Last modified by Denisa Wernerová on 18.08.2024 16:06

From version 10.2
edited by Denisa Wernerová
on 18.08.2024 16:06
Change comment: There is no comment for this version
To version 10.1
edited by Denisa Wernerová
on 03.08.2023 12:55
Change comment: Imported from XAR

Summary

Details

Page properties
Content
... ... @@ -49,7 +49,7 @@
49 49  {{id name="how-to-help"/}}
50 50  **How you can help**
51 51  
52 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook>>doc:uzivatel.email.postovni-klienti.ms-outlook.outlook-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2016>>doc:uzivatel.email.exchange.outlook-2016.outlook2016-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
53 53  
54 54  {{id name="protect-account"/}}
55 55  **What can you do to protect your account security**
... ... @@ -71,25 +71,25 @@
71 71  * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email.
72 72  
73 73  **Example No. 1**
74 -\\[[~[~[image:phishing.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing.gif]]
74 +\\[[[[image:phishing.gif||style="vertical-align:middle"]]>>attach:phishing.gif]]
75 75  
76 76  
77 77  **Example No. 2**
78 -\\[[~[~[image:phishing_2.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing_2.gif]]
78 +\\[[[[image:phishing_2.gif||style="vertical-align:middle"]]>>attach:phishing_2.gif]]
79 79  \\**Example No. 3**
80 -\\[[~[~[image:phishing_3.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_3.png]]
80 +\\[[[[image:phishing_3.png||style="vertical-align:middle"]]>>attach:phishing_3.png]]
81 81  **Example No. 4**
82 -\\[[~[~[image:phishing_4.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_4.png]]
82 +\\[[[[image:phishing_4.png||style="vertical-align:middle"]]>>attach:phishing_4.png]]
83 83  
84 84  **Example No. 5**
85 -\\[[~[~[image:phishing_5.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_5.png]]
85 +\\[[[[image:phishing_5.png||style="vertical-align:middle"]]>>attach:phishing_5.png]]
86 86  \\**Example No. 6**
87 -\\[[~[~[image:phishing_6.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_6.png]]
87 +\\[[[[image:phishing_6.png||style="vertical-align:middle"]]>>attach:phishing_6.png]]
88 88  
89 89  **Example No. 7**
90 -\\[[~[~[image:phishing_7.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_7.png]]
90 +\\[[[[image:phishing_7.png||style="vertical-align:middle"]]>>attach:phishing_7.png]]
91 91  \\**Example No. 8**
92 -\\[[~[~[image:phishing_8.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_8.png]]
92 +\\[[[[image:phishing_8.png||style="vertical-align:middle"]]>>attach:phishing_8.png]]
93 93  \\**Example No. 9**
94 -\\[[~[~[image:phishing_9.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_9.png]]
94 +\\[[[[image:phishing_9.png||style="vertical-align:middle"]]>>attach:phishing_9.png]]
95 95