Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 3 - Email Encryption: What Are You Waiting...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Email Encryption: What Are You Waiting For?
By: Michael Lowry
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 4
    2007-11-14

    Table of Contents:
  • Email Encryption: What Are You Waiting For?
  • The Basics
  • You Want More?
  • Conclusion

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Email Encryption: What Are You Waiting For? - You Want More?


    (Page 3 of 4 )

    I think it's time to get a little more specific. A typical encryption works with the use of keys, as I mentioned earlier. A typical user will have both a public key and a private key; the private key is strictly for that person and the public key is distributed among whoever that person deems worthy. For a person to encrypt a message, they would use your public key before sending it to you. Then once you receive the encrypted message, you would use your private key to decrypt it. However encrypting is not a tool for the super lazy. You need to encrypt all of your messages or hackers will notice that a certain percentage of your emails aren't encrypted, basically showing which emails are important and which aren't.

    One way of encrypting your email is to obtain a personal email certificate and use it as your digital signature. There are a wide variety of sites and companies that provide these certificates, either for pay or for free, so I won't offer any specific links lest I become the target of complaints. The sites are easy to find so I don't think you'll have any trouble.

    These signatures work by allowing the recipient to verify that the emails you send are actually from you. They also encrypt the messages so that only the person you send it to can read them. Your private key is used in most cases to digitally sign your messages. One way this can benefit you and your contacts is that it helps prevent unwanted spam and malware from being sent out under your name. After a while, your contacts will come to recognize your digital signature, so when they come across a message from your email address with no signature, they'll know to automatically delete the message.

    The most well known encryption standard is PGP (Pretty Good Privacy). It was developed by Philip Zimmerman in 1991 (there is a scandalous story surrounding its creation, but I won't get into it here) and uses the same techniques (keys, certificates) that I've already discussed. As of now, there is no known method for hacking into PGP encryption using direct computational cryptanalysis. As you might expect there are several versions available, including this free guide for the lazy (not super lazy) offered through this link: http://www.dtek.chalmers.se/~d97jorn/pgp/

    More Web Hosting Articles Articles
    More By Michael Lowry

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap