SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
PRISM Proof Cloud Email Services
Introduction
Cloud  email  services  use  SSL  certificates  to  encrypt  the  conversation  between  your  browser
and  the  HTTP  server,  this  encrypted traffic is called HTTPS. Most HTTPS certificates allow for a
master  key  to  decrypt  the  encrypted traffic,  however  this  is  not  true  for  certificates  which use  a
temporary session key which is individual for each user. This is known as SSL ephemeral mode.

This  article  is  a   survey  of  free  cloud  email  services.  It  lists  services  by  their  affiliation  with  the
NSA,  their  support  for  HTTPS,  their  support  for  SSL  ephemeral  mode, and the physical location
of   their  servers.  By   carefully  choosing  a  cloud  email  service,  users  can  be  confident that their
traffic  is   not  entering  the  network  of  the  United  States.  Additionally  if  their  traffic  did  enter  the
United  States,  the  SSL  certificate  of  the  cloud  service  they   select  supports  ephemeral  mode
which prevents the NSA from gaining a master key to decrypt network traffic.
Lists of free cloud email services
http://ubuntuforums.org/showthread.php?t=2125732
http://email.about.com/od/freeemailreviews/tp/free_email.htm
http://capturedbloggingtips.com/2013/03/6­best­alternatives­to­gmail/
https://en.wikipedia.org/wiki/Comparison_of_webmail_providers
http://prism­break.org/#email­services
Individual cloud email services that support HTTPS
https://www.gmx.com
https://www.hushmail.com/
https://mail.google.com/
https://www.zoho.com/mail/
https://mail.aol.com
https://www.icloud.com/
https://www.outlook.com/owa​
https://mail.live.com
https://mail.yahoo.com/
https://www.mail.com/int/
https://shortmail.com/​
https://www.inbox.com/
https://lavabit.com/
https://www.fastmail.fm/
https://mail.yandex.com/
https://www.mail.lycos.com/
https://www.nokiamail.com/
https://www.rediff.com/
https://mail.riseup.net/
https://www.contactoffice.com/
https://webmail.xmission.com
https://ojooo.com/
https://mail.opera.com/
Private key disclosed to law enforcement (PRISM/FBI etc)
https://mail.google.com/
https://mail.aol.com
https://www.icloud.com/
https://www.outlook.com/owa​
https://mail.live.com
https://mail.yahoo.com/
https://www.hushmail.com/
Private key not disclosed to USA law enforcement (this list is used for the remaining
tests)
https://www.gmx.com
https://www.zoho.com/mail/
https://www.mail.com/int/
https://shortmail.com/​
https://lavabit.com/
https://www.inbox.com/
https://www.fastmail.fm/
https://mail.yandex.com/
https://www.mail.lycos.com/
https://www.nokiamail.com/
https://www.rediff.com/
https://mail.riseup.net/
https://www.contactoffice.com/
https://webmail.xmission.com
https://ojooo.com/
https://mail.opera.com/
Domains that use Ephemeral Diffie­Hellman key exchange on HTTPS
www.gmx.com ­ DHE_RSA
www.mail.com ­ DHE_RSA
shortmail.com ­ DHE_RSA
lavabit.com ­ DHE_RSA
www.mail.lycos.com ­ DHE_RSA
mail.riseup.net ­ DHE_RSA
www.contactoffice.com ­ DHE_RSA
webmail.xmission.com ­ DHE_RSA
ojooo.com ­ DHE_RSA
Domains that use Ephemeral Diffie­Hellman key exchange on POP3:995
pop3.inbox.com ­ DHE­RSA­AES256­SHA
pop3.ojooo.com ­ DHE­RSA­AES256­SHA
pop.contactoffice.com ­ EDH­RSA­DES­CBC3­SHA
Domains that use Ephemeral Diffie­Hellman key exchange on IMAP:993
imap.inbox.com ­ DHE­RSA­AES256­SHA
imap.ojooo.com ­ DHE­RSA­AES256­SHA
imap.opera.com ­ DHE­RSA­AES256­SHA
imap.contactoffice.com ­ EDH­RSA­DES­CBC3­SHA
Domains that use Ephemeral Diffie­Hellman key exchange on SMTP:465
smtp.inbox.com ­ DHE­RSA­AES256­SHA
smtp.riseup.net ­ DHE­RSA­AES256­SHA
smtp.xmission.com ­ DHE­RSA­AES256­SHA
smtp.ojooo.com ­ DHE­RSA­AES256­SHA
smtp.opera.com ­ DHE­RSA­AES256­SHA
Domains with POP3 but no POP3 encryption
pop.rediffmail.com:110
Domains with IMAP but no IMAP encryption
imap.rediffmail.com:143
Domains with SMTP but no SMTP encryption
smtp.rediffmail.com:587
Company geographic location
www.gmx.com ­ Germany
www.mail.com ­ Germany
shortmail.com ­ United States
lavabit.com ­ United States
www.mail.lycos.com ­ United States
mail.riseup.net ­ United States
www.contactoffice.com ­ France
inbox.com ­ United States
webmail.xmission.com ­ United States
ojooo.com ­ Germany
mail.opera.com ­ Norway
Server geographic location
DNS domain to ip address resolution and round robin:
This  is  where  things  start  to  get  a  bit  more  complicated.  By  looking  up  the  DNS  records  for  a
domain  you  will  find  that  some  organisations  have  servers  located  across several  countries  to
get  better  speeds.  By  looking  up  the  DNS  records  for   gmx.com  you   will  see  that  gmx  have
domains  registered  for  different  geographies  such  as  gmx.net,  gmx.at,  gmx.ch,  gmx.co.uk,
gmx.es,   gmx.fr  and  gmx.com  all  of  which  can  resolve  to  multiple  ip  addresses  for  requests to
the  same   domain.  By  visiting  the  following  web  page  you   can  do  a  quick  lookup  to  list  the  ip
addresses  for the domain but beware as the  addresses listed are not always the ones accesses
by your browser. http://who.is/dns/gmx.com
Try running the following command to download the dns records:
dig +nocmd gmx.com any +multiline +noall +answer
You  may  also   notice  that  by  pinging  mail.gmx.com  several  times   you  will   get  a  different  ip
address  in  the  response  every  time.  This  is  due  to  the  DNS  server  responding  with a  single  ip
from a list of ip addresses using the round robin algorithm for load balancing.
ping mail.gmx.com ­> 212.227.17.184
ping mail.gmx.com ­> 212.227.17.174
ping mail.gmx.com ­> 212.227.17.184
URL redirects and Cross­Domain­Single­Sign­On (CDSSO):
In   some  cases  you may  log  into  a  domain  such  as  gmx.co.uk  by  entering your  credendials  but
you  will  be  redirected  to  gmx.fr.  If  the  cookie  is  sent  to  your  browser  from  the co.uk domain and
the  fr  domain  requests  the cookie  from  the  first  domain  then  your  browser will block the second
domain  from  reading  the  cookies  as  it  violates  the  cross­domain  policy.   By  using
Cross­Domain­Single­Sign­On  web  applications  are  able  to  authenticate  across  several
domains  allowing  the  user  to  log  in  only  once.  For  the  purposes  of  knowing  where  your  data  is
being  stored  in  the  cloud,  the  best  guess  you  can  make  is  to assume it is coming from the final
domain you have been redirected to.
Email ports
The  POP3  port  for  inbound  emails  is  110  or  port  995  if   you  want  to  use  secured  POP3.  The
IMAP  port  for  inbound  emails  is 143 or port 993 if you  want to use secured IMAP. The SMTP port
for  outbound  emails  is  25/2525/587  or  465  if  you  want  to  use  secured  SMTP.  If  your  cloud  mail
server  allows  connections  over  non­secure  ports  and  your  traffic  is  crossing   american
cyberspace then emails received on ports 110, 143, 24 and 2525 can be captured by  the NSA as
the  traffic   is  not  encrypted  between  one  mailserver  and  other  (Alice  ­>  [https]  ­>  gmail.com  ­>
[plaintext]  ­>  gmx.co.uk  ­> [https] ­> Bob).  An interesting project would be to survey how different
mail  servers  interact  when  exchanging  mail  documents, do they  always attempt to use SSL and
downgrade  if  it  is  not  available  or  do  they  have  to  be forced to use it? If mail servers use SSL by
default  when available then the communication would be secure between the web interfaces and
also   between  the  mail  servers  (Alice  ­>  [https]  ­>  gmail.com  ­>  [ciphertext]  ­>  gmx.co.uk  ­>
[https] ­> Bob).
Compare the certificate types of https/pop3/imap/smtp using the following bash shell script:
#!/bin/bash
list="www.gmx.co.uk:443
pop.gmx.co.uk:995
imap.gmx.co.uk:993
smtp.gmx.co.uk:465
www.zoho.com:443
pop.zoho.com:995
imap.zoho.com:993
smtp.zoho.com:465
www.mail.com:443
pop.mail.com:995
imap.mail.com:993
smtp.mail.com:465
www.shortmail.com:443
imap.shortmail.com:993
smtp.shortmail.com:465
www.lavabit.com:443
pop.lavabit.com:995
imap.lavabit.com:993
smtp.lavabit.com:465
www.inbox.com:443
pop3.inbox.com:995
imap.inbox.com:993
smtp.inbox.com:465
fastmail.fm:443
mail.messagingengine.com:587
mail.yandex.com:443
pop.yandex.com:995
imap.yandex.com:993
smtp.yandex.com:465
www.lycos.com:443
pop.lycos.com:995
imap.lycos.com:993
smtp.lycos.com:465
www.nokiamail.com:443
nokia.pop.mail.yahoo.com:995
nokia.imap.mail.yahoo.com:993
nokia.smtp.mail.yahoo.com:465
www.rediff.com:443
www.riseup.net:443
pop.riseup.net:995
imap.riseup.net:993
smtp.riseup.net:465
www.contactoffice.com:443
pop.contactoffice.com:995
imap.contactoffice.com:993
webmail.xmission.com:443
pop3.xmission.com:995
imap.xmission.com:993
smtp.xmission.com:465
ojooo.com:443
pop3.ojooo.com:995
imap.ojooo.com:993
smtp.ojooo.com:465
mail.opera.com:443
pop3.operamail.com:995
imap.opera.com:993
smtp.opera.com:465"
for i in $list;
do
echo ­ne "$i:t"
echo "EOF" | openssl s_client ­crlf ­connect $i 2>1 | grep ­o "Cipher is[^>]*"
done
Additionally to check if a port is open try the following commands (type “quit[enter]” to exit telnet):
telnet pop.gmx.co.uk 110
nmap ­T5 ­p 110 pop.gmx.co.uk
By  determining  if  the  ports are open you can assume  the service is running on the port, however
this  is  not  always  the  case.  Also  be  aware  that  some  servers  block  port  scanning.  Try  the
following bash shell script to use nmap to test if ports are open on the cloud servers:
#!/bin/bash
http="www.zoho.com
www.mail.com
www.shortmail.com
www.lavabit.com
www.inbox.com
fastmail.fm
mail.yandex.com
www.lycos.com
www.nokiamail.com
www.rediff.com
www.riseup.net
www.contactoffice.com
webmail.xmission.com
ojooo.com
mail.opera.com"
pop="pop.gmx.co.uk
pop.zoho.com
pop.mail.com
pop.lavabit.com
pop3.inbox.com
pop.yandex.com
pop.lycos.com
nokia.pop.mail.yahoo.com
pop.riseup.net
pop.contactoffice.com
pop3.xmission.com
pop3.ojooo.com
pop3.operamail.com"
imap="imap.gmx.co.uk
imap.zoho.com
imap.mail.com
imap.shortmail.com
imap.lavabit.com
imap.inbox.com
imap.yandex.com
imap.lycos.com
nokia.imap.mail.yahoo.com
imap.riseup.net
imap.contactoffice.com
imap.xmission.com
imap.ojooo.com
imap.opera.com"
smtp="smtp.gmx.co.uk
smtp.zoho.com
smtp.mail.com
smtp.shortmail.com
smtp.lavabit.com
smtp.inbox.com
smtp.yandex.com
smtp.lycos.com
nokia.smtp.mail.yahoo.com
smtp.riseup.net
imap.xmission.com
smtp.ojooo.com
smtp.opera.com"
#http pop imap smtp
for i in $http;
do
echo ­e "n$i:"
nmap ­T5 ­p 80,443 $i | egrep "http$|https$"
done
for i in $pop;
do
echo ­e "n$i:"
nmap ­T5 ­p 110,995 $i | egrep "pop$|pops$|pop3$|pop3s$"
done
for i in $imap;
do
echo ­e "n$i:"
nmap ­T5 ­p 143,993 $i | egrep "imap$|imaps$"
done
for i in $smtp;
do
echo ­e "n$i:"
nmap ­T5 ­p 25,2525,587,465 $i | egrep "smtp$|smtp$"
done

Final note
Ensure   your  browser  is  using  the  “HTTPS  everywhere”  extension   when  browsing  these
domains.  If  you  bookmark  a  cloud  email  service,  be  sure  that  you  are  using  the  absolute  ip
address  of  the  server  to  lock  its  geographic  location.  So  for   example,  bookmarking
www.gmx.com  which  could  bring  you  to  the servers  in  the  USA  or  Germany,  instead bookmark
https://213.165.64.202/  which  is  the  German  ip  address  as  opposed  to  bookmarking
https://74.208.5.85  which is  the  ip  address  for  the  US  server.  A  useful  extension for geolocation
of   servers  is   “Flagfox”  which  attempts  to  perform  geolocation  of  the  server  currently  delivering
the content for the web page.
Conclusion
It  should  be  noted  that  no  single  cloud  service  provides  SSL  certificates  in Ephemeral mode for
all  their  services  (HTTPS/POP/IMAP).  Additionally  out  of  the  20  service  surveyed  that  provide
HTTPS  there  are  only  3  that  are not  based  in  the  United  States.  It  was  possible  to  shortlist  the
top 3 services to bronze, silver and gold based on the results of this brief survey.
Winners:
#1 ­ ojooo.com (DHE_RSA on https/pop3/imap/smtp, and they’re base in Germany)
#2 ­ contactoffice.com (DHE_RSA on https/pop3/imap, and theyre based in France)
#3 ­ inbox.com (DHE_RSA on pop3/imap/smtp)
Worst security award:
#1 ­ rediffmail.com (no security implemented on any protocol)
Normally  if  the  traffic  happens  to  pass  through american  telecommunications networks the NSA
will  tap  into  the  fibreoptic  systems  in  the  network  backbone  of  the  country  and  record  all  the
traffic  in  their   Utah  data  centre  and  will  keep  it  for  up  to  5  years  in  cold  storage  on hard  drives
before   discarding  it.  An  famous  case  of  the  NSA  tapping  major  network  backbone  is  the
fibreoptic tap in “Room 641A” when the NSA split the  fibre optic communications cable in AT&T’s
communications station.

By   choosing   a  mail  service  that  uses  a  different  encryption  key  for  every  network
communication,  your  traffic  will  be  secured  against  the  NSA  from  taking  your  traffic  out  of
cold­storage   and  decrypting  it  using  the  compromised  master  keys  used  to  generate  the  SSL
certificates.  These   master  keys  are  normally  compromised  by  the  NSA  simply  walking  into  a
corporation  and  demanding  the  keys  from  the  owners.  However   this  is  not  possible  with  SSL
certificates  that  are  operating  in Ephemeral mode as  a different key is used for every connection
and  is  then  discarded  immediately.  However  this  technique  will  not   prevent  the  NSA  or  other
surveillance  organization  from demanding physical access to  the companies servers and simply
copying the data off their hard drives.
Future work
An  interesting project would be to survey how mail servers interact  to exchange messages when
a  secure  communications  channel  is  available.  Does   Postfix   mailserver  attempt  to  use  SSL
before   downgrading  to  a  plaintext  alternative.   Does   Microsoft  Exchange  server  attempt  to  use
SSL before downgrading to a plaintext alternative?
Sources:
1. PRISM Accomplices ­
https://upload.wikimedia.org/wikipedia/commons/c/c7/Prism_slide_5.jpg
2. PRISM Network Graph ­
https://upload.wikimedia.org/wikipedia/commons/0/01/Prism_slide_2.jpg
3. Explanation of Ephemeral Diffie­Hellman key exchange ­
http://blogs.computerworld.com/encryption/22366/can­nsa­see­through­encrypted­web­p
ages­maybe­so
4. DH vs. DHE and ECDHE and perfect forward secrecy ­
http://stackoverflow.com/questions/14034508/dh­vs­dhe­and­ecdhe­and­perfect­forward­
secrecy
5. Geographic ip mapping tool ­ http://www.geoiptool.com/en/
6. HTTPS Everywhere ­ https://www.eff.org/https­everywhere
7. Flagfox ­ https://addons.mozilla.org/en­us/firefox/addon/flagfox/
8. NSA Utah Data Centre Yottabyte Storage Capacity ­
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
Last edited: Tuesday, July 16, 2013 at 1:35:15 PM IST
Contact hughpearse@gmx.co.uk

Contenu connexe

Tendances

Web application technologies
Web application technologiesWeb application technologies
Web application technologiesAtul Tiwari
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paperniallmmackey
 
Join the fight against email spam! - SweetlakePHP
Join the fight against email spam! - SweetlakePHPJoin the fight against email spam! - SweetlakePHP
Join the fight against email spam! - SweetlakePHPJeffrey Cafferata
 
HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HyeonSeok Choi
 
Http basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-pptHttp basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-pptQwinix Technologies
 

Tendances (9)

Web application technologies
Web application technologiesWeb application technologies
Web application technologies
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
Join the fight against email spam! - SweetlakePHP
Join the fight against email spam! - SweetlakePHPJoin the fight against email spam! - SweetlakePHP
Join the fight against email spam! - SweetlakePHP
 
HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.
 
Http basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-pptHttp basics by-joshi_29_4_15-ppt
Http basics by-joshi_29_4_15-ppt
 
HTTP & HTTPS
HTTP & HTTPSHTTP & HTTPS
HTTP & HTTPS
 
PPT
PPTPPT
PPT
 
Renegotiating Tls
Renegotiating TlsRenegotiating Tls
Renegotiating Tls
 

En vedette

All about linux gaining root remote exploitation
All about linux  gaining root   remote exploitationAll about linux  gaining root   remote exploitation
All about linux gaining root remote exploitationn0rz
 
Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikAldi Nor Fahrudin
 
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)Ontico
 

En vedette (7)

All about linux gaining root remote exploitation
All about linux  gaining root   remote exploitationAll about linux  gaining root   remote exploitation
All about linux gaining root remote exploitation
 
Sadasd
SadasdSadasd
Sadasd
 
De compu
De compuDe compu
De compu
 
5 correos
5 correos5 correos
5 correos
 
Website List (Sm)
Website List (Sm)Website List (Sm)
Website List (Sm)
 
Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotik
 
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
 

Similaire à Prism-Proof Cloud Email Services

what happens when you type https.pptx
what happens when you type https.pptxwhat happens when you type https.pptx
what happens when you type https.pptxRevelationMudoti
 
Flex Messeging Services
Flex Messeging ServicesFlex Messeging Services
Flex Messeging Servicesravinxg
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
What is a MS Windows Network Drive
What is a MS Windows Network DriveWhat is a MS Windows Network Drive
What is a MS Windows Network Driveadil raja
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL CertificateCheapSSLUSA
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns emailHeera K S
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
Microsoft Word - Web Hosting Services
Microsoft Word - Web Hosting ServicesMicrosoft Word - Web Hosting Services
Microsoft Word - Web Hosting Serviceswebhostingguy
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerAkhil Nadh PC
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.netHostin Services Pvt Ltd
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer SecurityByronKimani
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxtodd401
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )Monodip Singha Roy
 

Similaire à Prism-Proof Cloud Email Services (20)

what happens when you type https.pptx
what happens when you type https.pptxwhat happens when you type https.pptx
what happens when you type https.pptx
 
Flex Messeging Services
Flex Messeging ServicesFlex Messeging Services
Flex Messeging Services
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
What is a MS Windows Network Drive
What is a MS Windows Network DriveWhat is a MS Windows Network Drive
What is a MS Windows Network Drive
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Details about the SSL Certificate
Details about the SSL CertificateDetails about the SSL Certificate
Details about the SSL Certificate
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
Microsoft Word - Web Hosting Services
Microsoft Word - Web Hosting ServicesMicrosoft Word - Web Hosting Services
Microsoft Word - Web Hosting Services
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Web hosting presentations by hostindia.net
Web hosting presentations by hostindia.netWeb hosting presentations by hostindia.net
Web hosting presentations by hostindia.net
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
 
Explain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docxExplain how SSL protocol is used to ensure the confidentiality and int.docx
Explain how SSL protocol is used to ensure the confidentiality and int.docx
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 

Plus de hughpearse

HughPearseEsriTraining
HughPearseEsriTrainingHughPearseEsriTraining
HughPearseEsriTraininghughpearse
 
HughPearse-ACE-Forensics-Certification
HughPearse-ACE-Forensics-CertificationHughPearse-ACE-Forensics-Certification
HughPearse-ACE-Forensics-Certificationhughpearse
 
Nmap flags table
Nmap flags tableNmap flags table
Nmap flags tablehughpearse
 
ACE forensics certification
ACE forensics certificationACE forensics certification
ACE forensics certificationhughpearse
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorialhughpearse
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchangehughpearse
 
Metasploit cheat sheet
Metasploit cheat sheetMetasploit cheat sheet
Metasploit cheat sheethughpearse
 
Low Level Exploits
Low Level ExploitsLow Level Exploits
Low Level Exploitshughpearse
 

Plus de hughpearse (8)

HughPearseEsriTraining
HughPearseEsriTrainingHughPearseEsriTraining
HughPearseEsriTraining
 
HughPearse-ACE-Forensics-Certification
HughPearse-ACE-Forensics-CertificationHughPearse-ACE-Forensics-Certification
HughPearse-ACE-Forensics-Certification
 
Nmap flags table
Nmap flags tableNmap flags table
Nmap flags table
 
ACE forensics certification
ACE forensics certificationACE forensics certification
ACE forensics certification
 
Buffer overflow tutorial
Buffer overflow tutorialBuffer overflow tutorial
Buffer overflow tutorial
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
Metasploit cheat sheet
Metasploit cheat sheetMetasploit cheat sheet
Metasploit cheat sheet
 
Low Level Exploits
Low Level ExploitsLow Level Exploits
Low Level Exploits
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Prism-Proof Cloud Email Services