In this chapter, we discussed how hackers think, how to secure incoming SMTP e-mail, and how to secure Administrator access to your Exchange server. We discussed the differences between a virus, a Trojan, and a worm, and outlined a method of securing inbound SMTP traffic. We also referenced two other areas in this book that discuss sender filtering and securing OWA. In the next chapter, we’ll discuss how to secure e-mail messages using encryption and certificates.