ZIMBRAMAILBOX provides multi layered spam protection system which consists of Cloud Based Spam and Malware gateway and Local Zimbra based Malware scanning services. We provide all this services FREE of charge to our subscribers.
E-mail is one of the most widely and commonly used Internet services. The e-mail infrastructure employed on the Internet is primarily made up of e-mail servers using the Simple Mail Transfer Protocol (SMTP) to accept messages from clients, transport those messages to other servers, and deposit messages into a user’s server-based inbox. In addition to e-mail servers, the infrastructure includes e-mail clients. Clients retrieve e-mail from their server-based inboxes using the Post Office Protocol, version 3 (POP3) or Internet Message Access Protocol (IMAP). Clients communicate with e-mail servers using SMTP
E-mail is the most common delivery mechanism for viruses, worms, Trojan horses, documents with destructive macros, and other malicious code. The proliferation of support for various scripting languages, auto-download capabilities, and auto-execute features has transformed hyperlinks within the content of e-mail and attachments into a serious threat to every system.
The first step in deploying e-mail security is to recognize the vulnerabilities specific to e-mail. The protocols used to support e-mail do not employ encryption. Thus, all messages are transmitted in the form in which they are submitted to the e-mail server, which is often plain text. This makes interception and eavesdropping an easy task. However, the lack of native encryption is one of the least important security issues related to e-mail.
E-mail offers little in the way of source verification. Spoofing the source address of e-mail is a simple process for even the novice hacker. E-mail headers can be modified at their source or at any point during transit. Furthermore, it is also possible to deliver e-mail directly to a user’s inbox on an e-mail server by directly connecting to the e-mail server’s SMTP port. And speaking of in-transit modification, there are no native integrity checks to ensure that a message was not altered between its source and destination.
E-mail itself can be used as an attack mechanism. When sufficient numbers of messages are directed to a single user’s inbox or through a specific STMP server, a denial of service (DoS) can result. This attack is often called mailbombing and is simply a DoS performed by inundating a system with messages. The DoS can be the result of storage capacity consumption or processing capability utilization. Either way the result is the same: legitimate messages cannot be delivered. Like e-mail flooding and malicious code attachments, unwanted e-mail can be considered an attack. Sending unwanted, inappropriate, or irrelevant messages is called spamming. Spamming is often little more than a nuisance, but it does waste system resources both locally and over the Internet. It is often difficult to stop spam because the source of the messages is usually spoofed.
At ZIMBRAMAILBOX we are doing our best to protect you from Malware and Viruses that are finding there way to mailboxes all over the world. However without our users doing due diligence all this efforts will go unanswered and there is possibility of mailboxes being hacked or compromised
Understanding threats and being able to at very l;east follow best practices is extremely important to keep your Mailbox safe and secured.
When using ZIMBRAMAILBOX all your email is being scanned by our Virus and Spam gateways. However, this scanners cannot prevent all malicious email, and some malicious threats come from the internet.
Besides using unique, strong passwords here are some of the most important things you can do to protect yourself from malicious email.
We can not stress this enough how important it is to follow this very basic rules. Being alert and following best practices could make a huge difference. Malware prays on weak users who do not pay attention to details.
Here are some examples of malicious emails that you most likely will encounter when using your mailbox:
1. Spoofs: Spoofing is very easy to do. Example of spoofing would be your receiving email from one of your friends or colleges but it is not actually coming from them. In most cases attacker would spoof from field so email appears like its coming from trusted source.
2. Hacks: An example of a hack would be when one of users in your address book gets hacked and you receive emails from him/her for donation or something very similar.
Other best practices
Doing any of the above actions can result in software downloads to your computer, and these downloads are often malicious
Zimbra is directly competing with office 365 for share of enterprise email market. A lot of our clients ask us. Why choose Zimbra over Office 365?
Lets see why we as consultants we always suggest Zimbra over Office 365 for any business with more then 10 mailboxes.
Zimbra hands down wins the competition when it comes to pricing. Be it Network on Perm. deployment or hosted solution. There is huge difference in pricing and Zimbra is clear winner. On top of this Zimbra provides Free Open Source Edition that is available as evaluation software. In Office 365, there isn’t a provision of any “free account” and users need to pay a minimum monthly subscription.
Office 365 includes the Microsoft suite of Office applications. Zimbra, in addition to email and calendar also offers a host of features such as file sharing, document management, simplified admin controls and an award-winning, AJAX based user interface. On top of that, Zimbra also offers useful features such as cross platform sync, platform search and email sorting, that Office 365 doesn’t. There is also 3rd party plugins that Zimbra fully supports but they are not available for Office 365
Zimbra is an open source software that means organizations can have more control over email operations as there is always a possibility to customize code to suit diverse business requirements. Office 365, on the other hand is a closed source software as only Microsoft is permitted to perform any changes to the code as and when required.
Platform or Device Support
Zimbra supports android, iOS and all leading web platforms. Office 365 also supports android, iOS and some web platforms but lucking supports for some web browsers.
Why is Zimbra better than Microsoft, Google
Why Choose Zimbra Network Edition
At TEKYHOST we provide professional Zimbra Hosting and Consulting services.
When choosing File system(disk file system) for Linux installation most of the users will choose default which will be XFS(on most modern Linux distributions), but there is quite a few of file systems available. Lets take a look at different Linux file systems and see what similarities and differences they have.
Unlike Windows Linux kernel supports many different types of filesystems. Linux can also read and write to Windows filesystems.
The problem we trying to solve in our case is unsafe INTERNET browsing and poor INTERNET access speeds. The solution that we will be implementing will be Squid proxy server positioned on internal network and providing caching as well as filtering for all internal clients requests.
A proxy server is a computer system positioned between the client requesting a web document and the target server. In its simplest form, a proxy server facilitates communication between client and target server without modifying requests or replies. In our case we will be implementing a proxy server that can filter requests based on various rules and will allow communication only when requests can be validated against the available rules. The rules are generally based on an IP address of a client or target server, protocol, content type of web documents, web content type, and so on.