2024-04-19 14:51 UTC (Access Key = T)
Universal Time Coordinated - Definition of the time standard. Time anywhere on Earth.
2024-02-20
Tim Cliffe - Blog
Making Your Thunderbird (or any other) E-mails More Secure
Published: 2021-01-08. Reading Time: 5.5 minutes.01 Target Audience
(01.1) Anyone concerned with their on-line privacy and security.
02 Executive Summary
(02.1) When you send an e-mail, the software you use, in most cases, is giving away information about your computer and e-mail software.
(02.2) Unscrupulous people can use this information to help them to attack (e.g., viruses) and/or gain access to your computer.
(02.3) If you use the Thunderbird E-mail Client to send e-mails, this article will show you, in seven simple steps, how to stop every e-mail you send giving away such information and make you a little safer on-line.
03 Structure of This Article
- (04) Introduction
- (05) User-Agent - The Giver of Information
- (06) Hiding your Thunderbird User-Agent Details
- (07) Confirming User-Agent Details have been Removed
04 Introduction
(04.1) You will have heard about e-mails that have been sent, containing a virus of some sort, that have infected people's and company's computers.
(04.2) Viruses are Operating System (Linux, Mac OSX, Windows) specific. They are often software specific also. Have you ever wondered how people know which virus to send in an e-mail?
(04.3) One simple way is to have an e-mail, which has been sent from the target computer, and use it to find out which Operating System is being used and which software. This information is provided by something called the User-Agent string, which is contained in The Headers of the e-mail.
05 User-Agent - The Giver of Information
(05.1) Most people don't know The Headers exist, but they include, who sent the e-mail, the Subject, the time the e-mail was sent; however, most of the information in The Headers is not displayed, by default.
(05.2) If you know how, it is very easy to access all the information in The Headers of an e-mail, including something called the User-Agent string (string is another word for text).
(05.3) The User-Agent string takes the form
User-Agent: Mozilla/5.0 (<operating system information>) <software> (<software-details>) <extensions>
A Thunderbird User-Agent string could look like this:
Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
Fortunately, it is very easy to hide the User-Agent string.
06 Hiding your Thunderbird User-Agent Details
(06.1) The following instructions apply to the Thunderbird E-mail Client (software); however, it is easy to find how to make the same changes to other e-mail clients, with a little searching on the Internet, for example, you might search for, Hide Outlook User-Agent.
(06.2) If you use a web-based e-mail service, such as Gmail or Hotmail, I'm afraid you cannot change how the User-Agent is configured.
(06.3) To hide the User-Agent string:
1. Launch Thunderbird, then;
(06.4) Thunderbird is now configured so as not to include the User-Agent string in The Headers of your e-mails.
You can now close the Preferences window and return to the e-mail window. The last thing to do, is to check your new configuration is working.
07 Confirming User-Agent Details have been Removed
(07.1) Now, simply send an e-mail to yourself. It can be as short and simple as you like.
(07.2) Now open the file you have just saved, either in your PDF viewer or your browser. The top of the document (your e-mail) will look something like this...
(07.3) Your information and on-line safety are now a little more secure.
Use of this Article
Any part, or all, of this article may be linked-to or copied for non-commercial purposes. Any linked or copied content to include the following...
Making Your Thunderbird (or any other) E-mails More Secure by Tim Cliffe © 1997-2024.
Where use will be for commercial purposes, seek authorisation, including details of proposed use, via the Contact page.
Return to the Blog page.
Resources
eLearning:
- 3D Printer Developments by 3D Printing Industry
(External link, opens in a new tab/window); - Augmented Reality from Tobias Kammann
(External link, opens in a new tab/window); - Browser Statistics by w3schools.
Browser Type, Operating System, Screen Resolutions
(External link, opens in a new tab/window); - Cambridge Dictionary The Cambridge Dictionary - leading authority on the English Language - Dictionary and Thesaurus - Free to use
(External link, opens in a new tab/window); - eLearning Feeds by eLearning Feeds. Ranked and scored e-learning blogs
(External link, opens in a new tab/window); - Global Statistics (on-line) by ITU - Includes Stats for the Web and Mobile
(External link, opens in a new tab/window); - Multi-media Software SourceForce - Open Source software (free) development and distribution community
(External link, opens in a new tab/window); - Punctuation Guide by the renowned Professor Larry Trask
(External link, opens in a new tab/window); - Referencing:
- Typography by Typekit Practice
(External link, opens in a new tab/window); - Virtual Reality Blog by Enter VR
(External link, opens in a new tab/window); - Web Usability by Nielson Norman Group
(External link, opens in a new tab/window).
Security:
- Anonymous Browsing:
- Computer by The Tor Project
(External link, opens in a new tab/window); - Mobile by The Guardian Project
(External link, opens in a new tab/window); - User-Agent String Confirm what information your browser is giving away about itself, your operating system and computer
(External link, opens in a new tab/window);
- Computer by The Tor Project
- Computer Security from Graham Cluley
(External link, opens in a new tab/window); - Email Encryption by GnuPG, for various Operating Systems
(External link, opens in a new tab/window); - Publicised Location Confirm your VPN/Proxy settings; where the Internet thinks you are
(External link, opens in a new tab/window); - Random No. Generator Create random passwords, convert numbers to letters, e.g., 5 = E
(External link, opens in a new tab/window); - UK NCSC Advice and guidance from the National Cyber Security Centre
(External link, opens in a new tab/window); - On-line Privacy by The Tin Hat. Articles and Tutorials
(External link, opens in a new tab/window); - VPN Reviews by TechRadar
The latest reviews of VPNs
(External link, opens in a new tab/window).
- GCA Toolkit Access the UK Police ActionFraud website
Protect small/medium sized business from cyber attacks
(External link, opens in a new tab/window); - Quad9 and DMARC Access the UK Police ActionFraud website
Protect your system and e-mail
(External link, opens in a new tab/window).
Guarding against disinformation and the re-writing of history.
Web Archive Access the Internet Archive Wayback Machine website(External link, opens in a new tab/window)