Categories
Pages
-

IT Center Blog

Schlagwort: ‘E-Mail’

Email Security – Why Are Redirections Bad?

September 7th, 2022 | by
Illustration mail correspondence

Source: Freepik

The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.

In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.

 

 

Read the rest of this entry »

#GoodToKnow: How to create distribution groups?

August 5th, 2022 | by
Composite image of laptop and mouse put on a desk with letter icons

Source: Freepik

Recently, we told you about mailing lists and how to request them. In this blog post, we’ll introduce you to the difference with distribution groups and describe how to create and manage them.

Read the rest of this entry »

#GoodToKnow: How to Request Mailing Lists?

August 1st, 2022 | by
Hand with world mail delivery on world map background

Source: Freepik

In addition to the central mail server, the IT Center also offers the setup of mailing lists. In contrast to lists that are maintained privately in a mail program, these can be used to address a larger group of people. In this blog post, you will learn how to apply for these lists and what you need to be aware of.

Read the rest of this entry »

Email Security – The Smtp Protocol and Its Problems (Sending and Receiving)

 Technical graphic for receiving and sending e-mails

Source: Freepik

In our first article on the topic of e-mail security, we gave an insight into the historical development of e-mail. We briefly explained how e-mail exchange works and referred to the statistics of the e-mail service at RWTH Aachen University.

Today we’ll tell you about the transmission protocol “Simple Mail Transfer Protocol” (SMTP) and its pitfalls.

Read the rest of this entry »

E-Mail Attachments and Their Challenges

June 22nd, 2022 | by
Electronic document on laptop screen

Source: freepik.com

Everybody has experienced this: You are working on documents with several people. When the work statuses then need to be exchanged, there are various approaches.

Still popular is the sending of attachments via e-mail. Sounds easy, but it can cause some difficulties.

To support you at this point, the IT Center has prepared a handout on how to deal with attachments. But let’s start from the beginning…

Read the rest of this entry »

E-Mail Security – E-Mail & Mail Statistics at RWTH

June 15th, 2022 | by
Paper with @-Sign

Source: freepik.com

About 50 years ago, the first e-mail was sent – albeit between two computer systems that were part of the same local network. In the 1980s, the internet was opened up to a larger circle of users and e-mail was given its own transmission protocol “Simple Mail Transfer Protocol” (SMTP).

Even today, the exchange of messages via e-mail is undoubtedly an important way of exchanging information between parties via an asynchronous communication channel.

Read the rest of this entry »

New E-Mail Lifecycle Started – What you Should Know!

April 20th, 2022 | by
letter box on house wall

Source: Pixabay

If you weren’t part of RWTH Aachen University for a while, you might already know it – the E-Mail Lifecycle. For the e-mail domain @rwth-aachen.de it is starting today again. That means, if you have left the RWTh, it will be checked regularly if your mailbox is still in use – if not, it will be deleted. In this article you will learn how this works and what you should pay attention to. Read the rest of this entry »

Macros – E-mail Filtering at RWTH

March 25th, 2022 | by
Screen with 2 ladybugs, gear and envelope

Source: Pixabay

E-mails are a major gateway for cyberattacks. These attacks are no longer isolated incidents and are part of our everyday life. Especially the spreading of malware through attached documents with macros are very popular among cyber criminals. These macros can for example contain hidden malware. If the recipient activates these macros when opening the document, any malicious software they may contain can cause great damage. For this reason, a protection mechanism for e-mail macro filtering was installed for the RWTH e-mail service on November 16, 2021. Office documents are the most used, but also PDFs, e.g. containing form fields. Read the rest of this entry »

RWTH mails in the spam folder – why do they end up there and what you can do about it?

May 3rd, 2021 | by

Everyone knows them, everyone receives them – spam e-mails. Fortunately, they are usually sorted out automatically (Source: Pixabay.com)

The spam folder – that place to which undesired emails are banished. This is exactly what the term “spam” refers to: e-mails that you don’t want to receive, which nonetheless keep finding their way into our inbox. Generally, the spam folder is a preset folder provided by the e-mail client, into which unsolicited e-mails are automatically moved with the help of anti-spam software. In fact, most of the time this sorting out works quite well.

Read the rest of this entry »