Search results

Jump to navigation Jump to search

Page title matches

  • An '''IP address''' is an exact designation of location, used by the [[Internet Protocol]]. ...in names'', or specifically ''DNS names]''. The correspondence between an IP address and an internet domain name is registered in the Domain Name Service ([[DNS
    985 bytes (141 words) - 21:29, 10 March 2009
  • Auto-populated based on [[Special:WhatLinksHere/IP address]]. Needs checking by a human.
    581 bytes (76 words) - 17:22, 11 January 2010

Page text matches

  • ...that verifies the domain name in a "purported" address with the sender's [[IP address]].
    156 bytes (20 words) - 05:01, 26 October 2009
  • ...ks to correlate the domain name in a "purported" address with the sender's IP address.
    158 bytes (22 words) - 18:43, 29 August 2009
  • ...fies the domain name in the envelope return address against the sender's [[IP address]].
    165 bytes (21 words) - 05:00, 26 October 2009
  • An '''IP blacklist''' is a database or list of [[IP address|IP addresses]] that should be blocked from connecting to a protected system
    832 bytes (126 words) - 12:19, 5 November 2009
  • An '''IP address''' is an exact designation of location, used by the [[Internet Protocol]]. ...in names'', or specifically ''DNS names]''. The correspondence between an IP address and an internet domain name is registered in the Domain Name Service ([[DNS
    985 bytes (141 words) - 21:29, 10 March 2009
  • ...ks to correlate the domain name in a "purported" address with the sender's IP address. ...that seeks to correlate the domain name in a "purported" address with the IP address of an SMTP client currently connected and waiting for confirmation that a m
    1 KB (209 words) - 19:11, 29 August 2009
  • ...Domain Name System (DNS) to look up a domain name associated with a given IP address.
    132 bytes (22 words) - 18:10, 28 October 2009
  • ...Mail Transfer Protocol | SMTP ]] transmitter against that transmitter's [[IP address]].
    197 bytes (23 words) - 05:06, 26 October 2009
  • ...in Name System (DNS)]] to look up a name that is associated with a given [[IP address]]. ...for the domain's [[Email system|mail transmitters]]. With reverse DNS, an IP address is used to look up a name associated with that address.
    3 KB (510 words) - 18:05, 28 October 2009
  • ...t verifies a domain name found by a reverse DNS query on the transmitter's IP address.
    157 bytes (22 words) - 18:22, 28 October 2009
  • ...trong assurance that the network owner and the domain owner agree that the IP address and domain name are connected. FCrDNS says nothing about the '''authorization''' of an IP address to send email. There must be some external information, perhaps a "PTR ter
    3 KB (562 words) - 17:04, 28 October 2009
  • ...IP to a device by an administrator. Thus, a device can have a different [[IP address]] every time it connects to the network automatically. Even if the device a ...sle of having to know all the IP addresses on his network and giving valid IP address to each new device that connects to it.<ref name=RFC2071>{{citation
    2 KB (376 words) - 10:16, 24 July 2008
  • Auto-populated based on [[Special:WhatLinksHere/IP address]]. Needs checking by a human.
    581 bytes (76 words) - 17:22, 11 January 2010
  • ...'flows'''. At a minimum, a flow is identified by a source and destination IP address; it may be further refined by information such as IP protocol identifier, a #one or more of fields derived from packet treatment (e.g., next hop IP address, the output interface, etc...).
    2 KB (365 words) - 20:36, 16 May 2009
  • '''CIDR notation''' is a compact form for a block of Internet [[IP address|IP Addresses]]. It is written by adding a "prefix length" to the standard
    2 KB (246 words) - 17:20, 3 May 2015
  • b) The retry comes from a different IP address, causing the receiver to not recognize it as a retry. Retry from a differen
    846 bytes (129 words) - 05:38, 3 November 2013
  • ...umes that hosts on the subnet already know the IP address of a router. The IP address of such a router is assumed either to have been manually configured into th ...able of recognizing two unicast addresses on its local interface: a unique IP address that can be used to diagnose and maintain that router, and an additional un
    4 KB (761 words) - 07:37, 18 March 2024
  • ...istrative workload and draining a very limited resource, globally routable IP address space.
    3 KB (547 words) - 05:36, 31 May 2009
  • {{r|IP address}}
    129 bytes (14 words) - 10:16, 7 February 2010
  • ...stname of a client requesting an SMTP session as authorizing that client's IP address.
    1 KB (154 words) - 19:58, 29 August 2009
  • ...re 20 and 21, although the protocol allows both the port number and server IP address to be redirected using the PORT command.
    985 bytes (152 words) - 13:33, 17 April 2010
  • ...er does not reveal conflict of interests with subscribed users, as their [[IP address]]es are only available to [[site administrator]]s. * On November 17th, 2005, an IP address reserved for the corporate offices of Diebold deleted 15 paragraphs from an
    2 KB (220 words) - 09:37, 14 September 2013
  • An [[IP address]] is unique and verifiable, but difficult to use in a reputation system, be ...e from: 1) The "IP name" from a [[Reverse DNS]] query on the transmitter's IP address. 2) The transmitter's hostname, sent at the beginning of every email sessio
    5 KB (822 words) - 02:42, 3 February 2010
  • ...s involved, however, an SPF check by the MDA will likely fail. The source IP address on the "last hop" to the MDA is no longer related to the originator's domai
    4 KB (610 words) - 17:28, 5 November 2009
  • ...PF)''' is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in the envelope [[Email ...by doing a [[DNS]] query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus SPF security depends on
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...he PPP Internet Protocol Control Protocol, which can dynamically assign an IP address to the client. This is common with dialup and other links where the end hos
    3 KB (451 words) - 11:34, 26 August 2008
  • ...ations associated with the infrastructure, such as [[Domain Name System]], IP Address Management (IPAM) and [[network management]] are within scope, but not user
    3 KB (368 words) - 15:00, 20 March 2024
  • ...a prefix length is implied by the structure of the high-order bits of the IP address (i.e., the "First Octet Rule").
    4 KB (587 words) - 14:57, 20 March 2024
  • '''1)''' The telnet program requests a TCP connection to port 25 at the IP address of a server for example.org. Telnet uses a [[DNS]] query to find this addr ...the TCP connection. The IPname is found by a [[Reverse DNS]] query on the IP address.
    8 KB (1,398 words) - 15:00, 26 September 2009
  • ...als, with some sites determining eligibility to download on the basis of [[IP address]]es and applicable country law.
    1 KB (218 words) - 10:48, 14 February 2021
  • ...ernet [[router|routers]] usually use a hash table to correlate ranges of [[IP address|IP addresses]] to route paths.
    5 KB (832 words) - 13:00, 16 January 2008
  • ...e edges of an MPLS cloud map between the end-to-end identifier, such as an IP address, and a link-local label.
    12 KB (1,828 words) - 16:22, 30 March 2024
  • Since Thread is IP based, each Thread device has a MAC address and an IP address. Here is the overall protocol stack:
    7 KB (1,122 words) - 07:28, 25 April 2023
  • ...nship as between low-level machine identifier (i.e., IEEE 802 address) and IP address. Experience showed that considerable effort was needed to find a machine b
    6 KB (982 words) - 07:30, 18 March 2024
  • ...esk that gets a problem report can have real challenges in determining the IP address of the user host, in order to use common tools to test connectivity to it.
    9 KB (1,526 words) - 20:04, 25 March 2011
  • ...o the name of the legitimate transmitter, everything but the transmitter's IP address. That has to be the address of the actual transmitter, or there is no TCP ...transmitter relay. This is typically done by comparing the transmitter's IP address to authentication records under the domain name.<br />
    15 KB (2,320 words) - 18:53, 26 December 2010
  • ...s so that they could be looked up when all the IPsec software knows is the IP address it needs to communicate with. The DNS reverse maps also had data which supp
    14 KB (2,265 words) - 05:49, 8 April 2024
  • ...gh and often insecure enough to be the favorite. The attacker looks up the IP address ranges used for [[broadband]] Internet services; any machine he can comprom
    5 KB (811 words) - 08:57, 22 April 2024
  • ...ol (ARP) provides the solution in IPv4 networks: the client broadcasts the IP address of the desired destination, in a frame with his L2 address as the source; t ==IP address management==
    26 KB (4,062 words) - 15:00, 20 March 2024
  • ...roblem is that the Transmitter's domain name no longer correlates with the IP address seen on the incoming connection from the Forwarder. ...This can be done with a password, by assigning the client machine a static IP address, or by having the client connect through the MSA's local network, not throu
    11 KB (1,671 words) - 06:06, 29 August 2013
  • ...roblem is that the Transmitter's domain name no longer correlates with the IP address seen on the incoming connection from the Forwarder. ...This can be done with a password, by assigning the client machine a static IP address, or by having the client connect through the MSA's local network, not throu
    11 KB (1,673 words) - 06:07, 29 August 2013
  • {{r|IP address}}
    3 KB (441 words) - 12:55, 13 November 2014
  • ...en "botmasters". The most common defense is to block connections from any IP address known to be a zombie. New zombies keep popping up so fast, however, that s
    17 KB (2,712 words) - 15:14, 26 September 2009
  • ...e cases, in OSPF for IPv4, where a 32-bit field indeed needs to be a valid IP address, or that its value defaults from some IPv4 address. Learn them, but treat t ...ier. That identifier is usually displayed in the dotted decimal form of an IP address, but it doesn't need to comply with IP addressing rules.
    23 KB (3,713 words) - 12:20, 30 March 2024
  • ...Protocol version 4]] or [[Internet Protocol version 6]], a combination of IP address and [[transmission control protocol]] "port number", or combinations of the master files. The binding of a given IP address to a DNS name can
    24 KB (3,628 words) - 21:04, 17 April 2014
  • An IPv4 host either is manually configured with its IP address, or learns it statefully using the [[Dynamic Host Configuration Protocol]] ...ace, can participate meaningfully in any IP services, it must know its own IP address. This is equally true in IPv4 and IPv6. There was no good and general way f
    39 KB (5,823 words) - 12:18, 30 March 2024
  • ...can see most of them, but not the workgroups the applicant checks or their IP address. So I've been approving accounts without that information. (The EPA group,
    5 KB (755 words) - 19:46, 26 July 2013
  • ...ically important [[directory service]] that translates to and from a raw [[IP address]] (such as ''207.46.197.32'') and a domain name (such as ''microsoft.com'') ...is sufficient, thanks to DNS, to find their computers regardless of which IP address the Microsoft administrator has assigned to those hosts.
    38 KB (6,049 words) - 06:54, 27 August 2013
  • ...ically important [[directory service]] that translates to and from a raw [[IP address]] (such as ''207.46.197.32'') and a domain name (such as ''microsoft.com'') ...is sufficient, thanks to DNS, to find their computers regardless of which IP address the Microsoft administrator has assigned to those hosts.
    38 KB (6,053 words) - 12:06, 30 March 2024
  • ...to perform a recursive sequence of database lookups with both the sender's IP address and given e-mail address after the 'MAIL FROM' command in the SMTP protocol ...uence number used in that handshake, it is difficult to forge the sender's IP address. While this is not a strong security mechanism, it is cheap, robust, and ap
    41 KB (6,790 words) - 03:36, 17 October 2013
  • ...case, changes that are made are quite anonymous: the only trace left is an IP address, which does not make it possible to identify the author of a change. This i
    6 KB (895 words) - 03:57, 17 December 2009
  • ...ng to this list, in June 2007, administrators blocked 1,598 accounts and [[IP address]]es; in the same period, the [http://en.wikipedia.org/wiki/Special:Ipblockl
    11 KB (1,540 words) - 07:09, 26 March 2024
  • ...ork/pgp.html website] who attempted to download the software from a non-US IP address were denied. Despite this, PGP quickly found its way to various non-US site
    7 KB (1,143 words) - 05:49, 8 April 2024
  • ...ce to hack in other computers (not literally, just spyware that sends back ip address, etc).... or is that illegal.) The problem w/ neutrality at Wikipedia was t
    11 KB (1,805 words) - 11:11, 6 March 2023
  • ...of the webpage desired; if the file was then read the output would be the IP address of the webpage .<ref name=Inferno />
    18 KB (2,783 words) - 10:41, 22 October 2013
  • ...'anonymous' edits on Wikipedia, linking them to various organizations by [[IP address]]
    11 KB (1,557 words) - 04:52, 12 August 2016
  • ...is more effective to apply this to all attempts from the same terminal or IP address, rather than just attempts to log in to the same account. The inconvenience
    12 KB (1,937 words) - 15:51, 8 April 2024
  • ...e anonymously, anonymous contributors may be partially identified by the [[IP address]] from which they contributed. ...''] or its designated agents also have authority to impose bans against [[IP address]]es for pages, topics, or the entire site.<ref name=authority>
    80 KB (11,741 words) - 13:27, 14 May 2023
  • ...s of individual users could be identified through a combination of their [[IP address]]es and login names. The decision was criticized by the [[Electronic Fronti ...erface suggests which local version should be chosen on the basis of the [[IP address]] of the user. In some cases, the message "This video is not available in y
    53 KB (7,751 words) - 18:41, 3 March 2024
  • ...domain]] in the target market, and [[web hosting]] that provides a local [[IP address]]. Otherwise, the fundamental elements of search optimization are essential
    37 KB (5,577 words) - 18:32, 10 October 2013