Skip to content
Bots!
Bots!
  • About
    • Myself
    • আমার দোয়া
  • Bookmarks
    • Bookmarks
    • My OCI Bookmarks
    • Useful Proxmox Commands & Links
    • Learning Nano
    • Useful Sites
    • Useful Virtualbox Command
    • Useful MySQL Command
    • Useful Linux Command
    • BTT-CAS
  • Resources
    • Webinar on Cloud Adoption for Project Managers
  • Photos
  • Videos
  • Downloads
Bots!

CRYPTBOT Secure web-Mail

Rumi, December 29, 2011
Security Purposes

 

The CryptBot Secure web-Mail™ was developed for solving the e-mail security problems, especially the attacks of junk or spam e-mails and viruses. This web-based security application also serves you with the digital identity and confidentiality of your e-mail by using the PKI (Public Key Infrastructure); digital signature and encryption, which you can digitally sign and encrypt your e-mail on the IE web browser. The standard secure web-mail consists of three types of e-mail modes which each mode is designated for each specific use as follows:
 

 

 
 
 
Mode I: The "Normal Mode" is for using in the situation that you have to expose your real e-mail address to the public which it will be risked to be spammed and contaminated by junk mails and viruses respectively. Therefore, this type of e-mail is limited to use in the public and you must beware about junk mails spamming and viruses attacking before using it otherwise you will face a lot of problems which has found in your existing e-mail.
Mode II: The "Hidden Mode" was developed for absolutely preventing the autonomous mail spamming attack which its real e-mail address is hidden and the public must contact you via the "Hidden Mail" or "URL-Mail" address through a web browser. This type of e-mail is suitable for printing on or distributing via your business card, brochure, catalog and/or web site. If you use all superior security functions of this mode and don't expose your real e-mail addresses of the other modes, we do guarantee 100 % that it can prevent the attacks of spam e-mails and viruses!! Moreover, not the same other e-mail system, it can prevent recipients to alter the sender's original messages when they reply.
Mode III: The "Secure Mode" was designed for serving the high secure and/or legal contact with its digitally signing and encrypting functions. With our innovation based on the PKI technology, you can exclusively and fully use its multiple digital signatures and encryption features on the IE web browser. Also, like the hidden mode, it can prevent recipients to alter the sender's original messages when they reply.
Features & Functions
  1. Gets three e-mail modes in one e-mail account, as explains details above. Therefore, you have three choices for using, the hidden e-mail is for general use while the normal and secure modes are kept for using with whom that you can trust.
  2. If you use only the hidden mode, fully configured with its strong security functions (attachment blocking, security code setting and message/content hyperlink blocking), we do guarantee that your e-mail will be absolutely protected from spam e-mails and viruses attacking.
  3. It cannot be detected by the e-mail harvesting programs of e-mail spamming systems because it does not contain the "@" symbol in the Hidden-Mail or URL-Mail address format (joe.hitrustmail.com) and no need to use the "Mailto" HTML tag when it be linked with a web page. 
  4. The hidden-mail form can help you to totally control all senders that want to contact you, especially control the sensitive content such as attached files which risk contaminating with viruses, you can allow or not allow them to send their attachment to you by configuring the file attachment box. Or in case you want only the trusted person cotact you, it can also be triggered the "Security Code" box to block the untrusted persons to contact you.
  5. The e-mail generating system will secure your e-mail account by automatically creating the three different e-mail addresses for each mode. Therefore, it's very difficult for hackers to easily guess or find them and, at the same time, outgoing and incoming mails of each mode will be separately stored in each inbox and outbox, lets you easily manage your messages for your different works.
  6. Users are able to add their signature images on their outgoing e-mails.
  7. The CryptBot Secure web-Mail™ can serve you with two versions of control or administration systems. The first version is for administering at the level of "Enterprise Domain Name" which designed for using with an enterprise server that installed, under one or multiple domain names, for serving in one or group of general organizations and the second version is for administering at the level of "Secure web-Mail Service Provider" such as ISPs (Internet Service Providers) and other ASPs (Application Service Providers) which want to establish their secure web-mail for renting or selling to other organizations. This ISP version will be provided with the ready-made e-commerce system and e-store web page which can be easily linked with the ISP's existing web site. In addition, this version also has the language editor which facilitates you to add any language for serving people around the globe. 
  8. There is the "Preferences" system for users to personalize their e-mail interfaces such as the default inbox setting, e-mail list sorting, e-mail header displaying, header printing setting, etc. 
  9. Able to create multiple encryptions and digital signatures on one e-mail and each signer can be separately verified and responsible for only his/her message and/or attachment.
  10. Can be linked with the existing mail server of enterprise or provider which the existing users also still use their old e-mail accounts.
  11. A lot of more other valuable features and configurations for facilitating your use such as web page color setting, news & PR message editor, virus warning system, logo uploading, digital certificates exchange center, address book administrator, user administration system, etc. 
http://www.cryptbot.com/web_mail.asp
Application DSC Tools PKIWebmail

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Myself…

Hi, I am Hasan T. Emdad Rumi, an IT Project Manager & Consultant, Virtualization & Cloud Savvyfrom Dhaka, Bangladesh. I have prior experience in managing numerous local and international projects in the area of Telco VAS & NMC, National Data Center & PKI Naitonal Root and CA Infrastructure. Also engaged with several Offshore Software Development Team.

Worked with Orascom Telecom-Banglalink, Network Elites as VAS partner, BTRC, BTT (Turkey) , Mango Teleservices Limited and Access to Informaiton (A2I-UNDP)

Currently working at Oracle Corporation as Principal Technology Solution and Cloud Architect.

You can reach me [h.t.emdad at gmail.com] and I will be delighted to exchange my views.

Tags

Apache Bind Cacti CentOS CentOS 6 CentOS 7 Debain Debian Debian 10 Debian 11 Debian 12 DKIM Docker endian icinga iptables Jitsi LAMP Letsencrypt Linux Munin MySQL Nagios Nextcloud NFS nginx pfsense php Postfix powerdns Proxmox RDP squid SSH SSL Ubuntu Ubuntu 16 Ubuntu 18 Ubuntu 20 Varnish virtualbox vpn Webmin XCP-NG zimbra

Topics

Recent Posts

  • Install Jitsi on Ubuntu 22.04 / 22.10 April 30, 2025
  • Key Lessons in life April 26, 2025
  • Create Proxmox Backup Server (PBS) on Debian 12 April 19, 2025
  • Add Physical Drive in Proxmox VM Guest April 19, 2025
  • Mount a drive permanently with fstab in Linux April 16, 2025
  • Proxmox 1:1 NAT routing March 30, 2025
  • Installation steps of WSL – Windows Subsystem for Linux March 8, 2025
  • Enabling Nested Virtualization In Proxmox March 8, 2025
  • How to Modify/Change console/SSH login banner for Proxmox Virtual Environment (Proxmox VE / PVE) March 3, 2025
  • Install Proxmox Backup Server on Debian 12 February 12, 2025

Archives

Top Posts & Pages

  • Install Jitsi on Ubuntu 22.04 / 22.10
©2025 Bots! | WordPress Theme by SuperbThemes