E-Mail-Eintrag: Computational methods in information security