Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.
    163 bytes (20 words) - 07:13, 4 November 2009
  • An [[Email authentication|authentication method]] that verifies the purported sender's address by sen
    171 bytes (21 words) - 02:56, 7 December 2009
  • {{r|Email authentication}}
    216 bytes (30 words) - 18:50, 29 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende
    141 bytes (18 words) - 17:56, 29 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende
    141 bytes (18 words) - 17:55, 29 October 2009
  • {{r|Email authentication}}
    193 bytes (22 words) - 18:49, 29 October 2009
  • {{r|Email authentication}}
    274 bytes (33 words) - 18:58, 29 October 2009
  • {{r|Email authentication}}
    179 bytes (21 words) - 18:47, 29 October 2009
  • [[Email authentication]] method that verifies the hostname of an [[Simple Mail Transfer Protocol |
    197 bytes (23 words) - 05:06, 26 October 2009
  • {{r|Email authentication}}
    541 bytes (71 words) - 18:46, 29 October 2009
  • [[Email authentication]] method that verifies a domain name found by a reverse DNS query on the tr
    157 bytes (22 words) - 18:22, 28 October 2009
  • [[Email authentication]] method that uses a [[Digital signature | digital signature]] to verify th
    157 bytes (20 words) - 10:59, 12 October 2009
  • [[Email authentication]] method that verifies the domain name in a "purported" address with the se
    156 bytes (20 words) - 05:01, 26 October 2009
  • Email authentication method that seeks to correlate the domain name in a "purported" address wit
    158 bytes (22 words) - 18:43, 29 August 2009
  • '''Designated Mailers Protocol''' (DMP) is an email authentication method developed by Gordon Fecyk. It became a basis for the two most commo
    221 bytes (32 words) - 10:34, 10 December 2009
  • '''Definition:''' Email authentication method that seeks to correlate the domain name in a "purported" address wit '''Sender ID''' is an email authentication method that seeks to correlate the domain name in a "purported" address wit
    1 KB (209 words) - 19:11, 29 August 2009
  • [[Email authentication]] method that verifies the domain name in the envelope return address again
    165 bytes (21 words) - 05:00, 26 October 2009
  • {{r|Email authentication}}
    296 bytes (46 words) - 04:55, 26 October 2009
  • {{r|Email authentication}}
    770 bytes (118 words) - 02:45, 7 December 2009
  • {{r|Email authentication}}
    2 KB (205 words) - 12:38, 5 November 2009
  • {{r|Email authentication}}
    945 bytes (149 words) - 14:36, 1 October 2009
  • {{r|Email authentication}}
    1 KB (160 words) - 15:15, 26 September 2009
  • ...neral text information the domain owner would like to publish, including [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters] === Email authentication ===
    3 KB (510 words) - 18:05, 28 October 2009
  • ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connecti
    3 KB (562 words) - 17:04, 28 October 2009
  • {{r|Email authentication}}
    707 bytes (110 words) - 18:33, 29 October 2009
  • '''Definition:''' Email authentication method that verifies the hostname of a client requesting an SMTP session as
    1 KB (154 words) - 19:58, 29 August 2009
  • {{r|Email authentication}}
    820 bytes (125 words) - 07:26, 4 November 2009
  • ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.
    5 KB (822 words) - 02:42, 3 February 2010
  • ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated
    4 KB (610 words) - 17:28, 5 November 2009
  • {{seealso|Email authentication}} for an overview and terminology. DomainKeys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers
    7 KB (1,137 words) - 05:56, 11 December 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,671 words) - 06:06, 29 August 2013
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,673 words) - 06:07, 29 August 2013
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    15 KB (2,320 words) - 18:53, 26 December 2010
  • '''Reverse MX''' (RMX) is an email authentication method developed by Hadmut Danisch. It became a basis for the two most com
    41 KB (6,790 words) - 03:36, 17 October 2013
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,916 words) - 05:49, 8 April 2024