SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Elaine Pullicino
B.Ed. With Computing
What is MIME?
MIME is an acronym for Multipurpose Internet Mail
Extension
It is used to describe message content types
MIME messages can contain
text,
images,
audio,
video, and
other application-specific data (e.g. PDF Files,
Microsoft Word Documents, and so on)
What is it used for?
It is used to make internet messages richer
It allows applications (and users) to exchange rich
content other than text
It is an extension to the original email specification
(RFC-822)
It is defined in RFCs RFC-2045 through RFC-2049
A Request for Comments (RFC) is a document
published by the Internet Engineering Task Force
(IETF) describing an internet standard
MIME Format
MIME types are defined using a <type>/<subtype>
[optional parameters] format
Some typical examples are
MIME Type Extension(s)
text/plain txt
application/vnd.ms-excel xls
application/pdf pdf
text/html htm;html
text/css css
How is it used?
MIME is passed as part
of the content type of the
message header
Content-type:
text/plain; charset=“us-
ascii”
The following example
is a typical HTTP
Response header (MIME
is highlighted)
HTTP/1.x 200 OK
Transfer-Encoding: chunked
Date: Sat, 28 Nov 2009 04:36:25 GMT
Server: LiteSpeed
Connection: close
X-Powered-By: W3 Total Cache/0.8
Pragma: public
Expires: Sat, 28 Nov 2009 05:36:25 GMT
Cache-Control: max-age=3600, public
Content-Type: text/html; charset=UTF-8
Last-Modified: Sat, 28 Nov 2009 03:50:37 GMT
Vary: Accept-Encoding, Cookie, User-Agent
Support for different languages
Message header
content-type field
put in the header by the client program
creating the e-mail for use by the client
program used to display the received message
charset= optional parameter
if absent ASCII is assumed
Content-Type: text/plain; charset="ISO-8859-1"
ISO-8859-1 character standard extends the basic character set of
ASCII to include many of the accented characters used in
languages such as German
EncodingBinary files need to be “packaged” as text in order to
be sent over the internet
MIME uses a BASE-64 binary encoding scheme to
package the data for transfer
As a result of this encoding, standard SMTP (Simple
Mail Transfer Protocol) servers did not require any
changes
Encoding transforms binary data into a string
Decoding changes the data back into its original form
Base 64 encoding Example
Normal Text: Lorem ipsum dolor sit amet, consectetur
adipiscing elit. Nulla mattis pulvinar ligula. Ut quis neque
ut lorem mollis hendrerit. Curabitur rhoncus, neque vitae
sodales condimentum.
Encoded Text:
TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQsIGNvbnNlY
3RldHVyIGFkaXBpc2NpbmcgZWxpdC4gTnVsbGEgbWF0
dGlzIHB1bHZpbmFyIGxpZ3VsYS4gVXQgcXVpcyBuZXF1Z
SB1dCBsb3JlbSBtb2xsaXMgaGVuZHJlcml0LiBDdXJhYml0d
XIgcmhvbmN1cywgbmVxdWUgdml0YWUgc29kYWxlcyBj
b25kaW1lbnR1bS4=
An online tool one can use to experiment can be found at
http://www.motobit.com/util/base64-decoder-
encoder.asp
Sending large messages
When sending large messages, the message client
splits them into smaller parts
This type of message is called a multi-part message
Multi-part messages have one the following MIME
content types:
content-type = multipart/related
content-type = multipart/mixed
Further Reading
MIME Reference. In MIME Types. Retrieved from
http://www.w3schools.com/media/media_mimeref.asp
accessed, on 21 December 2010
Borenstein, N & Freed, N. (1996). Multipurpose
Internet Mail Extensions (MIME) Part One: Format of
Internet Message Bodies. Retrieved
fromhttp://tools.ietf.org/html/rfc2045, on 21st
December 2010.
Further Reading
Kozierok, C. M. (2005). TCP/IP Enhanced Electronic
Mail Message Format: Multipurpose Internet Mail
Extensions (MIME). In The TCP/IP Guide. Retrieved
from
http://www.tcpipguide.com/free/t_MIMEContentTyp
eHeaderandDiscreteMediaTypesSubtypes.htm, on 21st
December 2010.
Josefsson, S. (2006). The Base16, Base32, and Base 62
Data Encodings.http://tools.ietf.org/html/rfc4648
accessed on 21st
December 2010.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Email security
Email securityEmail security
Email security
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
HTTP & WWW
HTTP & WWWHTTP & WWW
HTTP & WWW
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Web services
Web servicesWeb services
Web services
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Http
HttpHttp
Http
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 

Ähnlich wie Mime

The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)Vishal Kumar
 
六合彩
六合彩六合彩
六合彩adxegd
 
六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideSharexmatnmqu
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideSharecckiawfm
 
六合彩|香港六合彩
六合彩|香港六合彩六合彩|香港六合彩
六合彩|香港六合彩wnevsi
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharelfftxajv
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharerylpwodc
 
jsoifoaij
jsoifoaijjsoifoaij
jsoifoaijyanwo
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharebburikht
 
香港六合彩>六合彩
香港六合彩>六合彩香港六合彩>六合彩
香港六合彩>六合彩ikkeqhp
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharekftmoerk
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShareesbulah
 
sgiayw
sgiaywsgiayw
sgiaywyanwo
 
香港六合彩
香港六合彩香港六合彩
香港六合彩twieat
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharewvjbxlqh
 
Hiding Malicious Content in PDF Documents
Hiding Malicious Content in PDF DocumentsHiding Malicious Content in PDF Documents
Hiding Malicious Content in PDF Documentsdeathwing
 

Ähnlich wie Mime (20)

mime-.pdf
mime-.pdfmime-.pdf
mime-.pdf
 
Cn u5
Cn u5Cn u5
Cn u5
 
crypto ppt.pptx
crypto ppt.pptxcrypto ppt.pptx
crypto ppt.pptx
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
 
六合彩
六合彩六合彩
六合彩
 
六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare六合彩|香港六合彩 » SlideShare
六合彩|香港六合彩 » SlideShare
 
香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare香港六合彩-六合彩 » SlideShare
香港六合彩-六合彩 » SlideShare
 
umveyhl
umveyhlumveyhl
umveyhl
 
六合彩|香港六合彩
六合彩|香港六合彩六合彩|香港六合彩
六合彩|香港六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
jsoifoaij
jsoifoaijjsoifoaij
jsoifoaij
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩>六合彩
香港六合彩>六合彩香港六合彩>六合彩
香港六合彩>六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
sgiayw
sgiaywsgiayw
sgiayw
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
Hiding Malicious Content in PDF Documents
Hiding Malicious Content in PDF DocumentsHiding Malicious Content in PDF Documents
Hiding Malicious Content in PDF Documents
 

Kürzlich hochgeladen

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Kürzlich hochgeladen (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Mime

  • 2. What is MIME? MIME is an acronym for Multipurpose Internet Mail Extension It is used to describe message content types MIME messages can contain text, images, audio, video, and other application-specific data (e.g. PDF Files, Microsoft Word Documents, and so on)
  • 3. What is it used for? It is used to make internet messages richer It allows applications (and users) to exchange rich content other than text It is an extension to the original email specification (RFC-822) It is defined in RFCs RFC-2045 through RFC-2049 A Request for Comments (RFC) is a document published by the Internet Engineering Task Force (IETF) describing an internet standard
  • 4. MIME Format MIME types are defined using a <type>/<subtype> [optional parameters] format Some typical examples are MIME Type Extension(s) text/plain txt application/vnd.ms-excel xls application/pdf pdf text/html htm;html text/css css
  • 5. How is it used? MIME is passed as part of the content type of the message header Content-type: text/plain; charset=“us- ascii” The following example is a typical HTTP Response header (MIME is highlighted) HTTP/1.x 200 OK Transfer-Encoding: chunked Date: Sat, 28 Nov 2009 04:36:25 GMT Server: LiteSpeed Connection: close X-Powered-By: W3 Total Cache/0.8 Pragma: public Expires: Sat, 28 Nov 2009 05:36:25 GMT Cache-Control: max-age=3600, public Content-Type: text/html; charset=UTF-8 Last-Modified: Sat, 28 Nov 2009 03:50:37 GMT Vary: Accept-Encoding, Cookie, User-Agent
  • 6. Support for different languages Message header content-type field put in the header by the client program creating the e-mail for use by the client program used to display the received message charset= optional parameter if absent ASCII is assumed Content-Type: text/plain; charset="ISO-8859-1" ISO-8859-1 character standard extends the basic character set of ASCII to include many of the accented characters used in languages such as German
  • 7. EncodingBinary files need to be “packaged” as text in order to be sent over the internet MIME uses a BASE-64 binary encoding scheme to package the data for transfer As a result of this encoding, standard SMTP (Simple Mail Transfer Protocol) servers did not require any changes Encoding transforms binary data into a string Decoding changes the data back into its original form
  • 8. Base 64 encoding Example Normal Text: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla mattis pulvinar ligula. Ut quis neque ut lorem mollis hendrerit. Curabitur rhoncus, neque vitae sodales condimentum. Encoded Text: TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQsIGNvbnNlY 3RldHVyIGFkaXBpc2NpbmcgZWxpdC4gTnVsbGEgbWF0 dGlzIHB1bHZpbmFyIGxpZ3VsYS4gVXQgcXVpcyBuZXF1Z SB1dCBsb3JlbSBtb2xsaXMgaGVuZHJlcml0LiBDdXJhYml0d XIgcmhvbmN1cywgbmVxdWUgdml0YWUgc29kYWxlcyBj b25kaW1lbnR1bS4= An online tool one can use to experiment can be found at http://www.motobit.com/util/base64-decoder- encoder.asp
  • 9. Sending large messages When sending large messages, the message client splits them into smaller parts This type of message is called a multi-part message Multi-part messages have one the following MIME content types: content-type = multipart/related content-type = multipart/mixed
  • 10. Further Reading MIME Reference. In MIME Types. Retrieved from http://www.w3schools.com/media/media_mimeref.asp accessed, on 21 December 2010 Borenstein, N & Freed, N. (1996). Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. Retrieved fromhttp://tools.ietf.org/html/rfc2045, on 21st December 2010.
  • 11. Further Reading Kozierok, C. M. (2005). TCP/IP Enhanced Electronic Mail Message Format: Multipurpose Internet Mail Extensions (MIME). In The TCP/IP Guide. Retrieved from http://www.tcpipguide.com/free/t_MIMEContentTyp eHeaderandDiscreteMediaTypesSubtypes.htm, on 21st December 2010. Josefsson, S. (2006). The Base16, Base32, and Base 62 Data Encodings.http://tools.ietf.org/html/rfc4648 accessed on 21st December 2010.