which stands for “Pretty Good key will help while you’re learning. Privacy”. It’s a protocol for the secure encryption of Launch Seahorse and click on the large plus-sign email that has since evolved into an open standard icon that’s just below the menu. Select ‘PGP Key’ and called OpenPGP. work your way through the screens that follow to supply your name and email address and then My lovely horse generate the key. The GNU Privacy Guard (GnuPG), is a free, GPL-licensed You can, optionally, use the Advanced Key Options implementation of the OpenPGP standard (there are to add a comment that can help others identify your other implementations, both free and commercial – key and to select the cipher, its strength and set when the PGP name now refers to a commercial product the key should expire.
    [Show full text]
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Das Handbuch Zu Kopete
    Das Handbuch zu Kopete Will Stephenson Matt Rogers Michaël Larouche Deutsche Übersetzung: Luc de Louw Das Handbuch zu Kopete 2 Inhaltsverzeichnis 1 Einleitung 9 1.1 Kopete ist das Instant-Messenger-Programm von KDE. .9 1.1.1 Vor dem Start ... .9 1.1.2 Was ist Kopete? . .9 1.1.3 Weitere Informationen zu Kopete im Internet . .9 1.2 Eine Einführung in das Instant-Messaging . 10 2 Erste Schritte 11 2.1 Das Erstellen von Zugängen . 11 2.2 Online gehen und einen Chat beginnen . 12 3 Arbeiten mit Kopete 13 3.1 Die Kontaktliste . 13 3.1.1 Gestaltung des Kontaktlistenfensters . 13 3.1.1.1 Menü . 13 3.1.1.2 Werkzeugleiste . 13 3.1.1.3 Kontaktliste . 13 3.1.1.4 Statusleiste . 14 3.1.2 Einstellung des Anwesenheitsstatus . 14 3.1.3 Das Starten eines Chats aus der Kontaktliste . 14 3.1.4 Das Übertragen einer Datei . 14 3.1.5 Das Verwalten von Kontakten . 14 3.1.5.1 Einige Hinweise zu Metakontakten . 14 3.1.5.2 Hinweise zur Gruppierung von Kontakten . 15 3.1.5.3 Das Hinzufügen von Kontakten . 15 3.1.5.4 Das Umbenennen von Kontakten . 16 3.1.5.5 Das Entfernen von Kontakten . 16 3.1.5.6 Das Verschieben von Kontakten zwischen Metakontakten . 16 3.1.5.7 Das Entfernen von Kontakten aus Metakontakten . 16 3.1.6 Das Einrichten von Kopete . 16 3.1.7 Das Beenden von Kopete . 16 3.1.8 Tastenkürzel . 16 Das Handbuch zu Kopete 3.2 Das Chatfenster .
    [Show full text]
  • SMTP Protocol
    CS 280 Lecture 4: Application Layer, Email, DNS, P2P John Magee 21 September 2016 Most slides adapted from Kurose and Ross, Computer Networking 7/e Source material copyright 1996-2016 1 J.F Kurose and K.W. Ross Chapter 2: outline Last Class: 2.1 principles of network Next Class: applications 2.6 video streaming and 2.2 Web and HTTP content distribution networks Today: 2.7 socket programming with UDP and TCP 2.3 electronic mail • SMTP, POP3, IMAP 2.4 DNS 2.5 P2P applications Application Layer 2-2 outgoing Electronic mail message queue user mailbox Three major components: user agent . user agents . mail servers mail user server . simple mail transfer agent protocol: SMTP SMTP mail user server agent User Agent SMTP . a.k.a. “mail reader” SMTP user agent . composing, editing, reading mail server mail messages user . e.g., Outlook, Thunderbird, agent iPhone mail client user . outgoing, incoming agent messages stored on server Application Layer 2-3 Electronic mail: mail servers mail servers: user agent . mailbox contains incoming messages for user mail user server . message queue of outgoing agent (to be sent) mail messages SMTP mail user . SMTP protocol between server agent mail servers to send email SMTP messages SMTP user agent • client: sending mail mail server server • “server”: receiving mail user server agent user agent Application Layer 2-4 Electronic Mail: SMTP [RFC 2821] . uses TCP to reliably transfer email message from client to server, port 25 . direct transfer: sending server to receiving server . three phases of transfer • handshaking (greeting) • transfer of messages • closure . command/response interaction (like HTTP) • commands: ASCII text • response: status code and phrase .
    [Show full text]
  • Securing Email Through Online Social Networks
    SECURING EMAIL THROUGH ONLINE SOCIAL NETWORKS Atieh Saberi Pirouz A thesis in The Department of Concordia Institute for Information Systems Engineering (CIISE) Presented in Partial Fulfillment of the Requirements For the Degree of Master of Applied Science (Information Systems Security) at Concordia University Montreal,´ Quebec,´ Canada August 2013 © Atieh Saberi Pirouz, 2013 Concordia University School of Graduate Studies This is to certify that the thesis prepared By: Atieh Saberi Pirouz Entitled: Securing Email Through Online Social Networks and submitted in partial fulfillment of the requirements for the degree of Master of Applied Science (Information Systems Security) complies with the regulations of this University and meets the accepted standards with respect to originality and quality. Signed by the final examining commitee: Dr. Benjamin C. M. Fung Chair Dr. Lingyu Wang Examiner Dr. Zhenhua Zhu Examiner Dr. Mohammad Mannan Supervisor Approved Chair of Department or Graduate Program Director 20 Dr. Christopher Trueman, Dean Faculty of Engineering and Computer Science Abstract Securing Email Through Online Social Networks Atieh Saberi Pirouz Despite being one of the most basic and popular Internet applications, email still largely lacks user-to-user cryptographic protections. From a research perspective, designing privacy preserving techniques for email services is complicated by the re- quirement of balancing security and ease-of-use needs of everyday users. For example, users cannot be expected to manage long-term keys (e.g., PGP key-pair), or under- stand crypto primitives. To enable intuitive email protections for a large number of users, we design Friend- lyMail by leveraging existing pre-authenticated relationships between a sender and receiver on an Online Social Networking (OSN) site, so that users can send secure emails without requiring direct key exchange with the receiver in advance.
    [Show full text]
  • Statement from Directtrust Regarding the EFAIL Vulnerability
    Statement from DirectTrust regarding the EFAIL Vulnerability Summary EFAIL is a set of attacks used to exploit vulnerabilities in email clients that decrypt and display PGP and S/MIME encrypted messages by coercing them into sending the decrypted text of the emails to an attacker. Properly implemented, Direct is NOT vulnerable. However, we recommend that if you are exchanging with anyone outside of the DirectTrust Network, you will want to understand at a reasonable depth how their implementation protects against EFAIL. How does EFAIL work? EFAIL consists of two different attack scenarios that create “backchannels” to send the decrypted text to an attacker. Both require an attacker to first obtain the encrypted message. 1. The attacker “wraps” the encrypted body with carefully crafted markup that can result in an email client decrypting the message and sending the decrypted body to the attacker. 2. The attacker manipulates the encrypted body of the message using well known S/MIME weaknesses that produce a message that can send the decrypted body to the attacker once rendered in the email client. Although the attacks are different, the end result is the same: a vulnerable email client sends the decrypted text to the attacker. How is this relevant to Direct? Direct uses S/MIME to encrypt messages, so in theory every Direct message could be vulnerable to this attack. However, Direct, when implemented correctly, is NOT vulnerable. The vulnerability is only applicable if decryption and rendering of the message are done in certain email clients like Thunderbird, iOS, Apple Mail, and some versions of Outlook.
    [Show full text]
  • 18 Free Ways to Download Any Video Off the Internet Posted on October 2, 2007 by Aseem Kishore Ads by Google
    http://www.makeuseof.com/tag/18-free-ways-to-download-any-video-off-the-internet/ 18 Free Ways To Download Any Video off the Internet posted on October 2, 2007 by Aseem Kishore Ads by Google Download Videos Now download.cnet.com Get RealPlayer® & Download Videos from the web. 100% Secure Download. Full Movies For Free www.YouTube.com/BoxOffice Watch Full Length Movies on YouTube Box Office. Absolutely Free! HD Video Players from US www.20north.com/ Coby, TV, WD live, TiVo and more. Shipped from US to India Video Downloading www.VideoScavenger.com 100s of Video Clips with 1 Toolbar. Download Video Scavenger Today! It seems like everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos. There are basically two ways to download videos off the Internet and that’s how I’ll split up this post: either via a web app or via a desktop application. Personally, I like the web applications better simply because you don’t have to clutter up and slow down your computer with all kinds of software! UPDATE: MakeUseOf put together an excellent list of the best websites for watching movies, TV shows, documentaries and standups online.
    [Show full text]
  • Implementation of Proactive Spam Fighting Te Niques
    Implementation of Proactive Spam Fighting Teniques Masterarbeit von Martin Gräßlin Rupret-Karls-Universität Heidelberg Betreuer: Prof. Dr. Gerhard Reinelt Prof. Dr. Felix Freiling 03. März 2010 Ehrenwörtlie Erklärung I versiere, dass i diese Masterarbeit selbstständig verfasst, nur die angegebenen ellen und Hilfsmiel verwendet und die Grundsätze und Empfehlungen „Verantwortung in der Wissensa“ der Universität Heidelberg beatet habe. Ort, Datum Martin Gräßlin Abstract One of the biggest allenges in global communication is to overcome the problem of unwanted emails, commonly referred to as spam. In the last years many approaes to reduce the number of spam emails have been proposed. Most of them have in common that the end-user is still required to verify the filtering results. ese approaes are reactive: before mails can be classified as spam in a reliable way, a set of similar mails have to be received. Spam fighting has to become proactive. Unwanted mails have to be bloed before they are delivered to the end-user’s mailbox. In this thesis the implementation of two proactive spam fighting teniques is discussed. e first concept, called Mail-Shake, introduces an authentication step before a sender is allowed to send emails to a new contact. Computers are unable to authenticate themselves and so all spam messages are automatically bloed. e development of this concept is discussed in this thesis. e second concept, called Spam Templates, is motivated by the fact that spam messages are generated from a common template. If we gain access to the template we are able to identify spam messages by mating the message against the template.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]