Search results
Jump to navigation
Jump to search
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].8 KB (1,320 words) - 19:11, 27 August 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].8 KB (1,268 words) - 15:05, 27 August 2009
- {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. The most significant change introduced8 KB (1,260 words) - 16:55, 7 December 2009
- {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc8 KB (1,236 words) - 20:27, 9 December 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,678 words) - 11:48, 23 September 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,671 words) - 06:06, 29 August 2013
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo11 KB (1,673 words) - 06:07, 29 August 2013
- == Subtopic: Email Authentication == ??? <subtopic> Email authentication methods fall into two categories. Methods like SPF, SenderID, and CSV rely13 KB (1,948 words) - 16:11, 13 November 2008
- ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o15 KB (2,320 words) - 18:53, 26 December 2010
- ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o17 KB (2,551 words) - 13:21, 10 October 2009
- ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo14 KB (2,064 words) - 17:39, 24 February 2010
- ...ory". I would suggest making this a general article on the history of all email authentication protocols. Hopefully, this will segregate the controversial stuff from the12 KB (2,159 words) - 14:57, 20 March 2024
- [[Email Authentication]]<br>16 KB (2,645 words) - 10:42, 12 August 2009
- ...DR notation. The need for a short explanation came up in an article on an email authentication method (SPF). In this case, an entire article on IPv4, or even CIDR, would5 KB (879 words) - 15:00, 20 March 2024
- [[Email Authentication]]<br>13 KB (2,103 words) - 17:19, 5 August 2009
- Email Authentication - DNS Records13 KB (2,054 words) - 07:48, 5 November 2009
- '''Reverse MX''' (RMX) is an email authentication method developed by Hadmut Danisch. It became a basis for the two most com41 KB (6,790 words) - 03:36, 17 October 2013
- ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the32 KB (4,913 words) - 14:38, 18 March 2024
- ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the32 KB (4,916 words) - 05:49, 8 April 2024
- 31 KB (5,011 words) - 10:47, 7 March 2024