by Hal Flynn
In our last article, we discussed moving to secure communication by eliminating telnet, in favor of SSH. We discussed the technical skills needed in such a transition, as well as the soft skills.
In this article, we go a step further in eliminating clear text passwords, exploring mail retrieval protocols. We discuss freely available mail software, features of the software, and how to implement these packages to provide secure authentication and communication. By implementing a cryptographic communication posture, we take one more step towards Slaying the Clear Text Beast.
This article originally appeared on SecurityFocus.com -- reproduction in whole or in part is not allowed without expressed written consent.