IMAP is equipped with an authentication mechanism, but anyone who understands how to steal a password can easily circumvent the authentication mechanism by using a protocol analyzer to obtain the client's username and password.
Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile