Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.
    163 bytes (20 words) - 07:13, 4 November 2009
  • An [[Email authentication|authentication method]] that verifies the purported sender's address by sen
    171 bytes (21 words) - 02:56, 7 December 2009
  • {{r|Email authentication}}
    216 bytes (30 words) - 18:50, 29 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende
    141 bytes (18 words) - 17:55, 29 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende
    141 bytes (18 words) - 17:56, 29 October 2009
  • {{r|Email authentication}}
    193 bytes (22 words) - 18:49, 29 October 2009
  • {{r|Email authentication}}
    274 bytes (33 words) - 18:58, 29 October 2009
  • {{r|Email authentication}}
    179 bytes (21 words) - 18:47, 29 October 2009
  • [[Email authentication]] method that verifies the hostname of an [[Simple Mail Transfer Protocol |
    197 bytes (23 words) - 05:06, 26 October 2009
  • {{r|Email authentication}}
    541 bytes (71 words) - 18:46, 29 October 2009
  • [[Email authentication]] method that verifies a domain name found by a reverse DNS query on the tr
    157 bytes (22 words) - 18:22, 28 October 2009
  • [[Email authentication]] method that uses a [[Digital signature | digital signature]] to verify th
    157 bytes (20 words) - 10:59, 12 October 2009
  • [[Email authentication]] method that verifies the domain name in a "purported" address with the se
    156 bytes (20 words) - 05:01, 26 October 2009
  • Email authentication method that seeks to correlate the domain name in a "purported" address wit
    158 bytes (22 words) - 18:43, 29 August 2009
  • '''Designated Mailers Protocol''' (DMP) is an email authentication method developed by Gordon Fecyk. It became a basis for the two most commo
    221 bytes (32 words) - 10:34, 10 December 2009
  • '''Definition:''' Email authentication method that seeks to correlate the domain name in a "purported" address wit '''Sender ID''' is an email authentication method that seeks to correlate the domain name in a "purported" address wit
    1 KB (209 words) - 19:11, 29 August 2009
  • [[Email authentication]] method that verifies the domain name in the envelope return address again
    165 bytes (21 words) - 05:00, 26 October 2009
  • ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connecti
    2 KB (358 words) - 14:35, 28 October 2009
  • {{r|Email authentication}}
    296 bytes (46 words) - 04:55, 26 October 2009
  • {{r|Email authentication}}
    770 bytes (118 words) - 02:45, 7 December 2009
  • ...ess. Not much controversy here. FCrDNS is a problematic method used in [[Email authentication]]. The more specialized article can go into more detail and discuss the co
    626 bytes (91 words) - 17:38, 28 October 2009
  • ...n trouble with his client. This anecdote tells us a lot about what a joke email authentication has become. Luckily, most legitimate operators of transmitters do use thei ...c Dust and made you the University President, should messages dealing with email authentication still go to you, or to your successor? If the past President retired grace
    2 KB (314 words) - 12:41, 23 October 2009
  • {{r|Email authentication}}
    2 KB (205 words) - 12:38, 5 November 2009
  • [[User:David MacQuigg/Sandbox/Email authentication|Email authentication]]
    4 KB (558 words) - 14:33, 14 March 2024
  • {{seealso|Email authentication}} for a general overview and terminology. '''Definition:''' Email authentication method that verifies the domain name in a "purported" sender address.
    3 KB (434 words) - 21:42, 23 October 2009
  • {{r|Email authentication}}
    945 bytes (149 words) - 14:36, 1 October 2009
  • {{r|Email authentication}}
    1 KB (160 words) - 15:15, 26 September 2009
  • ...neral text information the domain owner would like to publish, including [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters] === Email authentication ===
    3 KB (510 words) - 18:05, 28 October 2009
  • ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connecti
    3 KB (562 words) - 17:04, 28 October 2009
  • {{r|Email authentication}}
    707 bytes (110 words) - 18:33, 29 October 2009
  • '''Definition:''' Email authentication method that verifies the hostname of a client requesting an SMTP session as
    1 KB (154 words) - 19:58, 29 August 2009
  • | pagename = Email authentication | abc = Email authentication
    2 KB (226 words) - 12:00, 25 November 2008
  • ...ts on the SPF article, it seems like there should be plenty of interest in email authentication, and email systems in general. I wonder if we could promote Citizendium th
    855 bytes (143 words) - 14:47, 23 December 2009
  • {{r|Email authentication}}
    820 bytes (125 words) - 07:26, 4 November 2009
  • ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.
    4 KB (666 words) - 13:15, 26 October 2009
  • ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.
    5 KB (822 words) - 02:42, 3 February 2010
  • ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated
    4 KB (610 words) - 17:28, 5 November 2009
  • ...In this discussion, we will assume the reader understands the basics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated
    4 KB (623 words) - 11:33, 23 October 2009
  • '''Definition:''' Email authentication method that verifies the domain name in the envelope return address against {{seealso|Email authentication}} for a general overview and terminology.
    7 KB (1,198 words) - 19:34, 26 October 2009
  • {{seealso|Email authentication}} for an overview and terminology. DomainKeys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers
    7 KB (1,137 words) - 05:56, 11 December 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].
    8 KB (1,320 words) - 19:11, 27 August 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...dresses, or some other data that the Receiver can use to run one or more [[Email authentication|authentication methods]].
    8 KB (1,268 words) - 15:05, 27 August 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. The most significant change introduced
    8 KB (1,260 words) - 16:55, 7 December 2009
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides strong assuranc
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,678 words) - 11:48, 23 September 2009
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,671 words) - 06:06, 29 August 2013
  • ...vy arrow) with each other. These details are important in discussions of [[Email authentication|authentication protocols]]. ...an incoming message has been forwarded. If the MDA runs the most common [[Email authentication|authentication]] checks on the incoming message, it may be rejected as a fo
    11 KB (1,673 words) - 06:07, 29 August 2013
  • == Subtopic: Email Authentication == ??? <subtopic> Email authentication methods fall into two categories. Methods like SPF, SenderID, and CSV rely
    13 KB (1,948 words) - 16:11, 13 November 2008
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    15 KB (2,320 words) - 18:53, 26 December 2010
  • ...who care about their reputation should protect their name by publishing [[Email authentication|authentication records]] in DNS (the [[Domain Name System]]). Agents who o
    17 KB (2,551 words) - 13:21, 10 October 2009
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)