--%>

Limitations of SMTP/RFC 822

Explain some of the limitations of the SMTP/RFC 822?

E

Expert

Verified

a) SMTP could not send the executable files or the binary objects.

b) It could not send the text data consisting of the national language characters.

c) SMTP servers can refuse the mail message on the particular size.

d) SMTP gateways results in the problems when broadcasting the EBCDIC and ASCII.

e) SMTP gateways to X.400 E-mail network could not handle the non textual data involved within the X.400 messages.

   Related Questions in Computer Network Security

  • Q : Design considerations List significant

    List significant design considerations for the stream cipher.

  • Q : Cryptographic Systems What are

    What are Cryptographic Systems?

  • Q : Types of information derived from

    Explain the types of information which are derived from the traffic analysis attack?

  • Q : What do you mean by Wifi Hardware What

    What do you mean by Wifi Hardware?

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Problems related to Cryptography and

    A) Provide a specific illustration of how inference control might be implemented in the database.B) For a public-key encryption system (like PGP), list some areas for and against utilizing the similar key pair for both encryption and signature.

  • Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : MAC and Hash function Illustrate the

    Illustrate the differences between the MAC and Hash function?