The History of Electronic Mail wiki email history and latest trend
In recent years, e-mail as a means of communication at the same time continue the rapid development, but also created opportunities and challenges for the software industry and global companies. Internet Engineering Task Force (IETF) was formally established in 1986, aims to establish Internet standards and best practices for using the Internet influence.

After the 1990s, the popularity of the World Wide Web has changed the computing industry's prospects, thousands of computer users rushed to use the Internet to handle business and entertainment.

Software companies to develop the public favorite e-mail client and server software, and through free downloads and high-end business applications provide enhanced functionality. Internet and Web browsing usage growth, many companies released a Web-based e-mail solutions, and are usually free to the end user to provide the support under frequent advertising sponsorship. Provider of enterprise software business has been in constant innovation, provides enhanced features to help IT departments more effectively and securely manage e-mail system, while helping information workers deal with the numerous challenges posed email management. Now, the combination of telephone and e-mail system allows users to access voice mail and faxes via e-mail client, and handheld devices have been widely popular, users can access e-mail via mobile phone.

Increasing importance of e-mail technology has become a competitive global business. System Manager is also facing more challenges, such as providing staff with enhanced features to make it competitive while protecting their networks and intellectual capital.

Evolution of e-mail security threats

In the past five years, we have witnessed the security risks faced by e-mail users and companies become increasingly serious. Viruses, worms, spam, phishing, spyware and a range of newer, more sophisticated attack methods, making e-mail communication and managing e-mail infrastructure has become a more risky behavior. Many identity theft incidents that may occur, the results will lead to intellectual property rights have been infringed and personal information (such as credit card numbers and social security numbers) are lost. These issues and the success led to the establishment of electronic communications privacy control, tracking and journaling new regulations.

Viruses and worms

The first major e-mail worm was Melissa appeared in March 1999; and in May 2000, ILOVEYOU virus on the Internet e-mail messages caused serious damage. Because of these viruses, attachment filtering and blocking has become standard e-mail functions. Now, some attachments would normally be such as Outlook, Outlook Express and Outlook Web Access (OWA) client separate from the e-mail during the transmission and prevent. Anti-virus solutions can run e-mail delivery process, or run when it is stored in the server and e-mail client. Typically, the client and server must implement anti-virus solutions. In fact, many companies are prohibited current anti-virus software is not running a machine connected to the network.

Spam and phishing scams

In early 2000, spam had become a major problem, the effectiveness of e-mail that it had a serious impact. In 2002, the US Federal Trade Commission began deceptive spam regulation, but because there is a huge difference between the laws of the country, making the law difficult to enforce measures in the global system is similar to the Internet. Spam not only makes people angry, but also typically used in phishing scams to steal information and money. Spam is a very cheap advertising (or attack) method, even very low click-through rate is also very effective. Radicati Group, Inc estimated that 2006 will be sent daily average of more than 100 billion spam, accounting for two-thirds of all e-mail communications. To download the full report, please see the Microsoft Exchange Market Share Statistics, 2005 (in English).

Against spam technology from some very simple ideas, such as deleting an e-mail containing the prohibited words. Now, these ideas developed into a variety of spam detection and reduce spam technology. Current solutions still include word blockers, but now they also include sophisticated spam detection tools like Microsoft Smart Screen% 26 # 8482; technology. Quick search on the Internet will find a lot of sales against spam Technology Company, while there are many people willing to help others avoid the anti-spam detection procedures. Unfortunately, the anti-spam detection technology continues to improve, while trying to avoid anti-spam detection is also improving. Anti-Spam detection software, like antivirus software, also needs to be updated regularly to remain effective.

Attacks and new challenges

Nineties, computer experts can understand some common coding errors (such as buffer overflows). Becoming more and more common in the computer connected via network, these vulnerabilities have become more vulnerable to exploitation. Prior to this, the virus is still spread by floppy disk, and after this, attacks become more complex. There are many ingenious methods use memory management errors (including the use of integer overflow), and these methods are very popular in secret communities. Cross-site scripting (CSS) and other scripts into technology used to attack Web applications. Many of the current attack are for the money, and the previous attack is usually to arouse public attention.

We know that malicious users typically use the tool to automatically find and exploit vulnerabilities. These tools include a tool called "fuzz" and such tools can intercept the normal input, and then modify it, or generate an error output. Using these tools can also identify coding errors that can be used to execute code. These tools are used in reverse engineering or used to identify program changes have been many improvements. Now, using the Microsoft product development process a variety of "fuzzer" and analysis tools to identify these potential code defects so that the product can be corrected prior to delivery of these defects. For example, developers use Visual Studio analysis to find defects in their code. Run a code analysis tool is one of the changes as part of the Security Development Lifecycle (SDL) (in English) by the introduction of Microsoft.