Unit 9 P6 Hotmail System

Improved Essays
Those who are using Hotmail have the option of determining whether they want the system to keep them signed in or if it should ask them for their password and email address every time they want to check on their emails. When they are signing in for the first time they will be provided with the Hotmail sign in page. On the left of the screen, users will be provided with the information they require to sign up while on the right side, they will be provided with the textboxes, checkboxes and buttons as well as links that will be useful when it comes to logging in.

On the Hotmail sign in screen they will be presented with a field known as the "Windows Live ID" where they are required to enter their email address. The next field is the password that they used in creating their account. When they have done this, they have the option of making the system remember them each time they use that particular computer. If they check the "remember me on this computer" box, they system will create a small cookie that will store their email address each time they open the log in page. It is important that they keep in mind that the system will only remember them if they use the same browser, any change of browser will not display their email address when they want to log in.

The users will also
…show more content…
Those who feel that it is not sufficient can check out the enhanced setting offered to make their communication more secure. They will need to click on the "use enhanced security" link that will increase their security level. With this enhanced setting, the platform will use an encrypted page when the users want to sign in but once they have logged in, it will go back to the normal settings for receiving and sending mails. To know that the enhanced settings are in use, most address bars will change in color to signify that it is using the extended validation

Related Documents

  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    Click the Privacy tab, then click Sites. In Address of Web site, type the complete address of this Web site. For example, http://www.microsoft.com. Then click Allow. -------------------------------------------------------------------------------- Connected to Microsoft Exchange Secured by Microsoft Internet Security and Acceleration Server © 2006 Microsoft Corporation.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    The usernames and passwords are a unique key to log into a computer or network. When computers have usernames and passwords enabled this adds a security feature so that if the computer is a sleeping state credential need to be input to unlock the computer. For example, if one user was to leave a computer open on his desk and went to do another task, another user or possibly an intruder that has gained access into the building can gain access to files on the computer or the network. Therefore, network administrators have an important role in providing the most reliable security by simply implementing user credentials.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Secure Email: Install Antivirus, Antispam, and Antiphishing scanning software on the network for both incoming and outgoing mail. Also, set up your devices to automatically reject directory harvest…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 13 P1

    • 601 Words
    • 3 Pages

    London also convinced the committee members that it had the full support of the Government, sports world, the business community, and the British people. It is evident that from the IOC requirements there should be provisions of the government services together with safety and security. (Candidature Process). The UK governments support was a surety that all the services required from the government would be provided. The House of Common also confirmed that it would be supporting the London bid.…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1) Network traffic analysis shows that a single host is opening hundreds of SSH sessions to a single host every minute. a. The large number of attempted connections each minute suggests this is an attempted denial of service attack. This type of attack attempts to overload network resources with illegitimate traffic to deny service to legitimate users or business needs. IDS and IPS devices can detect all of this traffic, and the IPS can drop (or have border network devices such as firewalls drop) these packets to prevent the attack from succeeding.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Unit 8 P4

    • 543 Words
    • 3 Pages

    CQC has the right to visit an organisation announced or unannounced, therefore it is important for all service to be prepared at all time when CQC are coming to an organisation to inspect. The CQC come along with the team of inspectors depending on the service delivered by the organisation. REF They get evidence data from documents, folders, service user’s records, positive stories, service improvement, training provided for the staffs. CQC also get information by talking to service users, families, staffs and carers in other for them to know if they are happy with the service they are receiving and how they can improve it REF.…

    • 543 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Cookie stealing is when you insert a script into the page so that everyone that views the modified page inadvertently sends you their session cookie. By modifying your session cookie , you can impersonate any user who viewed the modified page. So how do you use XSS to steal cookies? The easiest way is to use a three-step process consisting of the injected script, the cookie recorder, and the log file.…

    • 941 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    One of the most versatile and efficient email services today is Microsoft Outlook. It has a variety of options that allow people to streamline their daily emails and organize their appointments, meetings, tasks, and activities at the touch of their finger. In reviewing and and researching the tips and tricks of Outlook, the three coolest or my top three list includes the clean-up function for unwanted emails, creation and sharing of calendars for a group of people, and sticky notes and keyboard shortcuts. First, people are bombarded with several emails in a day. If these emails are left unmanaged, they soon turn into hundreds of emails in the inbox.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    A. Overview/Introduction: Clarifies your white paper issue and gives a basic understanding of your connection to the issue (home page) Every year in the U.S, millions of students graduate from high school and go on to find jobs, go to college, or explore their other options. However, every year, 65,000 of those students experience very different lives than those of their peers when they graduate. These students are undocumented. While the 1982 case of Plyler v. Doe in which the Supreme Court ruled that undocumented students would be guaranteed a K-12 education by federal law, there is nothing protecting them after they graduate in many states. As there are about 11.2 million total undocumented immigrants in America as a whole, it is important…

    • 1377 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Arnetta Email Case

    • 1088 Words
    • 4 Pages

    When email is used appropriately, it can be a very useful communication tool. But, like Arnetta, one can be overwhelmed by the hours spent daily reading and responding to a massive amount of emails. However, there are a few strategies Arnetta should consider to help her use email more effectively. First, Arnetta should check her email at certain predetermined times during the day, whenever feasible. For example, she could check it when she arrives to work, after lunch, and near the end of the workday.…

    • 1088 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Words are the most incredible thing in the world. They create, mend, empower, transform and build, but most importantly, they have power. While in some cases this is a beautiful thing, for Xavier Walker words were instead a power play. His computer screen was a fortress, and Xavier knew extremely well that when he hid behind it he held full power. The words grew harsher and harsher as he typed, and the power bubbled inside him.…

    • 893 Words
    • 4 Pages
    Improved Essays
  • Great Essays

     OneClick Agent Guide and Procedures OneClick Agent Guide and Procedures Home / OneClick Agent Guide and Procedures Overview This document provides the Help Desk agents with a guide and procedures for the OneClick application. Go To Top Of Page Agent Guidelines OneClick is a tool that can be used to add efficiency to your daily tasks.…

    • 1053 Words
    • 4 Pages
    Great Essays