{"id":4273,"date":"2001-06-26T13:23:30","date_gmt":"2001-06-26T17:23:30","guid":{"rendered":"http:\/\/www.ezrasf.com\/wplog\/?p=4273"},"modified":"2011-04-06T21:07:35","modified_gmt":"2011-04-07T01:07:35","slug":"secure-e-mail-behavior","status":"publish","type":"post","link":"https:\/\/www.ezrasf.com\/wplog\/2001\/06\/26\/secure-e-mail-behavior\/","title":{"rendered":"Secure E-Mail Behavior"},"content":{"rendered":"<p>Great article on secure use of email titled\u00c2\u00a0Secure Online Behavior, Part II: Secure E-Mail Behavior over at the\u00c2\u00a0<a href=\"http:\/\/www.securityfocus.com\/\">SecurityFocus<\/a> site. It discusses the types of email clients and some potential problems, how to create passwords, and how to handle attachements. Seems clear and concise.<\/p>\n<hr \/>\n<p>This seems a little overboard. What authentication method does Microsoft use with\u00c2\u00a0<a href=\"http:\/\/messenger.msn.com\/\">MSN Messenger<\/a>?\u00c2\u00a0<a href=\"http:\/\/www.passport.com\/\">Passport<\/a>.<\/p>\n<p>Why should it be of any suprise that\u00c2\u00a0<a href=\"http:\/\/news.cnet.com\/news\/0-1003-200-6343275.html?tag=dd.ne.dht.nl-sty.0\">Passport will be the authenticator for XP instant messenging<\/a>?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Great article on secure use of email titled\u00c2\u00a0Secure Online Behavior, Part II: Secure E-Mail Behavior over at the\u00c2\u00a0SecurityFocus site. It discusses the types of email clients and some potential problems, how to create passwords, and how to handle attachements. Seems clear and concise. This seems a little overboard. What authentication method does Microsoft use with\u00c2\u00a0MSN [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1198,1213,621],"tags":[],"class_list":["post-4273","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-from-pitas","category-microsoft"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p1rUBW-16V","jetpack-related-posts":[],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts\/4273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/comments?post=4273"}],"version-history":[{"count":0,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts\/4273\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/media?parent=4273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/categories?post=4273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/tags?post=4273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}