Various kind of wireless network technology, computer technology, information technology, Ethernet security,isp,network security,wireless internet,wifi internet,wireless network,wi-fi network and various type of Tips and tricks are Known from this site.

E-mail client Mail Server Settings



Hotmail Settings:

As other web based email services, Hotmail is using the HTTP protocol for connecting you to your mailbox. If you want to send and receive Hotmail emails using an email client software, then your software must support Hotmail HTTP access for your email account. Some email clients, such as Outlook Express or Microsoft Outlook, offer builtin support for Hotmail accounts, so you only have to select HTTP when you are asked to select your email account type and select Hotmail as the HTTP Mail Service Provider.
Mail Server Settings for Hotmail using the Microsoft Outlook Connector
If you are using Microsoft Outlook & the Outlook Connector, you can define your Hotmail account just like any regular POP3 email account:

Hotmail Incoming Mail Server (POP3) - pop3.live.com (logon using Secure Password Authentification - SPA, mail server port: 995)

Hotmail Outgoing Mail Server (SMTP) - smtp.live.com (TLS enabled, port 587)

· Yahoo! Mail Settings
Yahoo Mail offers standard POP3 access for receiving emails incoming through your Yahoo mailbox, by using your favorite email client software. To setup your email client for working with your Yahoo account, you need to select the POP3 protocol and use the following mail server settings:

Yahoo Incoming Mail Server (POP3) - pop.mail.yahoo.com (SSL enabled, port 465)

Yahoo Outgoing Mail Server (SMTP) - smtp.mail.yahoo.com (SSL enabled, port 995)

POP Yahoo! Mail Plus email server settings

Yahoo Plus Incoming Mail Server (POP3) - plus.pop.mail.yahoo.com (SSL enabled, port 995)

Yahoo Plus Outgoing Mail Server (SMTP) - plus.smtp.mail.yahoo.com (SSL enabled, port 465, use authentication)

· Google GMail Settings
The Google GMail service offers email client access for retrieving and sending emails through your Gmail account. However, for security reasons, GMail uses POP3 over an SSL connection, so make sure your email client supports encrypted SSL connections.

Google Gmail Incoming Mail Server (POP3) - pop.gmail.com (SSL enabled, port 995)

Outgoing Mail Server - use the SMTP mail server address provided by your local ISP or smtp.gmail.com (TLS enabled, port 587)

Google Gmail Outgoing Mail Server (SMTP): smtp.gmail.com

The Gmail SMTP server requires authentication (use the same settings as for the incoming mail server)

The Google Gmail SMTP Server requires an encrypted connection (SSL) on port 465.

· MSN Mail Settings
The MSN email service allows you to use the MSN POP3 and SMTP servers to access your MSN mailbox.

MSN Incoming Mail Server (POP3) - pop3.email.msn.com (port 110, using Secure Password Authentication - SPA)

MSN Outgoing Mail Server - smtp.email.msn.com (select "My outgoing server requires authentication")

· Lycos Mail Settings
The Lycos Mail Plus service allows you to use POP3 and SMTP servers for accessing your Lycos mailbox.

Lycos Mail Incoming Mail Server (POP3) - pop.mail.lycos.com (port 110)

Outgoing Mail Server - smtp.mail.lycos.com or use your local ISP SMTP mail server

· AOL Mail Settings
The AOL email service is a web based system, designed for managing your AOL mailbox via HTTP IMAP access. Unlike Hotmail, you can use any email client to access your AOL mailbox, as long as it supports the IMAP protocol.

AOL Incoming Mail Server (IMAP) - imap.aol.com (port 143)

AOL Outgoing Mail Server - smtp.aol.com or use your local ISP SMTP mail server

· Mail.com Mail Settings
The Mail.com email service allows you to use POP3 and SMTP servers for accessing your Mail.com mailbox.

Mail.com Mail Incoming Mail Server (POP3) - pop1.mail.com (port 110)

Outgoing Mail Server - use your local ISP SMTP mail server

· Netscape Internet Service Mail Settings
The Netscape e-mail system is web-based, which means you can access their e-mail from any Internet connection. Netscape Internet Service also supports AOL® Communicator, Microsoft® Outlook, Microsoft® Outlook Express, and other POP3 e-mail software. The outgoing mail server needs SSL support, so make sure your email client software supports SSL connections over the SMTP protocol.

Netscape Internet Service Incoming Mail Server (POP3) - pop.3.isp.netscape.com (port 110)

Netscape Internet Service Outgoing Mail Server - smtp.isp.netscape.com (port 25, using a secure SSL connection)

· Tiscali Mail Settings
The Tiscali email service allows you to use POP3 and SMTP servers for accessing your Tiscali mailbox.

Tiscali Incoming Mail Server (POP3) - pop.tiscali.com (port 110)

Outgoing Mail Server - use your local ISP SMTP mail server

· Freeserve Mail Settings
The Freeserve email service allows you to use POP3 and SMTP servers for accessing your Freeserve mailbox.

Freeserve Incoming Mail Server (POP3) - pop.freeserve.com (port 110)

Outgoing Mail Server - use your local ISP SMTP mail server

· Supanet Mail Settings
The Supanet email service allows you to use POP3 and SMTP servers for accessing your Supanet mailbox.

Supanet Incoming Mail Server (POP3) - pop.supanet.com (port 110)

Outgoing Mail Server - use your local ISP SMTP mail server

[Read More...]


How to Configure Outlook Express email client



Configuring your email client: Microsoft Office Outlook Express

Method 1: Microsoft Office Outlook 2010

1. Start Outlook.

2. On the File menu, click Info and click Account Settings.

3. Select Account Settings from the list.

4. On the E-mail tab, click New and Select Email Account, and then click Next

5. Click to select the Manually configure server settings or additional server types check box, and then click Next.

6. Click Internet E-Mail, and then click Next.

7. In the Server Information section, select IMAP for Account Type.

8. In the Your Name box, enter your name exactly as you want it to appear to recipients.

9. In the E-mail Address box, type your e-mail address.

10. In the User Name box, type your account name.

11. In the Password box, type your password.

12. In the Incoming mail server box, type the name of your IMAP4 server.

13. In the Outgoing mail server (SMTP) box, type the name of your SMTP server.

Note IMAP4 is a retrieval protocol. You must have SMTP to send your messages.

14. Click Next after you have completed entering this configuration information, and then click Finish.

Method 2: Microsoft Office Outlook 2007

1. Start Outlook.

2. On the Tools menu, click Account Settings.

3. Click New.

4. Click Microsoft Exchange, POP3, IMAP, or HTTP, and then click Next.

5. In the Auto Account Setup dialog box, click to select the Manually configure server settings or additional server types check box, and then click Next.

6. Click Internet E-Mail, and then click Next.

7. In the Server Information section, select IMAP for Account Type.

8. In the Your Name box, enter your name exactly as you want it to appear to recipients.

9. In the E-mail Address box, type your e-mail address.

10. In the User Name box, type your account name.

11. In the Password box, type your password.

12. In the Incoming mail server box, type the name of your IMAP4 server.

13. In the Outgoing mail server (SMTP) box, type the name of your SMTP server.

Note IMAP4 is a retrieval protocol. You must have SMTP to send your messages.

14. Click Next after you have completed entering this configuration information, and then click Finish.

Method 3: Microsoft Office Outlook 2003 and earlier versions of Outlook

1. Start Outlook.

2. On the Tools menu, click E-mail Accounts.

3. Under E-mail Accounts, click Add a new e-mail account, and then click Next.

4. Click IMAP as the type of account that you are creating, and then click Next.

5. In the Your Name box, enter your name exactly as you would like it to appear to recipients.

6. In the E-mail Address box, type your e-mail address.

7. In the User Name box, type your account name.

8. In the Password box, type your password.

9. In the Incoming mail server (IMAP) box, type the name of your IMAP4 server.

10. In the Outgoing mail server (SMTP) box, type the name of your SMTP server.NOTE: IMAP4 is a retrieval protocol. You need SMTP to send your messages.

11. Click Next after you have completed entering this configuration information, and then click Finish.

[Read More...]


How to Configure your email client Eudora 7.0



Now Eudora is popular e-mail client program available for Microsoft Windows. Configuring Eudora 7 for Windows to use your new E-mail account. If you should be problem in

“ Could not connect to "pop.gmail.com"

Cause: connection timed out (10060) ”

Then try this procedure, it 100% work for you.

Configuring your email client Eudora 7.0

  1. Open Eudora.
  2. Click the 'Tools' menu, and select 'Options.'

clip_image001

  1. Click 'Getting Started' under 'Category'
    • Enter your full name in the 'Real name' field.
    • Enter your full webmail address (sample@yourdomain.com) in the 'Email address:' field.
    • Enter 'pop.mailserver.com' Like Gmail (pop.gmail.com) in the 'Mail Server (Incoming):' field.
    • Enter your Login “User Name” in User Name field.
    • Click 'Allow authentication' below 'SMTP Server.'
    • Enter 'smtp.mailserver.com’ Like Gmail (smtp.gmail.com) in the 'SMTP (Outgoing) Server:' field.
clip_image003

 

  1. Click 'Checking Mail' under 'Category:.'
    • Set 'Secure Sockets when Receiving' to 'Required, Alternate port'

clip_image002[1]

  1. Click 'Incoming Mail' under 'Category'
    • Optional: If you want to use both Eudora and webmail to check your mail, check the box for "Leave mail on server".
    • Select 'Passwords' for 'Authentication Style.'

clip_image004

  1. Click 'Sending Mail' under 'Category:.'
    • Check the box next to 'Allow authentication.'
    • Set 'Secure Sockets when Sending' to 'Never,' and click 'OK.'
    • Check the box next to "Use submission port (587)" (Check your firewall settings if necessary to enable that port.).

clip_image005

  1. Click 'OK,'
  2. Now go personalities option then “Dominant option”.

clip_image007

  1. Right click on Dominant then click properties.

clip_image009

  1. set 'Secure Sockets when Receiving' to 'Required, Alternate port', And check all check box

clip_image010

  1. et 'Secure Sockets when Receiving' to 'Required, Alternate port'

clip_image011

12. Click ok.

13. Now verify your settings by clicking 'File,' and then 'Check Mail.'

[Read More...]


what is a computer firewall and how does it work



What is Computer firewall:

A wall between the source and the user that blocks a certain type of traffic from reaching its destination is firewall. The firewall protects systems from unauthorized access while maintaining communications with the legitimate ones. A device or a combination of devices configured to allow and reject transmissions in a network on the bases of well-defines rules works as firewall.

A majority of personal computers have built-in firewalls to defend the operating system from illegitimate efforts of transmitting or accessing data. Firewalls do have the capability to perform the routing functions where a number of routers are capacitated to act like firewall filters.

Network traffic has three features: a source, a protocol (typically UDP, TCP or ICMP) and a destination. The UDP and TCP protocols have a source (mostly random) as well as a destination port (a well-known number) for example the destination port of DNS is 53 and the destination port for HTTP is 80. The ICMP protocol carries an ICMP message type; the most common of them are Echo Reply and Echo Request. A firewall protection allows network security administrator to pick which ports and protocols or message types would have access and which would be blocked. Read below to find out how firewall works

How the Firewall Works?

The prime security feature of a firewall is its inbound restriction. A typical firewall configuration abandons all inbound traffic to internal IP addresses. A DMZ network should carry the server that accepts the incoming connections or traffic. Latest firewalls allow in the responses to outbound tariff; the firewalls of computers that are connected to web server via internet would automatically accept responses from the web server that would in turn return to the computer.

Inbound Confinement Example: A “ping” command transmits ICMP Echo Request message and as a response receives ICMP Echo Reply message. For blocking the ICMP Echo Request messages to reach its destination, one has to configure a firewall that would result in failed ping commands. For blocking ICMP Echo Reply messages a firewall could be assembled between the source and the destination to fail all ping commands. A potential attacker is allowed by ping to map the network; for preventing the use of ping command for mapping network disable the inbound Echo Request messages.

The outbound traffic is denied in some network security administrators. The feature forbids users from accessing unapproved protocols while limiting their access to only approved protocols; such restrictions involve avoiding users from online chat or sending outbound emails especially in work places. Such limitations are sensitive to work-around the time and effort of the user necessary to approach a particular protocol via indirect ways thus very few users spent time in figuring out a way. The outbound confinement most of the time works as per design.

Outbound Confinement Example: SMTP protocol that responds to TCP port 25 is used for emails. Blocking the outbound TCP port 25 in your network would disable the users from sending outbound emails except from enabled email servers. An effective work-around the confinement policy is the configuration of mail server to respond to an additional port along with port 25 by an intelligent user.

What are the Types of Firewall?
On the foundation of communication’s situation, its interception and the state firewalls could be classified.

  • The Network Layer Firewall also known as packet filters (in BSD operating systems’ context) works on the low level of the TCP/IP protocol heap which means that none could cross the firewall unless the packets resemble the established rules. Usually default rules are applied but the administrator has authority to modify rules. The Packet Filters have two sub-types. A firewall could make use of a number of packet attributes for filtering traffic such as source port, IP address, destination port or IP address, destination service like FTP or WWW. The process of filtering could be based on protocols of the source such as net block, TTL values and other properties.
    • Stateful Firewalls manages the context of ongoing sessions and process speed packet by the help of state information. In case a packet does not resemble an existing connection then the evaluation would be based on the rules of new connections where the resemblance with the connection on the bases of comparison with the state table of firewall would enable the packet to cross the firewall without any further processing.
    • Faster filters and less memory requirement makes Stateless Firewalls a better option. These firewalls are fundamental for the filtering of stateless network protocols due to no concept of session in their set ups. The firewalls are not clever enough to figure out the extent of communication between the hosts.

 

  • The Application Layer Firewall functions on the application level of TCP/IP stack such as all telnet or FTP traffic and tap all packets whether travelling from or to an application. They drop other packets without recognition of the sender. These filters are helpful in restricting outbound traffic from approaching the confined machine.

 

  • The process ID of data packets is examined by the application firewall against a local process’ ruleset implied in data transmission. The rendered ruleset defines the extent to which filtering would be done. In this firewall the ruleset for standard services such as sharing services is very complex. Along with other processes there might occur some possible associations but these ruleset for process has fixed efficiency; it could not defend against modifications that are caused by exploitations such as the exploits of memory corruption.

 

  • These limitations in the application firewall have triggered the association of a new generation of application named MAC (Mandatory Access Control) or sandboxing in these firewalls in order to secure sensitive services. APPArmor is an example of next generation application firewall that is included in some distributions of Linux.

 

  • A Proxy Server could be configured to act as a firewall by responding to input packets such as connection requests. The server could serve as an application that runs on software of a machine made for this purpose or on a hardware dedicated to the task thus breaking into the path of other packets so they could not access their destination.
    It would be extremely tough for an external network to temper with an internal system that is synchronized with a proxy server. If the application proxy is accurately configured and intact then the misuse by an external network would not inevitably lead to some security breach exploitation. A system that is in the reach of public might be hacked by intruders who would employee the system as a proxy for their illegitimate motives; in such cases proxy would present that machine as it is to the internal computers. For passing packets to a specific target, hijackers could make use of IP Spoofing.

 

  • The function of NAT (Network Address Translation) is often installed in firewalls that give private or personalized address range as given in RFC 1918 to the hosts that are secured behind a firewall. The initiative is taken to protect or camouflage the hosts from potential threats.

 

  • The routable addresses of IPv4, assigned to individuals or organizations to reduce the number along with cost of acquiring such public addresses for every other computer in the building, were the reason behind the designing of a function like NAT. Against network reconnaissance the best defense is to hide the address of protected devices.
[Read More...]


Related Posts Plugin for WordPress, Blogger...
 

Subscribe And Get Free E-Mail Updates:

Return to top of page Copyright © 2012