Author: Tsakani Stella Rikhotso

  • 116935-61591-14-10 SayPro Lesson The Email Client Window

    Today’s powerful email clients feature a user-friendly interface. The colourful icons and drag and drop capability can help manage email and improve your experience.

    The first time you open your email client, many items you see will look familiar. A few things are specific to your email client, so be sure to read the Help file. Pictured below is the Microsoft Outlook 2010 window.

    INBOX: The INBOX displays a list of received messages. Each message header shows you who sent the mail, the subject line, the time and date it was sent, and at times, the size of the message.

    The Email Message Window- Sending a New Message

    Use the email message window to compose and send email messages.

    To send a new message:
    • Click the New Email command on the Ribbon.
    • The Compose windowwill appear.
  • 116935-61591-14-9 SayPro Lesson Sending Email

    By the end of this lesson, learners should be able to:

    • Identify the parts of the email message window
    • Compose and send an email message
    • Receive new email messages
  • 116935-61591-14-8 SayPro Lesson Security considerations

    An organisation must take note of certain security considerations of using the internet for transmitting messages in terms of both the environment and its implications to the immediate environment.

    1. Computer virus

    A computer virus is an unauthorised software program or portion of a program that is introduced into a computer or network. The purpose of a virus is to damage data files, delete data or perform other harmful actions. Depending on the purpose of a particular virus, the reformatting of an infected diskette or hard drive may be the only method of dealing with the virus. This will result in the loss of all the data on the diskette or hard drive.

     

    • Computer viruses are becoming more common and the number of viruses being detected has increased. The downloading or copying of unauthorised software onto employees’ PCs is one of the easiest ways for these viruses to invade a computer or network.

     

    • It is therefore important that the company not permit its employees to download data of whatever nature except possibly to a stand-alone PC set aside for this purpose. Further, all information downloaded onto the PC should be checked with virus scan software, which the company should have. The organisation should accordingly contain stringent rules in this regard to safeguard its data and computer system

     

    1. Encryption

    Encryption is the process of disguising, that is, encrypting, a readable communication, into an unintelligible scramble of characters according to some code or cipher. The readable communication is called plaintext. The encrypted communication is called ciphertext. Decryption is the process of converting the ciphertext back to its original, readable form”.

     

    • Most encryption software programs use algorithms and encryption keys. These keys contain a string of zeros and ones of varying lengths. Each character in the string is called a bit. Encryption software combines the message or attachment to be transmitted and the key in a complex mathematical algorithm, resulting in the ciphertext. The longer the bits in the key, the more difficult it is to “crack” the encryption system without the key.

     

    • Given the fact that the Internet is an open network, it is important to remember that if one is going to send messages which are not encrypted; this would be the electronic equivalent of sending postcards, as opposed to the equivalent of sealed envelopes when encryption is used.

     

    • It appears as if encryption software is free to be used by commercial or private organisations (i.e. one does not need a permit from the relevant government department to use it). The situation is governed by the Armaments Development and Production Act.This Act must be read in conjunction with Schedule 1 of the General Armaments Control Schedule. In terms of the Schedule, the South African government controls encryption as a dual-use item. This means that the export of encryption software requires an individual validated licence. While the Act does not specifically include encryption software in its definition of “armaments”, item 8 of the Schedule places controls on the export of military equipment that possesses cryptographic capabilities. Hence, a valid permit is required from the Armaments Control Division for the import of cryptographic equipment for software.

     

    • It is important for South African users to note that the export of encryption software is regulated in many countries.In the United States, these regulations take the form of export controls. The practical effect of this for South African users is that they are not able to use, for example, PGP (Pretty Good Privacy). However, there is an international version of PGP (known as PGPi) which is available for use by South African users.

     

    1. Spam filter

    Spam is any kind of email that you don’t want and that you didn’t sign up to receive. Some spam is annoying but harmless, but some might be part of an identity theft scam or other kind of fraud. You can get spam in instant messages, text messages, and on your social networking sites. This information below will help you to reduce spam email.

    • Use email software with built-in spam filtering.SmartScreen filter helps reduce unwanted email. It’s built into Microsoft email programs and is turned on by default.

     

    • Add people you know to your safe sender list and unwanted senders to your blocked list.This helps SmartScreen personalize your email experience, to deliver email that you want into your Inbox, and to filter unwanted email into the Junk folder.

     

    • Share your email address only with people you know.Avoid posting your email address on your social networking site, in large Internet directories, and in job-posting websites. Don’t even post it on your own website (unless you disguise it as described below).

     

    • Ignore junk email or IM.Spammers get rich (and build their contact lists, too) when people buy their “products.” So don’t reply to spam (even to unsubscribe), buy anything from an unfamiliar business, give to any “charity” you don’t know by reputation, or agree to hold or transfer money for anyone. Messages that appear to come from Microsoft and that ask for your password or threaten to close your account or expire your password are false.

     

    • Look for pre-checked boxes.When you shop online, companies sometimes pre-select check boxes that indicate you have agreed that it’s fine to sell or give your email address to responsible parties. Be prudent about when to subscribe to email newsletters and about what kind of email messages you are willing to receive. Clear the check box if you don’t want to be contacted.

     

    • Read the privacy policy.When you sign up for web-based services such as banking, shopping, or newsletters, carefully read the privacy policy before you reveal your email address so you don’t unwittingly agree to share confidential information. The privacy policy should outline the terms and circumstances regarding if or how the site will share your information. If a website does not post a privacy statement, consider taking your business elsewhere.

     

    • Disguise your email address.When you post to a message board, newsgroup, chat room, or other public web page, spell out your entire email address, for example, SairajUdin AT example DOT com. This way, a person can interpret your address, but the automated programs that spammers use often cannot.

     

    • Improve your computer’s security.You can greatly reduce your risk from hackers, viruses, and worms if you use a firewall, keep your Windows and Microsoft Office software up to date, and install antivirus and antispyware software and update it routinely.