Found 5 repositories(showing 5)
croaky
Intercept recipients when delivering email with the Mail gem.
makandra
Mail Magnet allows you to override e-mail recipients in ActionMailer so all mails go to a given address. This library is UNMAINTAINED. Use the official ActionMailer::Base.register_interceptor API instead: https://makandracards.com/makandra/46094-rails-how-to-write-custom-email-interceptors
renewablefunding
An email recipient rewriter that can be registered as an ActiveMailer interceptor.
ddankel
A simple implementation of an ActionMailer interceptor which will catch all outgoing mail and redirect it to a configurable recipient.
in this project I come up with a secure protocol for exchanging messages (using GNU PGP/GPA) each other ensuring the following: a) authenticity of the sender b) authenticity of the receiver c) authenticity of the message exchanged d) confidentiality of the message. Include a description of your protocol as a PDF/Word document. Description of protocol: RSA encryption Algorithm is a public key cryptography which makes use of two keys: Public key- used to encrypt a message and Private key used to decrypt the message. It also makes use of digital signature to check for integrity, using public key certificate to identify the sender and identify the message with the sender. confidentiality of the message: RSA provides confidentiality because only the recipient whose public key was used to encipher can decipher with its private key a) authenticity of the sender b) authenticity of the receiver c) authenticity of the message exchanged d) confidentiality of the Integrity achieved by using data Signature, when a signed message is received, RSA verifies authenticity of the sender and if an interceptor receives the ciphertext without having private key to decipher, message is useless. authenticity of the message is also verified because if the message was altered, it cannot be deciphered correctly 2 Describe a security plan with policies and mechanisms you would use to secure the plaintext message, ciphertext message, public keys/certificates, private keys and other files. Also, discuss how you would ensure the availability of the message/keys etc. (Include your security plan document with a descriptive filename) Security Plan Availability achieved through different ways by making back up of the keys and messages and using services such as Gmail of google drives and all of their technique to make sure that the system will be up and running all the time, and saving the message in the Inbox for as long as necessary Policies.
All 5 repositories loaded