Search results

Jump to navigation Jump to search

Page title matches

  • ...] systems on an internal network allowing users within one organization to email each other.
    17 KB (2,760 words) - 11:50, 2 February 2023
  • 138 bytes (16 words) - 14:30, 13 July 2008
  • 5 KB (732 words) - 11:46, 2 February 2023
  • '''Email abuse''' is the unsolicited sending of [[spam]], third party [[advertisemen ...200508_UltimateGuidetoEmailSecurityUS_822533.pdf Clearswift White Paper on Email Security]</ref>
    717 bytes (92 words) - 04:28, 1 October 2009
  • {{seealso|Email processes and protocols}} ...and should be understood by anyone involved in the design or operation of email systems.
    11 KB (1,673 words) - 06:07, 29 August 2013
  • ...ustrate the use of roles as building blocks in diagrams of various typical email systems.
    4 KB (524 words) - 04:10, 9 December 2009
  • ...ticle is a [[CZ:Related articles|subtopic]] in a group of articles under [[Email system]]. We assume the reader understands the parent article, its termino Solving the problems of bulk [[email abuse]] (spamming, phishing and other bulk mail scams)
    5 KB (822 words) - 02:42, 3 February 2010
  • 25 bytes (3 words) - 08:51, 22 April 2024
  • 846 bytes (129 words) - 05:38, 3 November 2013
  • 12 bytes (1 word) - 14:13, 26 December 2007
  • ...e vulnerabilities according to their locality in Figure 1 of the article [[Email system]], repeated here for convenience. In each category, we summarize th ...r|700px|'''Figure 1 Actors (Users and Agents) and their roles in an ideal email system.'''}}
    15 KB (2,320 words) - 18:53, 26 December 2010
  • This article is a subtopic in a group of articles under Email system. We assume the reader understands the parent article, its terminolog
    514 bytes (66 words) - 21:49, 19 February 2010
  • {{r|Email system}} {{r|Email history}}
    379 bytes (58 words) - 06:45, 23 November 2009
  • Roles and responsibilities of organizations handling email.
    95 bytes (10 words) - 21:07, 27 August 2009
  • ...blocked by networks providing Internet access to travelers. The standard email port 25 is frequently blocked due to widespread abuse of these networks. T ...Hutzler, et.al. 2007. Best Current Practices recommended for operators of email submission services.
    854 bytes (118 words) - 23:50, 30 September 2009
  • 559 bytes (48 words) - 17:15, 3 October 2009
  • ...nick, ed., http://tools.ietf.org/html/rfc5322. IETF Draft Standard. Basic email message formats, including headers. ...erawy, http://tools.ietf.org/html/rfc5451. IETF Proposed Standard. A new email header field with results of message authentication.
    2 KB (223 words) - 07:09, 4 November 2009
  • The header lines in every email message, defined in RFC-5322.
    244 bytes (34 words) - 21:06, 30 August 2009
  • === BCPs relevant to email security === ...ent, and even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (
    1 KB (200 words) - 17:37, 9 October 2009
  • 102 bytes (13 words) - 14:24, 26 September 2009

Page text matches

  • == Email Privacy == ...email.com/, and [http://www.sxipper.com/ Sxipper] also offers "disposable" email addresses. ''-- [[User:Tim Chambers|Tim Chambers]] 11:50, 1 October 2008 (C
    282 bytes (42 words) - 11:50, 1 October 2008
  • {{rpl|Email}} {{rpl|Email system}}
    113 bytes (14 words) - 16:02, 21 January 2023
  • ...access to the [[Internet]]. When reading email in the browser, the user's email messages reside on a server rather than being downloaded to the user's desk
    461 bytes (76 words) - 16:02, 21 January 2023
  • '''Email abuse''' is the unsolicited sending of [[spam]], third party [[advertisemen ...200508_UltimateGuidetoEmailSecurityUS_822533.pdf Clearswift White Paper on Email Security]</ref>
    717 bytes (92 words) - 04:28, 1 October 2009
  • {{r|Email system}} {{r|Email security}}
    216 bytes (30 words) - 18:50, 29 October 2009
  • {{r|Email system}} {{r|Email security}}
    541 bytes (71 words) - 18:46, 29 October 2009
  • {{r|Email system}} {{r|Email history}}
    379 bytes (58 words) - 06:45, 23 November 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    529 bytes (70 words) - 04:34, 26 January 2021
  • {{r|Email system}} {{r|Email greylisting}}
    337 bytes (41 words) - 09:23, 27 November 2022
  • ...blocked by networks providing Internet access to travelers. The standard email port 25 is frequently blocked due to widespread abuse of these networks. T ...Hutzler, et.al. 2007. Best Current Practices recommended for operators of email submission services.
    854 bytes (118 words) - 23:50, 30 September 2009
  • A client-server messaging protocol for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or
    184 bytes (25 words) - 16:09, 21 January 2023
  • {{r|Email system}} {{r|Email security}}
    193 bytes (22 words) - 18:49, 29 October 2009
  • ...ccess Protocol''' (IMAP) is a client-server messaging protocol for [[Email|email]] which allows messages to be stored indefinitely on a server. IMAP is des
    213 bytes (30 words) - 16:14, 21 January 2023
  • {{r|Email system}} {{r|Email security}}
    274 bytes (33 words) - 18:58, 29 October 2009
  • {{r|Email system}} {{r|Email security}}
    179 bytes (21 words) - 18:47, 29 October 2009
  • {{rpl|Email message formats}} {{rpl|Email message headers}}
    568 bytes (59 words) - 09:03, 22 April 2024
  • === BCPs relevant to email security === ...ent, and even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (
    1 KB (200 words) - 17:37, 9 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    188 bytes (25 words) - 18:55, 8 September 2009
  • ...ques that have been developed to protect email users from Unsolicited Bulk Email (UBE or spam). See the [[Anti-spam_techniques/External_Links|External Link
    315 bytes (46 words) - 09:29, 27 November 2022
  • ...Validation (BATV)''' provides a mechanism for assessing the validity of an email's envelope return (bounce) address. It permits the original submitter of a
    332 bytes (50 words) - 23:36, 30 September 2009
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)