Search results

Jump to navigation Jump to search
  • {{r|Email authentication}}
    945 bytes (149 words) - 14:36, 1 October 2009
  • {{r|Email authentication}}
    1 KB (160 words) - 15:15, 26 September 2009
  • ...neral text information the domain owner would like to publish, including [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters] === Email authentication ===
    3 KB (510 words) - 18:05, 28 October 2009
  • ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connecti
    3 KB (562 words) - 17:04, 28 October 2009
  • {{r|Email authentication}}
    707 bytes (110 words) - 18:33, 29 October 2009
  • '''Definition:''' Email authentication method that verifies the hostname of a client requesting an SMTP session as
    1 KB (154 words) - 19:58, 29 August 2009
  • {{r|Email authentication}}
    820 bytes (125 words) - 07:26, 4 November 2009
  • ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.
    5 KB (822 words) - 02:42, 3 February 2010
  • ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated
    4 KB (610 words) - 17:28, 5 November 2009
  • {{seealso|Email authentication}} for an overview and terminology. DomainKeys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers
    7 KB (1,137 words) - 05:56, 11 December 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,671 words) - 06:06, 29 August 2013
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,673 words) - 06:07, 29 August 2013
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    15 KB (2,320 words) - 18:53, 26 December 2010
  • '''Reverse MX''' (RMX) is an email authentication method developed by Hadmut Danisch. It became a basis for the two most com
    41 KB (6,790 words) - 03:36, 17 October 2013
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,913 words) - 14:38, 18 March 2024
  • ...someone else's account for fun and profit, and an attacker who can defeat email authentication might create a bogus but verifiable message that would hugely embarrass the
    32 KB (4,916 words) - 05:49, 8 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)