Skip to main content

Posts

Showing posts from September, 2015

EMAIL STEGNOGRAPHY-ENCRYPT YOUR E-MAIL

IN THIS DIGITAL WORLD,THEIR IS LOTS OF  SECURITY FLAW.NOTHING IS SECURE. NOW A DAYS  EVERY BODY USING E-MAIL SERVICE NOT FOR ONLY  CHATTING BUT ALSO FOR OTHER SERVICE.SO       E-MAIL  SECURITY IS OUR MAIN CONCERN.PLEASE  READ MY PREVIOUS ARTICLE    “E-MAIL-HIDDEN SECRETS”   FOR SECURITY OF E-MAIL. TODAY I AM GOING TO TELL ABOUT STENOGRAPHY. What is stenography?? actually it's an technique to encrypt/hide  your secret/confidential massage . Encryption can be many types like SHA/HASH OR  CYPHERS. Even through this technique you can hide  your  file into an another file like  pdf/image/text/audio/video and lots more. But today we only discuss about the mail  encryption in text. For this their is many website and  softwares.but today we concern about onlytwo  website which are mine favourite.. 1. www.spammimic.com 2. www.ghostmail.com         SPAMMIC-MAIL ENCRYPTION STEP 1. open up your browser an

EMAIL-HIDDEN SECRET

Here we go ..come again with new topic on best E-mail service...Gmail.. in this article we will cover all the features of the G-mail along with the security of G-mail and stegnography,E-mail spoofing,hacking and much more... this topicwill take long time to be cover in here..so stick with me.         or  like facebookfan page of this blog,that will keep you update what going on this blog. https://www.facebook.com/hackerheavenofficialpage?ref=bookmarks first of all start with the basic of E-mail service.how it work what are the responsible factor/protocols for this service. … ………EMAIL PROTOCOL………….   FIRST OF WE HAVE TO UNDERSTAND THE MAIL FUNCTIONALITY IN THE INTERNET BEFORE ANY THING IT IMPORTANT TO KNOW HOW ITS WORK ON THE INTERNET...WHAT ARE THE BASICS PROTOCOLS RESPONSSIBLE FOR SENDING ,RETRIEVING THE MAIL.... Interactions between email servers and clients are governed by email protocols.  The three most common email protocols are POP, IMAP and M