In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
At the beginning of the dangerous walk to rub off a wave of old hot spots, it is well known that during the selection of Hillary Clinton and Trump, Trump narrowly beat Hillary Clinton to become the new president of the United States. The deadliest damage to Hillary Clinton during the campaign was the "email door". If she could read this article, she would be annoyed to say, "it turns out that encrypting emails is so simple."
Paperless office is popular in modern society, so mail has become an indispensable part of office and even life.
How to ensure the security of mail, so that the "mail door" will not happen again? In fact, it is very simple, we only need to encrypt our email, this time I would like to tell you that the email encryption method is: S/MIME.
DDOS www.33ddos.com
Let me first give you a brief introduction to what is: S/MIME. The full name of S/MIME in English is: Secure/MultipurposeInternet Mail Extensions. After translated into Chinese, the secure / Multi-purpose Internet Mail extension Protocol is a standard protocol specially used for public key encryption and MIME data signature. To put it simply, after you encrypt the email with MIME, only the sender and recipient can view it, and no one else can see it. The purpose of a data signature is to let the recipient know that the email was sent by you and has not been maliciously tampered with.
At the same time, when you sign an email, you will use two encryption keys, one public key and one private key. The private key will only be stored in your mail sending device, while the public key will arrive in the recipient's mailbox with the message, and the oil recipient will hold the public key to decrypt the message.
OK, the function has basically been introduced. Then we start to learn how to encrypt our emails.
First, we need to prepare something.
1. An Apple phone or computer. (we only focus on Apple's system this time)
two。 One S/MIME certificate
3. The mailboxes of both parties with S/MIME configured
There are three kinds of S/MIME certificates. At present, the two most mainstream certificates are: paid S/MIME certificate and free S/MIME certificate. Of course, if both of these are not to your liking, you can also generate your own S/MIME. After obtaining the S/MIME certificate, you can install it. The process is very simple, so I won't repeat it again. If you don't understand, you can do it on your own.
OK, the next big thing is how to use S/MIME for email.
The specific procedure is like this, look carefully ~ ~ No napping: in Mail.app, open the "Preferences" property setting, and then select the "Accounts" account tab. Next, select the email account for which you want to use the S/MIME certificate, and then go to the "Server Settings" server settings interface. Uncheck the "Automatically manage connectionsettings" option of IMAP and SMTP, and the set interface is as follows:
The purpose of this is to make sure that your account uses the correct TLS/SSL port and authentication method (the setting method can be obtained from the appropriate email provider). This ensures that a secure connection is used between your macOS and your email server, which is also a good way to secure your email.
Next, go to the hands-on page, how to use S/MIME?
Just now we have bound the S/MIME certificate, ha ~ now all we need to do is create a new email with the mailbox that has been bound with the S/MIME certificate, enter the recipient's address, and two buttons appear after the subject, as shown in the figure:
There is one thing to note here: the encryption function (lock logo) can only be used after you exchange encryption keys with the recipient. Until then, you can only use the signature function. After sending, the message received by the recipient is as follows:
The content of the message has not been encrypted, but the signature indicates that the message was sent from you, and the recipient can now sign or encrypt the reply email, because he already has your key (when he receives your email, the certificate and key will be automatically installed in their keychain)
When you receive a reply email, you also get the other person's S/MIME certificate, so you can also send him an encrypted email now.
Note: both sides of the communication must be configured with a S/MIME certificate and have had a key exchange (both parties send and receive mail once).
If a person without a S/MIME certificate and key opens your email, he can only see these things:
Now the encrypted email content can no longer be viewed directly, and if you do not have a backup certificate, the email content can never be obtained, and the encrypted attachment cannot be opened properly.
Let's move on to the last step of the day, how to use S/MIME on IPHONE or IPAD
First, we need to extract the certificate from the computer and import it into the IOS device. Because Apple's computer and system are not the same system.
Once selected, click File and select Export. You can enter the export name yourself, but the export format must be "Personal Information Exchange (.p12)".
Click "Save", but you still need to re-enter a password to protect the certificate at this time, and you need to re-enter this password later on the iOS device. The following is the exported certificate:
You can use AirDrop or email to import the certificate into the iOS device, but do not encrypt this email if you are sending it, because your iOS device cannot read the encrypted email yet. Next, please configure the certificate as shown in the following figure:
It's a little troublesome, but sometimes there's nothing I can do to ensure the security of the email.
OK, all the problems are solved here, although it is a bit troublesome to set it up, but after setting it up, you don't have to worry about it at all, and you can enjoy the happiness brought by email security without worry.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.