How to read encrypted email.?

1 Answer

Answer :

If the email is encrypted you will need a password to open the email. Ask whoever is sending the emails to tell you the password that he or she uses.

Related questions

Description : Im trying to convert some dvd's to transfer them to my ipod but it shows me this in handbrake program Please download and install VLC media player in your /Applications folder if you wish to read encrypted DVDs.

Last Answer : You can use RipIt to break the encrypt and then add those videos to handbrake to reduce the size… What to do, though, is try and do the same thing you did before, just with VLC in that folder. It should work then.

Description : Why is it so important that users passwords to web sites remain in DB in encrypted form?

Last Answer : Because users are idiots and use the same password for everything. If a hacker gets access to the db they’ll know the users email and password and they probably use the same in for everything from fluther to paypal.

Description : Is there any way to track when a TrueCrypt volume is encrypted or decrypted?

Last Answer : I don't believe you can unencrypt a TrueCrypt volume. You can remove files from the volume, which decrypts them, but your only options with the volume (aka Container) is to continue using it or delete it. ... s a link to the best one I've found Folder Guard I've tried others but they all sucked.

Description : I cannot open my files encrypted by AxCrypt after I got my PC ghosted. What should I do?

Last Answer : I have no idea. :-)

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : what is password for pes 2010 encrypted setup file?

Last Answer : what is password for pes 2010 encrypted setup file?

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : What is first step to Handle Retrieving Data from an Encrypted Hard Drive? A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.

Last Answer : C. Finding configuration files. 

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

Last Answer : (C) OEWPNRCTTUEKMRO

Description : How to avoid having to use the horizontal scroller to read the email?

Last Answer : Just shrink the font size on your screen by holding the “Ctrl” key on the keyboard and then scrolling the wheel up to zoom in (enlarge) and down to zoom out (shrink). This way you would be able to read the mail without using horizontal scroller. Hope this helps!

Description : Help? Why is yahoo refusing to let me read email?

Last Answer : Do you have an email client like Outlook? Try to see if it works on an external program. I think Gmail now has the capability to link other email accounts too.

Description : I can't read my email without having to use the horizontal scroll bar to for every line?

Last Answer : Try changing the theme. I never had any problem like this with gmail though. If other stuff is too big you just need to zoom out by using ctrl+ the scroll wheel.

Description : If you have a guest staying with you and they go in and open and read your email, how would you handle it?

Last Answer : I’d ask them why they’re doing this and then tell them to find elsewhere to stay.

Description : Is there a way to mark all email as read on the iphone?

Last Answer : no can do. gotta flip through 'em one at a time, my friend.

Description : Ok, I just saw an email with Africa and other extremely poor countries in the world pictures, please read...

Last Answer : answer:It worries me to think this has only come to your attention now. But there are plenty of organizations out there you can support to help starvation, poverty and the AIDS epidemic in Africa ... / There's plenty more organisations out there, look in your local yellow pages for charity listings.

Description : Thunderbird (mozilla) not syncing read email?

Last Answer : answer:issue resolved: POP was still turned on, and thunderbird set using POP instead of IMAP (since IMAP is a newer feature) now it works!

Description : POP3 and IMAP are e-mail accounts in which (A) One automatically gets one’s mail everyday (B) One has to be connected to the server to read or write one’s mail (C) One only has to be connected to the server to send and receive email (D) One does not need any telephone lines

Last Answer : (C) One only has to be connected to the server to send and receive email