Search results
Jump to navigation
Jump to search
- '''Definition:''' Email authentication method that verifies the hostname of a client requesting an SMTP session as1 KB (154 words) - 19:58, 29 August 2009
- | pagename = Email authentication | abc = Email authentication2 KB (226 words) - 12:00, 25 November 2008
- ...ts on the SPF article, it seems like there should be plenty of interest in email authentication, and email systems in general. I wonder if we could promote Citizendium th855 bytes (143 words) - 14:47, 23 December 2009
- {{r|Email authentication}}820 bytes (125 words) - 07:26, 4 November 2009
- ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.4 KB (666 words) - 13:15, 26 October 2009
- ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.5 KB (822 words) - 02:42, 3 February 2010
- ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated4 KB (610 words) - 17:28, 5 November 2009
- ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated4 KB (623 words) - 11:33, 23 October 2009
- '''Definition:''' Email authentication method that verifies the domain name in the envelope return address against {{seealso|Email authentication}} for a general overview and terminology.7 KB (1,198 words) - 19:34, 26 October 2009
- {{seealso|Email authentication}} for an overview and terminology. DomainKeys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers7 KB (1,137 words) - 05:56, 11 December 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].8 KB (1,320 words) - 19:11, 27 August 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].8 KB (1,268 words) - 15:05, 27 August 2009
- {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. The most significant change introduced8 KB (1,260 words) - 16:55, 7 December 2009
- {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc8 KB (1,236 words) - 20:27, 9 December 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,678 words) - 11:48, 23 September 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,671 words) - 06:06, 29 August 2013
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,673 words) - 06:07, 29 August 2013
- == Subtopic: Email Authentication == ??? <subtopic> Email authentication methods fall into two categories. Methods like SPF, SenderID, and CSV rely13 KB (1,948 words) - 16:11, 13 November 2008
- ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o15 KB (2,320 words) - 18:53, 26 December 2010
- ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o17 KB (2,551 words) - 13:21, 10 October 2009