Key-Exchange-Method-IMAP/EN/Consequence: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used, for example, to read out password…“)
 
 
Zeile 1: Zeile 1:
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used, for example, to read out passwords or credit card information and misuse them for criminal purposes.
+
Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used to read out mail content and misuse them for criminal purposes.

Aktuelle Version vom 30. Oktober 2019, 14:33 Uhr

Your server is ready to establish very weak connections, which are vulnerable to Man-in-the-middle attacks. This can be used to read out mail content and misuse them for criminal purposes.