Search results
Jump to navigation
Jump to search
Page title matches
- ...ks to alleviate these problems by identifying the source. To be useful in email authentication, an identity must have three characteristics. It must be unique, verifiable ...can too easily forge the name of a reputable domain. That is the problem email authentication methods seek to avoid.5 KB (822 words) - 02:42, 3 February 2010
- 107 bytes (15 words) - 21:44, 24 November 2008
- 2 KB (223 words) - 07:09, 4 November 2009
- 399 bytes (51 words) - 10:42, 10 December 2009
- 1 KB (163 words) - 02:30, 3 February 2010
Page text matches
- The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.163 bytes (20 words) - 07:13, 4 November 2009
- An [[Email authentication|authentication method]] that verifies the purported sender's address by sen171 bytes (21 words) - 02:56, 7 December 2009
- {{r|Email authentication}}216 bytes (30 words) - 18:50, 29 October 2009
- [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende141 bytes (18 words) - 17:55, 29 October 2009
- [[Email authentication]] method that became a basis of [[Sender Policy Framework|SPF]] and [[Sende141 bytes (18 words) - 17:56, 29 October 2009
- {{r|Email authentication}}193 bytes (22 words) - 18:49, 29 October 2009
- {{r|Email authentication}}274 bytes (33 words) - 18:58, 29 October 2009
- {{r|Email authentication}}179 bytes (21 words) - 18:47, 29 October 2009
- [[Email authentication]] method that verifies the hostname of an [[Simple Mail Transfer Protocol |197 bytes (23 words) - 05:06, 26 October 2009
- {{r|Email authentication}}541 bytes (71 words) - 18:46, 29 October 2009
- [[Email authentication]] method that verifies a domain name found by a reverse DNS query on the tr157 bytes (22 words) - 18:22, 28 October 2009
- [[Email authentication]] method that uses a [[Digital signature | digital signature]] to verify th157 bytes (20 words) - 10:59, 12 October 2009
- [[Email authentication]] method that verifies the domain name in a "purported" address with the se156 bytes (20 words) - 05:01, 26 October 2009
- Email authentication method that seeks to correlate the domain name in a "purported" address wit158 bytes (22 words) - 18:43, 29 August 2009
- '''Designated Mailers Protocol''' (DMP) is an email authentication method developed by Gordon Fecyk. It became a basis for the two most commo221 bytes (32 words) - 10:34, 10 December 2009
- '''Definition:''' Email authentication method that seeks to correlate the domain name in a "purported" address wit '''Sender ID''' is an email authentication method that seeks to correlate the domain name in a "purported" address wit1 KB (209 words) - 19:11, 29 August 2009
- [[Email authentication]] method that verifies the domain name in the envelope return address again165 bytes (21 words) - 05:00, 26 October 2009
- {{r|Email authentication}}296 bytes (46 words) - 04:55, 26 October 2009
- {{r|Email authentication}}770 bytes (118 words) - 02:45, 7 December 2009
- {{r|Email authentication}}2 KB (205 words) - 12:38, 5 November 2009