Search results

Jump to navigation Jump to search
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].
    8 KB (1,320 words) - 19:11, 27 August 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].
    8 KB (1,268 words) - 15:05, 27 August 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. The most significant change introduced
    8 KB (1,260 words) - 16:55, 7 December 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,678 words) - 11:48, 23 September 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,671 words) - 06:06, 29 August 2013
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,673 words) - 06:07, 29 August 2013
  • == Subtopic: Email Authentication == ??? <subtopic> Email authentication methods fall into two categories. Methods like SPF, SenderID, and CSV rely
    13 KB (1,948 words) - 16:11, 13 November 2008
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    15 KB (2,320 words) - 18:53, 26 December 2010
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    17 KB (2,551 words) - 13:21, 10 October 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    14 KB (2,064 words) - 17:39, 24 February 2010
  • ...ory". I would suggest making this a general article on the history of all email authentication protocols. Hopefully, this will segregate the controversial stuff from the
    12 KB (2,159 words) - 14:57, 20 March 2024
  • [[Email Authentication]]<br>
    16 KB (2,645 words) - 10:42, 12 August 2009
  • ...DR notation. The need for a short explanation came up in an article on an email authentication method (SPF). In this case, an entire article on IPv4, or even CIDR, would
    5 KB (879 words) - 15:00, 20 March 2024
  • [[Email Authentication]]<br>
    13 KB (2,103 words) - 17:19, 5 August 2009
  • Email Authentication - DNS Records
    13 KB (2,054 words) - 07:48, 5 November 2009
  • '''Reverse MX''' (RMX) is an email authentication method developed by Hadmut Danisch. It became a basis for the two most com
    41 KB (6,790 words) - 03:36, 17 October 2013
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,916 words) - 05:49, 8 April 2024
  • 31 KB (5,011 words) - 10:47, 7 March 2024
View ( | ) (20 | 50 | 100 | 250 | 500)