CSC Logo     Computer Service Centre
General I T Services
  MPI Home
General I.T. Services

Services for Students
Services for Staff

Search CSC
About CSC
  Computer Security

  Email Handling
  There are some protection procedures/cautions to follow when dealing with email messages.
Spam filtering
  First, you may take advantage of the spam scanning system, by setting up a simple 'rule' in your email software (Netscape, Outlook Express, Outlook or Webmail) to move all suspected spam messages to a separated mail folder. Then, you can check in this folder if any legimate mails are wrongly classed as spam, before deleting them.
  Instructions for setting up spam filtering in the mail software can be found at the following links:
  . Microsfot Outlook Express -
  . Netscape -
  . Web Mail -
  Identifying email security threats
  While some messages are only annoying but innocuous spam mail, many security threats are disseminated through email, such as virus, hoaxes, phishing scams.
  An hoax/scam is a false mail message pretending to be a true one and urging you to forward it to all your contacts. Many hoaxes are false virus alerts, some contain gifts promises. Before forwarding the mail, double-check if it is not yet listed as a hoax by a trusted source, such as TrendMicro.
  Virus can be installed in a computer by opening an infected attachment.
  Be careful when opening attachments in mail messages. Some virus actually use "email spoofing" - they randomly select an email address on an infected computer and spoof the sender name of messages. So even if the sender appears to be someone you known, it is not granted that it really is. If the subject of the message or the attachment name seem suspicious, check with the sender before opening the attachement.
  You may check the latest virus tracking information on this page.

Phishing scams are mail messages that urge you to go to an apparently trusted financial website (generally with an alarm emphasis) with the purpose of stealing your financial data (credit card number, login ID and password for banks websites, etc.). Actually, the website is a false one, but unaware people will discard their personal/financial information without noticing it.

  When receiving phishing scam mail, just delete it.
  You can find more information on phishing in this Microsoft page and track the latest phishing attacks in Trend Micro Phishing Encyclopedia.
  Email backup
  Instructions for securing your email through backup, according to your mail application:
  . Microsfot Outlook Express -
  . Netscape -

Last updated: by Computer Service Centre.