1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Schach [20]
2 years ago
12

You have been receiving a lot of phishing emails sent from the domain kenyan.msn.pl. Links within these emails open new browser

windows at youneedit.pl. You want to make sure that these emails never reach your inbox, but you also want to make sure that emails from other senders are not affected. What should you
Computers and Technology
1 answer:
zepelin [54]2 years ago
6 0

The thing that should be done is to add kenyan.msn.pl to the email blacklist.

<h3>What is phishing?</h3>

It should be noted that phishing simply means an attempt to steal ones money by taking the users information online.

In this case, the thing that should be done is to add kenyan.msn.pl to the email blacklist.

Learn more about phishing on:

brainly.com/question/2537406

#SPJ12

You might be interested in
​to add notes or comments, insert a comment tag using the syntax _____.
Aneli [31]
The needed syntax would be:
<!--comment-->
Hope I could be of assistance! ;)
4 0
3 years ago
Read 2 more answers
Characteristics of a deterministic system<br>​
Fiesta28 [93]

Explanation:

deterministic system is a involved in development of future states of the system is called deterministic determinstic system.

3 0
3 years ago
How did the public feel towards Martin Luther King, Jr.?
Phoenix [80]

Answer:

Most Americans admire the life and work of Martin Luther King Jr., but their perception of him is smoke and mirrors.

Explanation:

hope this is what youre lookin for

6 0
2 years ago
The phrase “I suppose” helps Roosevelt create which kind of tone?
Effectus [21]

Answer:

"i suppose" negative? I'm sorry if it's wrong..

5 0
2 years ago
Read 2 more answers
Imagine that you are investigating a crime of fraud, where the suspect is creating false documents. Where might you look for evi
kolbaska11 [484]
You would look in the documents folder on the persons computer. You could also look for photo file types if the perp was using photoshop to make changes to documents and then printing them. 
4 0
3 years ago
Read 2 more answers
Other questions:
  • To make sure that you do not get too tired when typing for long periods, how often should you get up and stretch? Every 15 minut
    9·1 answer
  • Linda is the education manager for a national coding service company. Once a month she holds a videoconference with all her codi
    14·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • What changes has Sue made so far? Check all that apply.
    8·2 answers
  • What is the difference between a workbook and a worksheet?
    14·2 answers
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • What Is an Antivirus?
    14·2 answers
  • What is the most important job of a web server?
    11·2 answers
  • Simplest way to start baking career is to attend_______.<br><br><br><br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!