Search results

Jump to navigation Jump to search
Results 1 – 21 of 48
Advanced search

Search in namespaces:

  • {{r|Email}} {{r|Virtual private network}}
    788 bytes (103 words) - 14:59, 20 March 2024
  • {{r|Virtual private network}} {{r|Email system}}
    932 bytes (116 words) - 11:20, 9 December 2009
  • ...cluding [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters]]. With reverse DNS, an IP address is used to loo Another factor making reverse DNS problematic is the trend to [[Virtual Private Server]]s - using one machine and IP address to host many unrelated domains
    3 KB (510 words) - 18:05, 28 October 2009
  • ...ticle is a [[CZ:Related articles|subtopic]] in a group of articles under [[Email system]]. We assume the reader understands the parent article, its termino Solving the problems of bulk [[email abuse]] (spamming, phishing and other bulk mail scams)
    5 KB (822 words) - 02:42, 3 February 2010
  • ...d addresses, which may be interconnected by physical facilities, [[virtual private network]]s, or a combination of the two, which can '''''only''''' communica ...agement Protocol]] (SNMP), [[Network Time Protocol]] (NTP), and internal [[email]]. It may have additional security devices, such as [[network intrusion det
    1 KB (191 words) - 14:50, 14 July 2008
  • {{seealso|Email authentication}} for an overview and terminology. ...a message after it was signed by someone with access to the domain owner's private key.
    7 KB (1,137 words) - 05:56, 11 December 2009
  • =Email discussions section= ==Email forgery protections==
    11 KB (1,823 words) - 06:54, 1 July 2016
  • Converged services may use custom software (e.g., private branch exchange) on a purpose-built router, or a general-purpose computer. **{{r|Email||}}
    3 KB (351 words) - 04:39, 5 April 2024
  • ...e vulnerabilities according to their locality in Figure 1 of the article [[Email system]], repeated here for convenience. In each category, we summarize th ...r|700px|'''Figure 1 Actors (Users and Agents) and their roles in an ideal email system.'''}}
    15 KB (2,320 words) - 18:53, 26 December 2010
  • ...blic'', with its findings immediately available to all or most users, or ''private'', available only to administrators who control others' access. In all case #having a confirmed email address
    7 KB (1,048 words) - 12:00, 18 April 2024
  • * '''Private ENUM''': A carrier, VOIP operator or ISP may use ENUM techniques within its ...cation service providers agree to share subscriber information via ENUM in private peering relationships. The carriers themselves control subscriber informati
    15 KB (2,370 words) - 21:09, 30 September 2013
  • ...uce some of the acronyms and jargon needed to understand the literature on email systems. ...them. This is an [[Internet protocol suite|application layer]] view of an email network.
    17 KB (2,712 words) - 15:14, 26 September 2009
  • ...be too inefficient and time-consuming. Instead, a secretary monitors an email account on his behalf. He corresponds in "batch mode", such as one day ever | url=http://www-cs-faculty.stanford.edu/~knuth/email.html
    7 KB (1,029 words) - 07:21, 30 September 2007
  • ...One key is the '''public key''' and can be published. The other is the '''private key''' and is kept secret, never leaving the user's computer. "Public" need .... '''Public key cryptography''' is constructed so that calculation of the private key is computationally infeasible from knowledge of the public key, even th
    8 KB (1,233 words) - 05:48, 8 April 2024
  • "Free expression should not be restricted by governmental or private controls over computer hardware or software, telecommunications infrastruct ...t the first clearly identifiable spam, admittedly on Usenet rather than in email. <ref>{{citation
    4 KB (559 words) - 07:30, 18 March 2024
  • :::(2) The Management Council will have a private forum board which is hidden from anyone who is not on the Management Counci :::(4) The Management Council will have a private forum board on which any Citizen may post, however they will only see topic
    6 KB (1,055 words) - 18:21, 18 September 2014
  • ...e is a privacy risk: I found that by doing this you can see the content of private messages sent using the forum software. So you would really have to trust w ...nts (if they want it to) whenever a post is made, and this email shows the email address of the poster. If we reply there to public folks, our emails will
    6 KB (954 words) - 17:21, 14 September 2013
  • ..., Colonel [[David Lapan]], where he characterized Gordon's complaint as "a private matter"<ref name=MiamiHerald2009-08-03/>:
    6 KB (860 words) - 14:52, 15 April 2024
  • ...ow contributer', so take it up the workgoup ladder and EIC or even through email. [[User:D. Matt Innis|D. Matt Innis]] 04:08, 16 January 2009 (UTC) ...hp?action=search2 forum] shows no such exchange regarding the notion of an email privacy waiver when contacting a Constable.
    15 KB (2,530 words) - 10:46, 7 March 2024
  • ...systems may need completely private physical, virtual private networks, or private application clouds. ..."Security controls for email must be strengthened, and we are adding some email specific features to the Trusted Internet Connections that will allow us to
    20 KB (2,779 words) - 13:29, 20 March 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)