Search results

Jump to navigation Jump to search
  • ...re 20 and 21, although the protocol allows both the port number and server IP address to be redirected using the PORT command.
    985 bytes (152 words) - 13:33, 17 April 2010
  • ...er does not reveal conflict of interests with subscribed users, as their [[IP address]]es are only available to [[site administrator]]s. * On November 17th, 2005, an IP address reserved for the corporate offices of Diebold deleted 15 paragraphs from an
    2 KB (220 words) - 09:37, 14 September 2013
  • An [[IP address]] is unique and verifiable, but difficult to use in a reputation system, be ...e from: 1) The "IP name" from a [[Reverse DNS]] query on the transmitter's IP address. 2) The transmitter's hostname, sent at the beginning of every email sessio
    5 KB (822 words) - 02:42, 3 February 2010
  • ...s involved, however, an SPF check by the MDA will likely fail. The source IP address on the "last hop" to the MDA is no longer related to the originator's domai
    4 KB (610 words) - 17:28, 5 November 2009
  • ...PF)''' is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in the envelope [[Email ...by doing a [[DNS]] query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus SPF security depends on
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...he PPP Internet Protocol Control Protocol, which can dynamically assign an IP address to the client. This is common with dialup and other links where the end hos
    3 KB (451 words) - 11:34, 26 August 2008
  • ...ations associated with the infrastructure, such as [[Domain Name System]], IP Address Management (IPAM) and [[network management]] are within scope, but not user
    3 KB (368 words) - 15:00, 20 March 2024
  • ...a prefix length is implied by the structure of the high-order bits of the IP address (i.e., the "First Octet Rule").
    4 KB (587 words) - 14:57, 20 March 2024
  • '''1)''' The telnet program requests a TCP connection to port 25 at the IP address of a server for example.org. Telnet uses a [[DNS]] query to find this addr ...the TCP connection. The IPname is found by a [[Reverse DNS]] query on the IP address.
    8 KB (1,398 words) - 15:00, 26 September 2009
  • ...als, with some sites determining eligibility to download on the basis of [[IP address]]es and applicable country law.
    1 KB (218 words) - 10:48, 14 February 2021
  • ...ernet [[router|routers]] usually use a hash table to correlate ranges of [[IP address|IP addresses]] to route paths.
    5 KB (832 words) - 13:00, 16 January 2008
  • ...e edges of an MPLS cloud map between the end-to-end identifier, such as an IP address, and a link-local label.
    12 KB (1,828 words) - 16:22, 30 March 2024
  • Since Thread is IP based, each Thread device has a MAC address and an IP address. Here is the overall protocol stack:
    7 KB (1,122 words) - 07:28, 25 April 2023
  • ...nship as between low-level machine identifier (i.e., IEEE 802 address) and IP address. Experience showed that considerable effort was needed to find a machine b
    6 KB (982 words) - 07:30, 18 March 2024
  • ...esk that gets a problem report can have real challenges in determining the IP address of the user host, in order to use common tools to test connectivity to it.
    9 KB (1,526 words) - 20:04, 25 March 2011
  • ...o the name of the legitimate transmitter, everything but the transmitter's IP address. That has to be the address of the actual transmitter, or there is no TCP ...transmitter relay. This is typically done by comparing the transmitter's IP address to authentication records under the domain name.<br />
    15 KB (2,320 words) - 18:53, 26 December 2010
  • ...s so that they could be looked up when all the IPsec software knows is the IP address it needs to communicate with. The DNS reverse maps also had data which supp
    14 KB (2,265 words) - 05:49, 8 April 2024
  • ...gh and often insecure enough to be the favorite. The attacker looks up the IP address ranges used for [[broadband]] Internet services; any machine he can comprom
    5 KB (811 words) - 08:57, 22 April 2024
  • ...ol (ARP) provides the solution in IPv4 networks: the client broadcasts the IP address of the desired destination, in a frame with his L2 address as the source; t ==IP address management==
    26 KB (4,062 words) - 15:00, 20 March 2024
  • ...roblem is that the Transmitter's domain name no longer correlates with the IP address seen on the incoming connection from the Forwarder. ...This can be done with a password, by assigning the client machine a static IP address, or by having the client connect through the MSA's local network, not throu
    11 KB (1,671 words) - 06:06, 29 August 2013
View ( | ) (20 | 50 | 100 | 250 | 500)