7.576
Bearbeitungen
Änderungen
keine Bearbeitungszusammenfassung
Attackers can easily decrypt the communication between your server and the mail program with a weak encryption methodology. This can be used, for example, to read out passwords, e-mails or credit card information mail content and misuse them for criminal purposes.