Academic literature on the topic 'Methods behind hacking of an E-mail'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Methods behind hacking of an E-mail.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Methods behind hacking of an E-mail"

1

G, Gopu, and Thangadurai K. "A Study on Security Issues in E-Mail Communication." Shanlax International Journal of Commerce 7, S3 (2019): 90–94. https://doi.org/10.5281/zenodo.2572436.

Full text
Abstract:
Today, the entire life of human being involves in facing of risk in their day to day life from the technological advancements. An increasing number of technological advancement in internet world, the domestic and international criminal activities has been increased. Computer and other electronic devices can be a tool to commit crime or are targeted by criminals such as hackers. The article presents the role of hackers in electronic mail and intention with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up. We mainly focused on how hacking works in E-mail and its impact in India. 
APA, Harvard, Vancouver, ISO, and other styles
2

Suriya, Begum* Sujeeth Kumar Ashhar. "A COMPREHENSIVE STUDY ON ETHICAL HACKING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 214–19. https://doi.org/10.5281/zenodo.59534.

Full text
Abstract:
Explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. There are many techniques used to hack the information. This paper explores the ethics behind techniques of ethical hacking and whether there are problems that lie with this new field of work. In this paper we have discussed in detail history and types of hackers , different techniques used to hack the users, Operating System  used in hacking  , its pros and cons and a detail case study of J.P.Morgan.
APA, Harvard, Vancouver, ISO, and other styles
3

S, Santhi, and Mohan M. "Image Spam Detection through Pattern Recognition with IP Tracing Technique." International Research Journal of Computer Science 11, no. 10 (2024): 601–4. http://dx.doi.org/10.26562/irjcs.2024.v1110.01.

Full text
Abstract:
Image spam is a kind of E-mail spam where the message text of the spam is presented as a picture in an image file. The basic rationale behind image spam is difficult to detect using text spam filtering methods which is designed to detect patterns in text in the plain-text E-mail body or attachments. A new trend in email spam is the emergence of image spam. The most previous works of image spam detection focused on filtering the image spam on the client side. This proposed system considered more desirable comprehensive solution which embraces the both server side filtering and client side detection methods. The spectral clustering algorithm is introduced to similarity measure for cluster analysis of spam images to filter the attack activities of spammers and fast trace back the spam sources. The active learning algorithm is limited where the learner guides the users to label as few images as possible while maximizing the classification accuracy.
APA, Harvard, Vancouver, ISO, and other styles
4

Zisopoulos, A. D., K. G. Panitsidis, G. K. Broni, and N. D. Kartalis. "Cross border Interbank Payment System (CIPS) Security Supplements; Tangible Radio Safety Box, Software as non-textual Password and Revolving Executable Code Modules." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 20 (December 14, 2022): 273–83. http://dx.doi.org/10.37394/23207.2023.20.26.

Full text
Abstract:
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security. Minor corrections were proposed, like an e-mail with a new domain for every transaction, Ping services in a VPN environment, and mirroring avoidance. Our primary approach was to fight internal fraud and hacking threats. Apart from these known vulnerabilities indemnification, we propose three specific security supplements. A shortwave activated latch inside a local safe box and Thales interconnector for a tangible bank security system. The asset owner unlocks his funds as digital money or tangible items like gold through radio communications SDR (Software Defined Radio). Second is the cornerstone of our civilization, the computer-executable avoiding all methods for non-textual passwords. Our last development is a GitHub antipode Software authoring anonymous system. According to our plan, the Internet-based banking system software has separated intercommunicating subroutines. All subroutines are assigned to various programmers for independent implementation, avoiding the internal hacker without the need to find him. For example, a system software written by splitting it into 12 subroutines assigned to 12 programmers working on subroutines has a probability of the thirteenth order of magnitude.
APA, Harvard, Vancouver, ISO, and other styles
5

Junco, Reynol, Jeanna M. Mastrodicasa, Alicia Vance Aguiar, Elizabeth Mae Longnecker, and Jeffrey Nils Rokkum. "Impact of Technology-Mediated Communication on Student Evaluations of Advising." NACADA Journal 36, no. 2 (2016): 54–66. http://dx.doi.org/10.12930/nacada-16-014.

Full text
Abstract:
The field of academic advising lags behind other similar fields in the use of technologically mediated communication modalities shown to improve academic outcomes. We investigated student satisfaction with undergraduate advising by examining the ways communication methods, such as social media, between student and advisor relate to student satisfaction. Results showed that although advisors rarely communicated with students via social media, text messaging, or instant messaging, the number of face-to-face advising meetings was positively predicted by advisor use of instant messaging and text messaging and negatively predicted by their use of Facebook. Furthermore, e-mail communication positively predicted a student's positive view of the advising experience, but communicating through Twitter predicted negative views of advising.
APA, Harvard, Vancouver, ISO, and other styles
6

McGovern, Patrick J. "Perestroika in Political Science: Past, Present, and Future." PS: Political Science & Politics 43, no. 04 (2010): 725–27. http://dx.doi.org/10.1017/s1049096510001307.

Full text
Abstract:
Anniversaries, for good or ill, are often hard to ignore. The finiteness and roundness of a century proves almost too irresistible for us to not stop and try to derive some sense of accomplishment and meaning from our individual and collective efforts. The recent 100th anniversary of theAmerican Political Science Reviewin 2006, for example, proved too much to ignore and, as a result, provided us with just such a reckoning (see, e.g., Sigelman 2006). As alluring as the end of a century is for such reminiscing, this impulse is even more forceful at the end of a millennium. Such a closing represents a chance for letting go of the past, gaining some sense of forgiveness, and with the hope of constructing a new future, taking a chance to begin again. This notion of renewal and change was very much on the mind of the individual behind the original “Perestroika” e-mail, circulated in the fall of 2000. In the e-mail, Mr. Perestroika called into question the relevance of the APSA and theAmerican Political Science Review(APSR), questioned the narrowness of our methods, and bemoaned the whiteness and maleness of most of the leadership positions within the discipline. The new millennium seemingly called for a new approach to the study and practice of political science that would move us away from the “coterie” of “East Coast Brahmins” who dominated the APSA andAPSR. The tenth anniversary of Mr. Perestroika's e-mail offers us a chance to reflect on and revisit the millennial promise of the Perestroika movement, examine its impact upon the discipline, and assess the nature of its future.
APA, Harvard, Vancouver, ISO, and other styles
7

S., Palchaudhuri (Mukhopadhyay), and Sen Anima. "Determination of drinking water-arsenic in nano gram level using flow injection analysis system atomic absorption spectrometry and an interpretation for the cause behind contamination." Journal of Indian Chemical Society Vol. 84, Nov 2007 (2007): 1148–52. https://doi.org/10.5281/zenodo.5824688.

Full text
Abstract:
Department of Geology, Presidency College, Kolkata-700 073, India E-mail : spchaudhuri@vsnl.net University Science Instrumentation Centre, University College of Science, University of Calcutta 92, A chary a Prafulla Chandra Road, Kolkata-700 009, India <em>E-mail </em>: animasen@yahoo.co.in <em>Manuscript received 12 December 2006, revised 10 August 2007, accepted 23 August 2007</em> The ground water in arsenic infested zone, West Bengal, India is characterised by high iron, arsenic, calcium, magnesium and bi-carbonate with low chloride and sulphate. The pH is generally greater than 7. In this pH medium, iron tends to precipitate as hydroxide and arsenic may also co-precipitate with ferric hydroxide. Addition of hydrochloric acid is necessary to dissolve all iron, prior to arsenic analysis by now injection analysis system - atomic absorption spectrometric method. Addition of sufficient KI in HCI medium is necessary to reduce all As<sup>5+</sup> to As<sup>3+</sup>&nbsp;state before analysis. The average practical detection limit of the FIAS-AAS method is 0.035 &micro;g/L. The method itself is highly sensitive and sensitivity is 0.07 &micro;g/L which is far better than many other methods such as flame atomic absorption, hydride generation atomic absorption spectrometric method and from the conventional spectrophotometric method. Shallow tubewell or well shows the highest peak in the bar graph.
APA, Harvard, Vancouver, ISO, and other styles
8

Rais, Muhammad Amin, and Phichit Songkarn. "Hacker and the Treat for National Security: Challenges in Law Enforcement." Indonesian Journal of Counter Terrorism and National Security 1, no. 1 (2022): 45–66. http://dx.doi.org/10.15294/ijctns.v1i1.56728.

Full text
Abstract:
Globalization has become the driving force behind the birth of the era of information technology development. The development of this technology is very fast and has spread to all corners of the world. The development of information technology is not only felt by developed countries but developing countries also feel the development of information technology, so that information technology gets an important position for the progress of society in this modern era. The need for computer network technology is increasing. Apart from being a medium for providing information, through the internet, commercial community activities are also the largest and growing rapidly and penetrate various national borders. Even through this network market activities in the world can be known for 24 hours. Through the world of the internet or also called cyber space, anything can be done. The positive side of this virtual world of course adds to the trend of world technology development with all forms of human creativity. However, the negative impact cannot be avoided. When pornography is rife on the internet, people can't do much. Along with the development of internet technology, causing the emergence of a crime called cyber crime or crime through the internet network or cyberspace. The emergence of several cases of cyber crime in Indonesia, such as credit card theft, hacking of several sites, tapping other people's data transmissions, such as e-mail and manipulating data by preparing unwanted commands into computer programmers. So that in computer crimes it is possible to have formal offenses and material offenses. Formal offense is the act of someone entering someone else's computer without permission, while material offense is an act that causes harm to other people. The existence of cyber crime has become a threat to stability, so it is difficult for the government to balance the techniques of crime committed with computer technology, especially in the internet network.
APA, Harvard, Vancouver, ISO, and other styles
9

Otsuka, Yuichiro, Yoshitaka Kaneita, Osamu Itani, and Yuuki Matsumoto. "Why Do Physicians in Japan Use e-Cigarettes and/or Heated Tobacco Products? A Cross-Sectional Survey." Hygiene 4, no. 1 (2023): 1–13. http://dx.doi.org/10.3390/hygiene4010001.

Full text
Abstract:
Background: The tobacco industry has actively advocated for electronic cigarettes (e-cigarettes) and heated tobacco products (HTPs) as harm-reduction alternatives to traditional cigarettes. Around 40% of smoking physicians have adopted HTPs. This study aimed to uncover the motivations behind Japanese physicians’ e-cigarette and HTP use while analyzing the associations between product use, physician demographics, lifestyles, and smoking preferences. Methods: A mail-based survey was conducted in 2020, targeting 6000 male and 1500 female physicians. From the 5492 survey participants, 346 physicians aged 28 to 98 who were current smokers were selected. The survey assessed their usage of e-cigarettes and HTPs and explored the reasons for initial adoption. A multivariate logistic regression analysis examined the relationships between product use, physician characteristics, and behaviors. Results: Approximately 33.8% of smoking physicians had experimented with e-cigarettes and HTPs. E-cigarette and HTP use correlated with youthfulness, nicotine addiction, and a history of medical treatment. The primary drivers for adopting e-cigarettes and HTPs were reduced odor (74.4%), perceived harm reduction (48.7%), and decreased exposure to secondhand smoke (29.1%). Conclusions: Physicians, when transitioning from conventional cigarettes to HTPs or e-cigarettes, are primarily motivated by a desire to reduce the odor of conventional cigarettes rather than health-related concerns.
APA, Harvard, Vancouver, ISO, and other styles
10

AUGUSTYNOWICZ, Kinga, Monika TRUCHTA, Marta MARCINKOWSKA, Michał STOLIŃSKI, Kinga ŚWIĄDER, and Agata LIS. "TOT and TVT as surgical methods of treatment of stress urinary incontinence in women - meta-analysis." Journal of Education, Health and Sport 45, no. 1 (2023): 299–309. https://doi.org/10.12775/JEHS.2023.45.01.021.

Full text
Abstract:
<strong>AUGUSTYNOWICZ, Kinga, TRUCHTA, Monika, MARCINKOWSKA, Marta, STOLIŃSKI, Michał, ŚWIĄDER, Kinga and LIS, Agata. TOT and TVT as surgical methods of treatment of stress urinary incontinence in women - meta-analysis.</strong><strong>&nbsp;Journal of Education, Health and Sport. 2023;45(1):</strong><strong>299</strong><strong>-</strong><strong>309</strong><strong>. eISSN 2391-8306. </strong><strong>https://dx.doi.org/10.12775/JEHS.2023.45.01.02</strong><strong>1</strong> <strong>https://apcz.umk.pl/JEHS/article/view/45</strong><strong>339</strong> <strong>https://zenodo.org/record/8280104</strong> &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <strong>The journal has had 40 points in Ministry of Education and Science of Poland parametric evaluation. Annex to the announcement of the Minister of Education and Science of 17.07.2023 No. 32318. Has a Journal&#39;s Unique Identifier: 201159. Scientific disciplines assigned: Physical Culture Sciences (Field of Medical sciences and health sciences); Health Sciences (Field of Medical Sciences and Health Sciences).</strong> <strong>Punkty Ministerialne z 2019 - aktualny rok 40 punkt&oacute;w. Załącznik do komunikatu Ministra Edukacji i Nauki z dnia 17.07.2023 Lp. 32318. Posiada Unikatowy Identyfikator Czasopisma: 201159.</strong> <strong>Przypisane dyscypliny naukowe: Nauki o kulturze fizycznej (Dziedzina nauk medycznych i nauk o zdrowiu); Nauki o zdrowiu (Dziedzina nauk medycznych i nauk o zdrowiu).</strong> <strong>&copy; The Authors 2023;</strong> <strong>This article is published with open access at Licensee Open Journal Systems of Nicolaus Copernicus University in Torun, Poland</strong> <strong>Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author (s) and source are credited. This is an open access article licensed under the terms of the Creative Commons Attribution Non commercial license Share alike.</strong> <strong>(http://creativecommons.org/licenses/by-nc-sa/4.0/) which permits unrestricted, non commercial use, distribution and reproduction in any medium, provided the work is properly cited.</strong> <strong>The authors declare that there is no conflict of interests regarding the publication of this paper.</strong> <strong>Received: </strong><strong>26</strong><strong>.07.2023. Revised:21.08.2023. Accepted: 2</strong><strong>4</strong><strong>.08.2023. Published: 2</strong><strong>9</strong><strong>.08.2023.</strong> &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <strong>TOT and TVT as surgical methods of treatment of stress urinary incontinence in women</strong>&nbsp;<strong>- meta-analysis</strong> <strong>TOT i TVT jako chirurgiczne metody </strong><strong>leczenia</strong><strong>&nbsp;wysiłkowego nietrzymania moczu u kobiet</strong>&nbsp;<strong>- metaanaliza</strong> &nbsp; Kinga Augustynowicz Uniwersytecki Szpital Kliniczny im. Wojskowej Akademii Medycznej &ndash; Centralny Szpital Weteranów Stefana Żeromskiego 113, 90-549 Łódź ORCID 0000-0003-4547-9599 https://orcid.org/0000-0003-4547-9599 E-mail: kingaugustynowicz@gmail.com &nbsp; Monika Truchta Centralny Szpital Kliniczny Uniwersytetu Medycznego w Łodzi ul. Pomorska 251, 92-213 Ł&oacute;dź ORCID 0009-0000-8177-9164 https://orcid.org/0009-0000-8177-9164 E-mail: monikatruchta@gmail.com &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Marta Marcinkowska Powiatowe Centrum Zdrowia w Brzezinach sp. z o.o. Marii Curie&ndash;Skłodowskiej 6, 95-060 Brzeziny ORCID 0009-0000-5318-1886 https://orcid.org/0009-0000-5318-1886 E-mail: marta.marcinkowska96@gmail.com &nbsp; Michał Stoliński SP ZOZ Szpital Powiatowy im. Edmunda Biernackiego w Opocznie ul. Partyzant&oacute;w 30, 26 &ndash; 300 Opoczno ORCID 0009-0005-5865-3789 https://orcid.org/0009-0005-5865-3789 E-mail: michalstolinski1995@gmail.com &nbsp; Kinga Świąder Faculty of Medicine, Uniwersytet Medyczny w Łodzi, Plac Gen. Józefa Hallera 1, 90-647 Łódź ORCID 0000-0003-0185-6524 https://orcid.org/0000-0003-0185-6524 E-mail: kingaswiader@icloud.com &nbsp; Agata Lis SPZOZ Uniwersytecki Szpital Kliniczny nr 1 im. Norberta Barlickiego W Łodzi, ul. dr Stefana Kopcińskiego 22, 90-153 Ł&oacute;dź ORCID 0009-0008-4630-7610 https://orcid.org/0009-0008-4630-7610 E-mail: agatalis7@gmail.com &nbsp; &nbsp; &nbsp; &nbsp; <strong>Abstract</strong> Introduction: Urinary incontinence can affect up to 50% of women in the world. The most common is stress incontinence, which consists in involuntary, uncontrolled urination when the pressure in the abdominal cavity increases. Among the most commonly used methods of treating stress urinary incontinence there are treatments using a synthetic tape - TOT and TVT. In this work, both methods were compared in terms of e.g. their effectiveness, the presence of complications, the safety of both procedures and the method of performing both procedures. Material and methods: The work was based on the articles published in PubMed, medical books and websites. Results: Both TOT and TVT in the treatment of stress urinary incontinence are highly effective. Both short-term and long-term treatment results of both methods are very good and very similar. In the case of TOT, the subjective cure &lt;1 year is 62-98%, where with TVT - 71-97%. Subjective long-term cure (&gt;5 years) was 43-92% with TOT and 51-88% with TVT. The incidence of complications after TOT is significantly lower, but there is a higher probability of having to perform a repeat procedure to treat stress urinary incontinence. TVT has a lower risk of reoperation in &gt;5 years (1.1%) but has a higher risk of chronic perineal pain. Conclusions: The placement of a tension-free TVT or TOT tape should be the surgery of choice for women with simple stress urinary incontinence. However, there is a higher risk of chronic perineal pain 12 months after having a tape placed behind the symphysis. The technique of passing the tapes through the obturator holes is associated with a lower risk of bladder injury and less discomfort during bladder emptying compared to the TVT technique. After TOT surgery both pain in the inner thighs and inguinal area and vaginal damage are more common than after TVT. <strong>Keywards: &bdquo;Stress Urinary Incontinence&rdquo;, &bdquo;surgical treatment&rdquo;, &bdquo;TOT&rdquo;, &bdquo;TVT&rdquo;, &bdquo;Mid-urethral sling operations&rdquo;</strong>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Methods behind hacking of an E-mail"

1

Emiri, Ogochukwu Thaddaeus. "Prevention of Cyber Crime in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch015.

Full text
Abstract:
The purpose of this chapter is to examine the concept of cyber crime as it relates to cybercafés, forms of cyber crime, the role of the Internet, and suggest measures of cyber crime control and prevention in cybercafés. This chapter unveils the various forms of cyber crime and preventive measures with the view to addressing insecurity on the Internet and methods of protecting cybercafés systems. This chapter revealed some forms of cyber crimes to include computer viruses, data dwindling, hacking, data leakages, trapdoors, scavenging, e-mail bombing, and so forth, and equally suggested preventive measures such as user education, legal regulations against cyber crimes, international cooperation, restricting system use, limiting access to certain programs, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography