Search results
Jump to navigation
Jump to search
- ...istrative workload and draining a very limited resource, globally routable IP address space.3 KB (547 words) - 05:36, 31 May 2009
- {{r|IP address}}129 bytes (14 words) - 10:16, 7 February 2010
- ...stname of a client requesting an SMTP session as authorizing that client's IP address.1 KB (154 words) - 19:58, 29 August 2009
- | pagename = IP address | abc = IP address2 KB (227 words) - 21:30, 10 March 2009
- ...re 20 and 21, although the protocol allows both the port number and server IP address to be redirected using the PORT command.985 bytes (152 words) - 13:33, 17 April 2010
- ...er does not reveal conflict of interests with subscribed users, as their [[IP address]]es are only available to [[site administrator]]s. * On November 17th, 2005, an IP address reserved for the corporate offices of Diebold deleted 15 paragraphs from an2 KB (220 words) - 09:37, 14 September 2013
- An [[IP address]] is unique and verifiable, but difficult to use in a reputation system, be ...e from: 1) The "IP name" from a [[Reverse DNS]] query on the transmitter's IP address. 2) The transmitter's hostname, sent at the beginning of every email sessio5 KB (822 words) - 02:42, 3 February 2010
- ...s involved, however, an SPF check by the MDA will likely fail. The source IP address on the "last hop" to the MDA is no longer related to the originator's domai4 KB (610 words) - 17:28, 5 November 2009
- ...hey are the same agent. When a Forwarder is involved, however, the source IP address on the "last hop" to the MDA is no longer related to the originator's domai4 KB (623 words) - 11:33, 23 October 2009
- An [[IP address]] is unique and verifiable, but difficult to use in a reputation system, be ...author to recipient. A "[[forwarding problem]]" may occur when the source IP address on the "last hop" is no longer related to the sender's domain name.4 KB (666 words) - 13:15, 26 October 2009
- ...Reverse DNS is fairly simple, and useful for getting information about an IP address. Not much controversy here. FCrDNS is a problematic method used in [[Emai626 bytes (91 words) - 17:38, 28 October 2009
- ...rifies the domain name in the envelope return address against the sender's IP address. ...PF)''' is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in the envelope [[Email7 KB (1,198 words) - 19:34, 26 October 2009
- ...Framework]] and [[Sender ID]]. Like SPF, RMX uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in the envelope [[Email ...by doing a [[DNS]] query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus SPF security depends on8 KB (1,260 words) - 16:55, 7 December 2009
- ...PF)''' is an email authentication method that uses the [[IP address|source IP address]] in a [[TCP]] connection to verify the domain name in the envelope [[Email ...by doing a [[DNS]] query for an SPF record under the domain name. If the IP address is listed in that record, the result is Pass. Thus SPF security depends on8 KB (1,236 words) - 20:27, 9 December 2009
- ...he PPP Internet Protocol Control Protocol, which can dynamically assign an IP address to the client. This is common with dialup and other links where the end hos3 KB (451 words) - 11:34, 26 August 2008
- ...more than one account to vandalize from, then we should block the vandal's IP address for a week. To do that: * Look up the IP address. Go to [[Special:CheckUser|check user]], paste in the vandal's username (d5 KB (831 words) - 11:04, 7 March 2024
- ...process the information on Google's behalf. Google will not associate your IP address with any other data held by Google. You may refuse the use of cookies by s3 KB (541 words) - 18:08, 26 February 2021
- ...nycasting''' is an Internet Protocol routing technique in which the same [[IP address]] may exist at several points in the network, with the caveat that each ins Traditionally, an IP address needed to be unique. This would be absolutely true in a single network with6 KB (1,023 words) - 06:28, 17 October 2009
- ...ations associated with the infrastructure, such as [[Domain Name System]], IP Address Management (IPAM) and [[network management]] are within scope, but not user3 KB (368 words) - 15:00, 20 March 2024
- ...a prefix length is implied by the structure of the high-order bits of the IP address (i.e., the "First Octet Rule").4 KB (587 words) - 14:57, 20 March 2024