Search results

Jump to navigation Jump to search

Page title matches

  • ...] systems on an internal network allowing users within one organization to email each other.
    17 KB (2,760 words) - 11:50, 2 February 2023
  • ...ustrate the use of roles as building blocks in diagrams of various typical email systems.
    4 KB (524 words) - 04:10, 9 December 2009
  • ...ticle is a [[CZ:Related articles|subtopic]] in a group of articles under [[Email system]]. We assume the reader understands the parent article, its termino Solving the problems of bulk [[email abuse]] (spamming, phishing and other bulk mail scams)
    5 KB (822 words) - 02:42, 3 February 2010
  • 25 bytes (3 words) - 08:51, 22 April 2024
  • 846 bytes (129 words) - 05:38, 3 November 2013
  • 12 bytes (1 word) - 14:13, 26 December 2007
  • ...e vulnerabilities according to their locality in Figure 1 of the article [[Email system]], repeated here for convenience. In each category, we summarize th ...r|700px|'''Figure 1 Actors (Users and Agents) and their roles in an ideal email system.'''}}
    15 KB (2,320 words) - 18:53, 26 December 2010
  • 138 bytes (16 words) - 14:30, 13 July 2008
  • 5 KB (732 words) - 11:46, 2 February 2023
  • '''Email abuse''' is the unsolicited sending of [[spam]], third party [[advertisemen ...200508_UltimateGuidetoEmailSecurityUS_822533.pdf Clearswift White Paper on Email Security]</ref>
    717 bytes (92 words) - 04:28, 1 October 2009
  • {{seealso|Email processes and protocols}} ...and should be understood by anyone involved in the design or operation of email systems.
    11 KB (1,673 words) - 06:07, 29 August 2013
  • === BCPs relevant to email security === ...ent, and even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (
    1 KB (200 words) - 17:37, 9 October 2009
  • 102 bytes (13 words) - 14:24, 26 September 2009
  • ...ics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated in this diagram:
    4 KB (610 words) - 17:28, 5 November 2009
  • .... Extensions to allow encoding of graphics and other non-ASCII content in email message bodies. ...nick, ed., http://tools.ietf.org/html/rfc5322. IETF Draft Standard. Basic email message formats, including headers.
    2 KB (245 words) - 21:49, 19 February 2010
  • {{slashtitle|Email challenge/response}} '''Challenge/Response (C/R)''' is a method of filtering spam email.
    1 KB (208 words) - 23:42, 30 September 2009
  • 145 bytes (22 words) - 23:47, 30 September 2009
  • Brief overview of methods used to authenticate the sender of an email.
    107 bytes (15 words) - 21:44, 24 November 2008
  • 160 bytes (19 words) - 04:30, 1 October 2009
  • 80 bytes (9 words) - 06:06, 1 October 2009
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • Description of the features of various programs allowing users to work with email on their own computers, as opposed to [[Webmail]], where everything is done
    239 bytes (39 words) - 19:55, 23 November 2009
  • This article is a subtopic in a group of articles under Email system. We assume the reader understands the parent article, its terminolog
    514 bytes (66 words) - 21:49, 19 February 2010
  • {{r|Email system}} {{r|Email history}}
    379 bytes (58 words) - 06:45, 23 November 2009
  • Roles and responsibilities of organizations handling email.
    95 bytes (10 words) - 21:07, 27 August 2009
  • ...blocked by networks providing Internet access to travelers. The standard email port 25 is frequently blocked due to widespread abuse of these networks. T ...Hutzler, et.al. 2007. Best Current Practices recommended for operators of email submission services.
    854 bytes (118 words) - 23:50, 30 September 2009
  • 559 bytes (48 words) - 17:15, 3 October 2009
  • ...nick, ed., http://tools.ietf.org/html/rfc5322. IETF Draft Standard. Basic email message formats, including headers. ...erawy, http://tools.ietf.org/html/rfc5451. IETF Proposed Standard. A new email header field with results of message authentication.
    2 KB (223 words) - 07:09, 4 November 2009
  • The header lines in every email message, defined in RFC-5322.
    244 bytes (34 words) - 21:06, 30 August 2009
  • TCP port reserved for authenticated submission of email messages.
    101 bytes (12 words) - 11:33, 29 August 2009
  • {{seealso|Email processes and protocols}} ...and should be understood by anyone involved in the design or operation of email systems.
    11 KB (1,671 words) - 06:06, 29 August 2013
  • {{r|Email}} {{r|Email processes and protocols}}
    2 KB (205 words) - 12:38, 5 November 2009
  • ...hentication Status", M. Kucherawy. 2009. - IETF Proposed Standard. A new email header field with results of message authentication.
    399 bytes (51 words) - 10:42, 10 December 2009
  • {{r|Email system}} Auto-populated based on [[Special:WhatLinksHere/Email agents]]. Needs checking by a human.
    448 bytes (59 words) - 16:17, 11 January 2010
  • BCP134 - Email Submission Operations: Access and Accountability Requirements [http://iana.org/protocols IANA Protocol Registries] - Registries relevant to email systems
    776 bytes (100 words) - 20:10, 11 February 2010
  • An [[Email authentication|authentication method]] that verifies the purported sender's
    171 bytes (21 words) - 02:56, 7 December 2009
  • The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.
    163 bytes (20 words) - 07:13, 4 November 2009
  • ...uce some of the acronyms and jargon needed to understand the literature on email systems. ...them. This is an [[Internet protocol suite|application layer]] view of an email network.
    17 KB (2,712 words) - 15:14, 26 September 2009
  • ...erawy, http://tools.ietf.org/html/rfc5451. IETF Proposed Standard. A new email header field with results of message authentication.
    884 bytes (118 words) - 07:22, 4 November 2009
  • {{r|Email system}} {{r|Email security}}
    1 KB (163 words) - 02:30, 3 February 2010
  • ...ats and encodings used for text, pictures, and various other objects in an email.
    126 bytes (18 words) - 13:15, 25 November 2008
  • {{r|Email}} {{r|Email system}}
    573 bytes (87 words) - 14:00, 1 October 2009
  • {{r|Email system}}
    680 bytes (107 words) - 19:11, 23 September 2009
  • The header lines in every email message, defined in RFC 5322
    97 bytes (13 words) - 10:52, 8 July 2009
  • {{r|Email}} {{r|Email system}}
    858 bytes (138 words) - 14:06, 1 October 2009
  • Email user programs and their features.
    75 bytes (9 words) - 21:26, 27 August 2009
  • 181 bytes (23 words) - 00:04, 3 November 2013
  • {{r|Email system}} {{r|Email processes and protocols}}
    909 bytes (144 words) - 14:38, 1 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    529 bytes (70 words) - 04:34, 26 January 2021
  • Auto-populated based on [[Special:WhatLinksHere/Email message formats]]. Needs checking by a human. {{r|Email system}}
    439 bytes (57 words) - 16:17, 11 January 2010
  • Brief explanation of an email system at the relay level.
    92 bytes (13 words) - 15:32, 19 September 2009
  • {{r|Email system}} {{r|Email authentication}}
    820 bytes (125 words) - 07:26, 4 November 2009
  • 196 bytes (27 words) - 07:36, 4 November 2009
  • 792 bytes (105 words) - 12:56, 30 September 2009
  • 108 bytes (15 words) - 10:52, 10 December 2009
  • {{r|Email system}} {{r|Email authentication}}
    945 bytes (149 words) - 14:36, 1 October 2009
  • {{r|Email}} {{r|Email system}}
    170 bytes (20 words) - 20:33, 23 November 2009
  • {{r|Email system}} {{r|Email authentication}}
    770 bytes (118 words) - 02:45, 7 December 2009
  • BCP134 - Email Submission Operations: Access and Accountability Requirements 17 other registries related to email
    949 bytes (121 words) - 20:10, 11 February 2010
  • {{r|Email system}} {{r|Email message formats}} (RFC-5322)
    1 KB (160 words) - 15:15, 26 September 2009
  • ...notes and citation-sources (references). Please read this page before you email us an article. ...mat, and also ‘.rtf’ files, which most word processors can generate. Just email your article, as an attachment, to '''[mailto:cz-wikiformat@mail.citizendiu
    3 KB (543 words) - 03:08, 25 February 2012
  • 222 bytes (29 words) - 12:10, 26 February 2008

Page text matches

  • == Email Privacy == ...email.com/, and [http://www.sxipper.com/ Sxipper] also offers "disposable" email addresses. ''-- [[User:Tim Chambers|Tim Chambers]] 11:50, 1 October 2008 (C
    282 bytes (42 words) - 11:50, 1 October 2008
  • {{rpl|Email}} {{rpl|Email system}}
    113 bytes (14 words) - 16:02, 21 January 2023
  • ...access to the [[Internet]]. When reading email in the browser, the user's email messages reside on a server rather than being downloaded to the user's desk
    461 bytes (76 words) - 16:02, 21 January 2023
  • '''Email abuse''' is the unsolicited sending of [[spam]], third party [[advertisemen ...200508_UltimateGuidetoEmailSecurityUS_822533.pdf Clearswift White Paper on Email Security]</ref>
    717 bytes (92 words) - 04:28, 1 October 2009
  • {{r|Email system}} {{r|Email security}}
    216 bytes (30 words) - 18:50, 29 October 2009
  • {{r|Email system}} {{r|Email security}}
    541 bytes (71 words) - 18:46, 29 October 2009
  • {{r|Email system}} {{r|Email history}}
    379 bytes (58 words) - 06:45, 23 November 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    529 bytes (70 words) - 04:34, 26 January 2021
  • {{r|Email system}} {{r|Email greylisting}}
    337 bytes (41 words) - 09:23, 27 November 2022
  • ...blocked by networks providing Internet access to travelers. The standard email port 25 is frequently blocked due to widespread abuse of these networks. T ...Hutzler, et.al. 2007. Best Current Practices recommended for operators of email submission services.
    854 bytes (118 words) - 23:50, 30 September 2009
  • A client-server messaging protocol for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or
    184 bytes (25 words) - 16:09, 21 January 2023
  • {{r|Email system}} {{r|Email security}}
    193 bytes (22 words) - 18:49, 29 October 2009
  • ...ccess Protocol''' (IMAP) is a client-server messaging protocol for [[Email|email]] which allows messages to be stored indefinitely on a server. IMAP is des
    213 bytes (30 words) - 16:14, 21 January 2023
  • {{r|Email system}} {{r|Email security}}
    274 bytes (33 words) - 18:58, 29 October 2009
  • {{r|Email system}} {{r|Email security}}
    179 bytes (21 words) - 18:47, 29 October 2009
  • {{rpl|Email message formats}} {{rpl|Email message headers}}
    568 bytes (59 words) - 09:03, 22 April 2024
  • === BCPs relevant to email security === ...ent, and even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (
    1 KB (200 words) - 17:37, 9 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    188 bytes (25 words) - 18:55, 8 September 2009
  • ...ques that have been developed to protect email users from Unsolicited Bulk Email (UBE or spam). See the [[Anti-spam_techniques/External_Links|External Link
    315 bytes (46 words) - 09:29, 27 November 2022
  • ...Validation (BATV)''' provides a mechanism for assessing the validity of an email's envelope return (bounce) address. It permits the original submitter of a
    332 bytes (50 words) - 23:36, 30 September 2009
  • {{r|Email}} {{r|Email processes and protocols}}
    2 KB (205 words) - 12:38, 5 November 2009
  • {{r|Email system}} Auto-populated based on [[Special:WhatLinksHere/Email agents]]. Needs checking by a human.
    448 bytes (59 words) - 16:17, 11 January 2010
  • '''Post Office Protocol''' is a client-server messaging protocol for [[Email|email]] which requires messages to be downloaded to a client's computer, phone or
    346 bytes (50 words) - 16:12, 21 January 2023
  • #redirect [[email]]
    19 bytes (2 words) - 09:02, 19 July 2008
  • {{r|Email system}} {{r|Email processes and protocols}}
    226 bytes (27 words) - 13:00, 16 March 2010
  • ...col SMTP, for example, is concerned about all the details of conducting an email session over a reliable TCP connection, but not the least concerned about h === The email system ===
    1 KB (218 words) - 12:34, 28 August 2009
  • Email user programs and their features.
    75 bytes (9 words) - 21:26, 27 August 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    331 bytes (41 words) - 22:45, 1 October 2009
  • {{r|Email}} {{r|Email system}}
    170 bytes (20 words) - 20:33, 23 November 2009
  • Typical email sessions using the SMTP protocol.
    83 bytes (10 words) - 15:09, 26 September 2009
  • ...group promoting [[Sender Policy Framework|SPF]] as a way of avoiding the [[Email forwarding problem|forwarding problem]], but it was never widely deployed.
    456 bytes (74 words) - 11:55, 5 November 2009
  • Requirements for submission of email using port 587.
    88 bytes (10 words) - 11:14, 29 August 2009
  • Roles and responsibilities of organizations handling email.
    95 bytes (10 words) - 21:07, 27 August 2009
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • A typical email session using the SMTP protocol.
    84 bytes (11 words) - 17:21, 27 August 2009
  • * [http://www.emailreplies.com/ email etiquette]
    200 bytes (28 words) - 22:16, 15 July 2008
  • Brief explanation of an email system at the relay level.
    92 bytes (13 words) - 15:32, 19 September 2009
  • TCP port reserved for authenticated submission of email messages.
    101 bytes (12 words) - 11:33, 29 August 2009
  • Standard TCP port for email transfer using the SMTP protocol.
    97 bytes (13 words) - 12:28, 29 August 2009
  • Standard TCP port for email retrieval using the POP protocol.
    97 bytes (13 words) - 12:26, 29 August 2009
  • Standard TCP port for email retrieval using the IMAP protocol.
    98 bytes (13 words) - 12:27, 29 August 2009
  • {{r|Email system}} {{r|Email authentication}}
    770 bytes (118 words) - 02:45, 7 December 2009
  • Techniques used to block or prevent spam, phishing, and other abuses of email.
    115 bytes (16 words) - 02:42, 7 December 2009
  • 2. If the permission is an email, just paste in the email, format it so it makes sense, and click save. This was a Flickr Message (not an email) and it is available at http://www.flickr.com/mail/72157621160869588 :
    868 bytes (135 words) - 17:51, 9 July 2009
  • {{r|Email system}} {{r|Email message formats}} (RFC-5322)
    1 KB (160 words) - 15:15, 26 September 2009
  • ...y servers, clogged tubes, evil gremlins, whatever, but just don't send the email for a decent interval. That'd handle 75% of these throwaway accounts. --
    493 bytes (69 words) - 13:28, 12 March 2007
  • Auto-populated based on [[Special:WhatLinksHere/Email message formats]]. Needs checking by a human. {{r|Email system}}
    439 bytes (57 words) - 16:17, 11 January 2010
  • {{r|Email system}} {{r|Email authentication}}
    296 bytes (46 words) - 04:55, 26 October 2009
  • {{r|Email processes and protocols}} {{r|Email system}}
    491 bytes (63 words) - 18:43, 11 January 2010
  • A moderated email-based discussion group and bulletin board discussing the field of military
    137 bytes (17 words) - 13:02, 12 June 2008
  • Brief overview of methods used to authenticate the sender of an email.
    107 bytes (15 words) - 21:44, 24 November 2008
  • The header lines in every email message, defined in RFC 5322
    97 bytes (13 words) - 10:52, 8 July 2009
  • {{r|Email system}} {{r|Email security}}
    1 KB (163 words) - 02:30, 3 February 2010
  • ...encode graphics, binary data, and other non-text items for inclusion in an email message.
    141 bytes (20 words) - 17:38, 27 August 2009
  • BCP134 - Email Submission Operations: Access and Accountability Requirements [http://iana.org/protocols IANA Protocol Registries] - Registries relevant to email systems
    776 bytes (100 words) - 20:10, 11 February 2010
  • {{r|Email}} {{r|Email system}}
    930 bytes (148 words) - 14:11, 1 October 2009
  • ...ats and encodings used for text, pictures, and various other objects in an email.
    126 bytes (18 words) - 13:15, 25 November 2008
  • {{r|Email system}} {{r|Email authentication}}
    945 bytes (149 words) - 14:36, 1 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SP
    141 bytes (18 words) - 17:56, 29 October 2009
  • [[Email authentication]] method that became a basis of [[Sender Policy Framework|SP
    141 bytes (18 words) - 17:55, 29 October 2009
  • A [[web-based email]] service provided for free by [[Google]] and financed by [[advertising]].
    130 bytes (16 words) - 10:26, 2 May 2010
  • The authentication failures that occur in some popular IP-based [[Email authentication]] methods when a forwarder is involved.
    163 bytes (20 words) - 07:13, 4 November 2009
  • A client-server messaging protocol for [[Email]] which allows messages to be stored indefinitely on the server.
    147 bytes (19 words) - 16:08, 21 January 2023
  • {{r|Email}} {{r|Email system}}
    573 bytes (87 words) - 14:00, 1 October 2009
  • [[Email authentication]] method that verifies the hostname of an [[Simple Mail Tran
    197 bytes (23 words) - 05:06, 26 October 2009
  • {{r|Email system}} {{r|Email}}
    761 bytes (100 words) - 09:48, 22 October 2010
  • ...lies'', are textual context tools for indicating moods or expressions in [[email]], [[irc]], [[instant messenger]], or other [[real-time]] chat communicatio
    203 bytes (24 words) - 04:56, 6 January 2010
  • ...r through the [[Internet Protocol Suite]] and supports applications like [[Email]] and the [[World Wide Web]].
    213 bytes (26 words) - 06:36, 23 November 2009
  • [[Email authentication]] method that verifies a domain name found by a reverse DNS
    157 bytes (22 words) - 18:22, 28 October 2009
  • {{r|Email processes and protocols}} {{r|Email system}}
    698 bytes (88 words) - 18:27, 11 January 2010
  • [[Email authentication]] method that uses a [[Digital signature | digital signature
    157 bytes (20 words) - 10:59, 12 October 2009
  • ...en source implementation of the [[Open PGP]] specification for the [[PGP]] email encryption program.
    141 bytes (18 words) - 00:58, 30 November 2008
  • [[Email authentication]] method that verifies the domain name in a "purported" addr
    156 bytes (20 words) - 05:01, 26 October 2009
  • An [[Email authentication|authentication method]] that verifies the purported sender's
    171 bytes (21 words) - 02:56, 7 December 2009
  • Email authentication method that seeks to correlate the domain name in a "purport
    158 bytes (22 words) - 18:43, 29 August 2009
  • '''Designated Mailers Protocol''' (DMP) is an email authentication method developed by Gordon Fecyk. It became a basis for the
    221 bytes (32 words) - 10:34, 10 December 2009
  • A scheme for email relays to rewrite the Return Address on a forwarded message, allowing the f
    165 bytes (24 words) - 12:01, 5 November 2009
  • [[Email authentication]] method that verifies the domain name in the envelope retur
    165 bytes (21 words) - 05:00, 26 October 2009
  • {{r|Email system}} {{r|Email authentication}}
    707 bytes (110 words) - 18:33, 29 October 2009
  • ...ished in DNS, the [[Domain Name System]].</ref>) are most commonly used by email receivers to screen out spam and other abusive emails flooding the Internet ...ithin hours. Honeypots have addresses that are never used in a legitimate email, but are posted on various websites and other locations where criminals typ
    832 bytes (126 words) - 12:19, 5 November 2009
  • {{r|Email system}} {{r|Email authentication}}
    820 bytes (125 words) - 07:26, 4 November 2009
  • BCP134 - Email Submission Operations: Access and Accountability Requirements 17 other registries related to email
    949 bytes (121 words) - 20:10, 11 February 2010
  • The header lines in every email message, defined in RFC-5322.
    244 bytes (34 words) - 21:06, 30 August 2009
  • .... Extensions to allow encoding of graphics and other non-ASCII content in email message bodies. ...nick, ed., http://tools.ietf.org/html/rfc5322. IETF Draft Standard. Basic email message formats, including headers.
    2 KB (245 words) - 21:49, 19 February 2010
  • {{r|Email}} {{r|Email system}}
    858 bytes (138 words) - 14:06, 1 October 2009
  • Description of the features of various programs allowing users to work with email on their own computers, as opposed to [[Webmail]], where everything is done
    239 bytes (39 words) - 19:55, 23 November 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    909 bytes (144 words) - 14:30, 1 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    909 bytes (144 words) - 14:38, 1 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    918 bytes (146 words) - 14:33, 1 October 2009
  • {{r|Email system}} {{r|Email processes and protocols}}
    938 bytes (145 words) - 16:14, 21 January 2023
  • {{r|Email system}} {{r|Email processes and protocols}}
    939 bytes (148 words) - 14:49, 1 October 2009
  • {{r|Email}} {{r|Web-based email}}
    950 bytes (153 words) - 07:33, 16 March 2010
  • {{r|Email system}} {{r|Email processes and protocols}}
    975 bytes (153 words) - 14:46, 1 October 2009
  • ...notes and citation-sources (references). Please read this page before you email us an article. ...mat, and also ‘.rtf’ files, which most word processors can generate. Just email your article, as an attachment, to '''[mailto:cz-wikiformat@mail.citizendiu
    3 KB (543 words) - 03:08, 25 February 2012
  • ...oval includes edits made until March 12 which Roger Lohmann okayed through email
    477 bytes (48 words) - 19:20, 15 March 2009
  • ...as sent to a great number of groups, the message was said to be 'spam'. As email became more available and popular, advertisers misused it in a manner simil ...ers use various tactics to avoid this &mdash; "throwaway" accounts on free email services, forged headers, "bulletproof" servers that will not disconnect th
    3 KB (541 words) - 16:24, 24 October 2013
  • ...hentication Status", M. Kucherawy. 2009. - IETF Proposed Standard. A new email header field with results of message authentication.
    399 bytes (51 words) - 10:42, 10 December 2009
  • ...y modern mail programs implement Bayesian spam filtering. [[Server-side]] email filters, such as [[SpamAssassin]] and [[Anti-Spam SMTP Proxy|ASSP]], make u ...ny email is spam, divided by the probability of finding those words in any email:
    7 KB (1,096 words) - 19:12, 27 September 2009
  • ...source]] implementation of the [[Open PGP]] specification for the [[PGP]] email encryption program, developed for the [[GNU]] project of the [[Free Softwar
    340 bytes (50 words) - 05:48, 8 April 2024
  • ...ldn't bounce spam and viruses.] - definition of "bounce spam" needed in "Email system" article.
    312 bytes (42 words) - 15:01, 27 January 2023
  • '''Definition:''' Email authentication method that seeks to correlate the domain name in a "purport '''Sender ID''' is an email authentication method that seeks to correlate the domain name in a "purport
    1 KB (209 words) - 19:11, 29 August 2009
  • ...cluding [[Email authentication|authentication records]] for the domain's [[Email system|mail transmitters]]. With reverse DNS, an IP address is used to loo === Email authentication ===
    3 KB (510 words) - 18:05, 28 October 2009
  • ...ts in the system. The reader should also be familiar with the basics of [[Email authentication]] and with the article on [[Reverse DNS]]. '''Forward-Confirmed reverse DNS''' (FCrDNS) is an email authentication method that uses the [[IP address|source IP address]] in a [
    3 KB (562 words) - 17:04, 28 October 2009
  • <!-- The article [[spam (e-mail)]] describe sactually more than just email spam. ...ice: [[chat]]s, [[message board]]s, [[forum]]s, and, especially, through [[email]].
    5 KB (676 words) - 16:39, 10 January 2009
  • {{r|email}}
    211 bytes (27 words) - 00:43, 30 November 2008
  • ...ticle is a [[CZ:Related articles|subtopic]] in a group of articles under [[Email system]]. We assume the reader understands the parent article, its termino Solving the problems of bulk [[email abuse]] (spamming, phishing and other bulk mail scams)
    5 KB (822 words) - 02:42, 3 February 2010
  • [[Hotmail]] is basic email offered as SaaS. Non-free SaaS email, with archiving, additional security, etc,., are offered by a variety of ve
    2 KB (226 words) - 18:58, 10 June 2010
  • ...nick, ed., http://tools.ietf.org/html/rfc5322. IETF Draft Standard. Basic email message formats, including headers. ...erawy, http://tools.ietf.org/html/rfc5451. IETF Proposed Standard. A new email header field with results of message authentication.
    2 KB (223 words) - 07:09, 4 November 2009
  • {{r|Email port 587}}
    279 bytes (38 words) - 12:47, 2 October 2020
  • {{r|Email}}
    472 bytes (61 words) - 02:57, 18 August 2013
  • {{slashtitle|Email challenge/response}} '''Challenge/Response (C/R)''' is a method of filtering spam email.
    1 KB (208 words) - 23:42, 30 September 2009
  • I’ll be happy to sign a release (remainder of email omitted for privacy)...
    445 bytes (75 words) - 12:54, 17 May 2021
  • ...ating the fraud and identity theft that result from phishing, pharming and email spoofing of all types. * [http://www.microsoft.com/athome/security/email/phishing.mspx?ject/ Microsoft]. Advice page on phishing, aimed at casual us
    637 bytes (87 words) - 18:47, 7 February 2009
  • ...(MIME)''' are methods of including binary and other non-text objects in an email, and sending it through a system that will handle only text.
    538 bytes (79 words) - 20:57, 30 August 2009
  • ...(MIME)''' are methods of including binary and other non-text objects in an email, and sending it through a system that will handle only text.
    538 bytes (79 words) - 18:24, 30 August 2009
  • ...or example, instant messaging services may be less formal to the user than email, but still need to be archived for possible litigation or law enforcement d | title = White paper: Solving On-Premise Email Management Services with On-Demand Services
    4 KB (606 words) - 20:02, 24 August 2010
  • This article is a subtopic in a group of articles under Email system. We assume the reader understands the parent article, its terminolog
    514 bytes (66 words) - 21:49, 19 February 2010
  • ...ics of [[Email authentication]] and the roles of different agents in the [[Email system]], as illustrated in this diagram:
    4 KB (610 words) - 17:28, 5 November 2009
  • {{r|Email}}
    526 bytes (69 words) - 16:02, 11 January 2010
  • {{r|Email}}
    595 bytes (75 words) - 08:52, 22 April 2024
  • ...as well as Nietzsche and Kierkegaard. I can also advertise on my blog and email a few folks I know about helping out where they can. [[User:Christopher M.
    457 bytes (83 words) - 13:25, 1 May 2009
  • A good example of a relay is found in every [[Email system]]. Here each relay will store and forward a complete message, after
    588 bytes (98 words) - 12:29, 30 March 2024
  • :Email: bruce.mckain@advocates.org.uk I've been working on getting together a list of email addresses from prominent biology departments, and I will be putting them up
    2 KB (319 words) - 09:43, 19 September 2008
  • {{r|Email}}
    707 bytes (89 words) - 20:09, 29 July 2010
  • {{r|Email}}
    788 bytes (103 words) - 14:59, 20 March 2024
  • {{r|Email system}}
    932 bytes (116 words) - 11:20, 9 December 2009
  • {{r|Email}}
    903 bytes (120 words) - 21:20, 11 January 2010
  • ...erawy, http://tools.ietf.org/html/rfc5451. IETF Proposed Standard. A new email header field with results of message authentication.
    884 bytes (118 words) - 07:22, 4 November 2009
  • {{r|Email system}}
    680 bytes (107 words) - 19:11, 23 September 2009
  • '''Open PGP''' is an [[IETF]] standard for the [[PGP]] email encryption system. The current version, as of late 2008, is RFC 4880 <ref>{
    910 bytes (125 words) - 05:49, 8 April 2024
  • #Open Infrastructure ENUM: The email model, ...astructure ENUM does not require a change in business model except for the email model.
    3 KB (448 words) - 08:04, 19 July 2008
  • {{seealso|Email processes and protocols}} ...and should be understood by anyone involved in the design or operation of email systems.
    11 KB (1,671 words) - 06:06, 29 August 2013
  • {{seealso|Email processes and protocols}} ...and should be understood by anyone involved in the design or operation of email systems.
    11 KB (1,673 words) - 06:07, 29 August 2013
  • * [[Email]]
    870 bytes (136 words) - 08:39, 22 April 2024
  • # <strike>Create the email account that will be used to receive the election ballots.</strike>
    944 bytes (149 words) - 19:09, 29 November 2012
  • {{r|Email processes and protocols}}
    863 bytes (138 words) - 14:17, 1 October 2009
  • {{r|Email processes and protocols}}
    878 bytes (140 words) - 15:05, 1 October 2009
  • '''Definition:''' Email authentication method that verifies the hostname of a client requesting an
    1 KB (154 words) - 19:58, 29 August 2009
  • ::Let me know if I can be of any help, either here or via email. --[[User:Chris Key|Chris Key]] 07:50, 24 April 2010 (UTC)
    858 bytes (140 words) - 13:38, 26 November 2020
  • {{seealso|Email authentication}} for an overview and terminology. ...to the [[Email message headers | headers]] of a message, usually by the [[Email system|Mail Submission Agent]]. The signature provides strong assurance th
    7 KB (1,137 words) - 05:56, 11 December 2009
  • ...service|distributed denial of service]] attacks and sending [[unsolicited email | spam]]. With a large number of infected computers &mdash; the Storm botne | title = A Short Look into a Phishing Email
    5 KB (811 words) - 08:57, 22 April 2024
  • {{r|Email}}
    1 KB (185 words) - 21:09, 22 September 2010
  • JUst got an email from Roger Lohmann authorizing the last several edits and wants the current
    1 KB (193 words) - 11:02, 21 February 2018
  • ...ood feel for how SMTP works, without getting into too much detail. See "[[Email processes and protocols]]" for a typical system in which these commands wou ...thout having to read its contents. This separation of function allows the email system to work reliably and efficiently, without putting any constraints on
    8 KB (1,398 words) - 15:00, 26 September 2009
  • ...seeking funds for expansion. It is more interesting if you can tell it is email, and perhaps yet more if you know the sender and recipient. Is your CEO exchanging email with a venture capital firm? With bankruptcy trustees? With an executive re
    6 KB (943 words) - 05:48, 8 April 2024
  • ...agement Protocol]] (SNMP), [[Network Time Protocol]] (NTP), and internal [[email]]. It may have additional security devices, such as [[network intrusion det
    1 KB (191 words) - 14:50, 14 July 2008
  • In text-only communication such as [[email]], [[chatroom]]s and instant messaging, paralinguistic elements can be disp
    1 KB (176 words) - 08:57, 22 April 2024
  • ...ustrate the use of roles as building blocks in diagrams of various typical email systems.
    4 KB (524 words) - 04:10, 9 December 2009
  • =Email discussions section= ==Email forgery protections==
    11 KB (1,823 words) - 06:54, 1 July 2016
  • {{seealso|Email authentication}} for a general overview and terminology. ...ress]] in a [[TCP]] connection to verify the domain name in the envelope [[Email authentication|Return Address]] with every message. A Pass result provides
    8 KB (1,236 words) - 20:27, 9 December 2009
  • ...ilies", are textual context tools for indicating moods or expressions in [[email]], [[irc]], [[instant messenger]], or other real-time chat communications.
    2 KB (287 words) - 20:12, 20 March 2008
  • ...uce some of the acronyms and jargon needed to understand the literature on email systems. ...them. This is an [[Internet protocol suite|application layer]] view of an email network.
    17 KB (2,712 words) - 15:14, 26 September 2009
  • [[Image:Phishing.JPG|thumb|right|300px|Screenshot of a typical phishing email, purporting to be from ''[[Paypal]]''. The sender's address has been faked. ...ming from the financial institution in question. It will generally employ email spoofing methods to disguise the sender's address and to make it appear as
    12 KB (1,977 words) - 08:55, 22 April 2024
  • ...n of the Eberly College of Arts and Sciences, to Roger A. Lohman, personal email communication, January 29, 2010.</ref> In the years following, he attended ...a Mitchell Canter, Hanifan's only grandchild, to Roger A. Lohman, personal email communication, on September 7, 2009 and September 15, 2009.)</ref>
    5 KB (701 words) - 05:20, 3 September 2013
  • ...n of the Eberly College of Arts and Sciences, to Roger A. Lohman, personal email communication, January 29, 2010.</ref> In the years following, he attended ...a Mitchell Canter, Hanifan's only grandchild, to Roger A. Lohman, personal email communication, on September 7, 2009 and September 15, 2009.)</ref>
    5 KB (701 words) - 05:17, 3 September 2013
  • '''H-War: Military History Network''', founded in March, 1995, is a moderated email-based discussion group and bulletin board for scholars, librarians, and tea
    2 KB (235 words) - 16:52, 19 December 2007
  • ...partial defense against this &mdash; simply getting into your computer and email account does not allow an attacker either to read encrypted emails or to PG
    6 KB (903 words) - 05:49, 8 April 2024
  • #having a confirmed email address ...l usage may be to allow users to move pages once they have confirmed their email address, and then allow them to delete pages once they have also made 90 ed
    7 KB (1,048 words) - 12:00, 18 April 2024
  • ...e vulnerabilities according to their locality in Figure 1 of the article [[Email system]], repeated here for convenience. In each category, we summarize th ...r|700px|'''Figure 1 Actors (Users and Agents) and their roles in an ideal email system.'''}}
    15 KB (2,320 words) - 18:53, 26 December 2010
  • A common use of rot 13 is to hide "spoilers" in [[Usenet news]] postings or [[email]]. If a post gives away something - the ending of a movie or the punchline
    2 KB (325 words) - 20:53, 17 April 2012
  • *Chemical structure package TBD -- I have to find the email in which David Volk told me what he uses.
    2 KB (258 words) - 16:41, 18 September 2020
  • **Imports contacts from email-based applications which have been installed on the computer.
    2 KB (296 words) - 08:58, 22 April 2024
  • | title = Efail: Breaking S/MIME and OpenPGP Email ...ve list of test-cases allowed us to bypass external content blocking in 22 email clients.
    10 KB (1,186 words) - 00:21, 10 February 2024
  • For registration real name and email address are required, but one may choose a nickname which is shown in the f
    2 KB (302 words) - 04:14, 25 October 2009
  • * email ...c mail'. After a while, it became known as 'e-mail'. We now often call it 'email'.
    5 KB (891 words) - 00:37, 8 November 2010
  • **{{r|Email||}}
    3 KB (351 words) - 04:39, 5 April 2024
  • ...be too inefficient and time-consuming. Instead, a secretary monitors an email account on his behalf. He corresponds in "batch mode", such as one day ever | url=http://www-cs-faculty.stanford.edu/~knuth/email.html
    7 KB (1,029 words) - 07:21, 30 September 2007
  • ...le fax to be sent to multiple email addresses and conversely, for a single email to be sent to multiple fax machines.
    9 KB (1,429 words) - 05:16, 1 October 2013
  • ...using bugzilla. The edits made to this page will reflect the fact that the email list (cz-bugs) is used only to initially report a bug or make an enhancemen
    2 KB (309 words) - 13:51, 27 January 2010
  • ...[Pidgin (software)|Pidgin]]) (instant messaging [[client]]) or within an [[email service]] such as [[Gmail]]. Spell checking usually comes with a closest wo
    3 KB (417 words) - 08:57, 22 April 2024
  • #Decrease email response time
    2 KB (351 words) - 10:54, 1 October 2013
  • ...of number +1 555 4242 can be called via SIP at phoneme@example.net and via email at myemail@example.com ...UM enabled agent and indicates what item of information he is looking for (email address, telephone number, web address, etc.) in the PC or terminal the num
    15 KB (2,370 words) - 21:09, 30 September 2013
  • ...different key for each new message in a message-oriented protocol such as email, or for each new connection in a connection-oriented protocol such as [[SSH
    3 KB (459 words) - 05:49, 8 April 2024
  • ...hey have been nominated (for example, Chris and Supten). I suggest that an email should be sent to all of the nominees and ask them to accept or decline. [[ ::I notified Chris by email. [[User:Russell D. Jones|Russell D. Jones]] 17:18, 22 September 2009 (UTC)
    7 KB (1,072 words) - 16:23, 28 September 2009
  • ** [[CZ:Email us an article in word processor format|...or e-mail it in]] * [[CZ:Email us an article in word processor format]] - change "Citizendium" to "the ''C
    7 KB (1,053 words) - 10:45, 7 March 2024
  • ...nts (if they want it to) whenever a post is made, and this email shows the email address of the poster. If we reply there to public folks, our emails will
    6 KB (954 words) - 17:21, 14 September 2013
  • *[[Roy Morgan Research]] - published in the [[Crikey]] email reporting service
    3 KB (423 words) - 22:06, 15 May 2009
  • *''Phishing'' - The use of email or websites to gather personal information by pretending to be a trustworth }}</ref> For example, an ethical hacker may send an email, pretending to be a member of the organizations IT support team in order to
    11 KB (1,785 words) - 03:27, 5 November 2013
  • ...n infrastructure tools, such as [[Simple Mail Transfer Protocol]] (SMTP) [[email]] servers, [[World Wide Web]] performance accelerators such as [[web cache]
    3 KB (456 words) - 15:00, 20 March 2024
  • '''Response from Captain Roger Blomquist''', United States Navy (retired)] email 12 Dec 2023:<br> ...ent, [https://www.ccnr.org Canadian Coalition for Nuclear Responsibility], email Mar 25, 2024:<br>
    7 KB (1,106 words) - 18:29, 5 May 2024
  • '''Response''' from Captain Roger Blomquist, United States Navy (retired) email 8 May 2023:<br> '''Response''' from Captain Roger Blomquist, United States Navy (retired) email 8 May 2023:<br>
    7 KB (1,065 words) - 11:05, 7 July 2023
  • ...stated we could use Skype "for troubleshooting". I will clear things up by email. [[User:Stephen Ewen|Stephen Ewen]] 02:26, 6 May 2007 (CDT) ...sy to include links to on-wiki content (although I know they can be put in email too, as URL's). [[User:J. Noel Chiappa|J. Noel Chiappa]] 11:48, 12 April 20
    8 KB (1,357 words) - 11:58, 7 March 2024
  • ...ow contributer', so take it up the workgoup ladder and EIC or even through email. [[User:D. Matt Innis|D. Matt Innis]] 04:08, 16 January 2009 (UTC) ...hp?action=search2 forum] shows no such exchange regarding the notion of an email privacy waiver when contacting a Constable.
    15 KB (2,530 words) - 10:46, 7 March 2024
  • ...s soon as the editor click the "Save" button. In MS word, user must either email the file as an attachment or use a thumb drive to deliver his file and wait
    3 KB (530 words) - 22:41, 19 February 2010
  • ...mber of security systems that are hybrid cryptosystems &mdash; [[PGP]] for email, [[TLS]] for the web, [[SSH]] for remote login, [[IPsec]] as a general prot
    3 KB (544 words) - 05:49, 8 April 2024
  • ...er called ''Phoenix'' that removed most of the bloat from the Suite: the [[email]], [[USENET]] and IRC clients, the address book and calendar. Instead, they
    3 KB (474 words) - 08:43, 22 April 2024
  • ...sting expenses shown here. Occasionally, there are other expenses such as email hosting et al.
    4 KB (509 words) - 10:07, 1 January 2023
  • In 2004, he sent an email to MoveOn supporters regarding the [[Democratic Party (United States)]], <b
    3 KB (499 words) - 08:06, 23 February 2024
  • ...t the first clearly identifiable spam, admittedly on Usenet rather than in email. <ref>{{citation
    4 KB (559 words) - 07:30, 18 March 2024
  • ...Yahoo! Mail. This is very similar to how [[Google]] integrated Gmail (its email service) and Google Talk (its instant-messenger service) about one year ear
    4 KB (598 words) - 19:29, 1 August 2010
  • '''Email''': harry.instructor (at) email.com
    5 KB (707 words) - 11:53, 14 February 2021
  • :::# Signup is ''extremely'' simple. Give us your name and a email address. Welcome to Citizendium!
    4 KB (615 words) - 03:53, 11 April 2011
  • ...e, the contents of a database, log files (usually stored in ''/var/log''), email stored on a server, etc.
    4 KB (692 words) - 19:24, 26 July 2008
  • ...sting expenses shown here. Occasionally, there are other expenses such as email hosting et al.
    5 KB (619 words) - 10:08, 1 January 2023
  • ...ation|classification of text into several categories]] (e.g. spam/non-spam email messages), the [[handwriting recognition|automatic recognition of handwritt
    5 KB (628 words) - 15:27, 25 April 2008
  • ...et services to each student, faculty and staff member, as well as a campus Email account.
    4 KB (525 words) - 07:45, 26 March 2024
  • ...were gateways for specific projects, mostly from military to nonmilitary. Email could still pass fairly freely. There were a wide range of internal militar ...("Because it's time" Network) or the academic CSNET, it might simply be an email, and possibly file, gateway. CSNET, incidentally, was NSF-funded, but for d
    17 KB (2,484 words) - 17:02, 22 March 2024
  • <ref name=Backstrom>Personal communication by email dated May 29, 2011 from Hans Backström, the air quality product manager at
    5 KB (715 words) - 13:28, 31 May 2011
  • ...is the real one. A common phishing technique is to send an HTML-formatted email|electronic mail message, which appears to have a link to the real server. U ...was in place at a given company an employee could deny sending his boss an email saying "I quit" all he wants, but due to specific technology implemented on
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...le attention amongst my geneticist colleagues etc. I wrote Dr. Tan a long email which I copied to Larry trying to get HIM to do some basic editing of the t
    4 KB (678 words) - 15:41, 17 April 2008
  • Jay Lim of Wikileaks sent an email of complaint to Aftergood, which Aftergood published on his blog. <blockquo
    5 KB (765 words) - 07:36, 18 March 2024
  • ...ground articles, not within the scope of your courseware, mention it here, email, or put it on my talk page.
    4 KB (741 words) - 17:36, 12 August 2008
  • .... Or they could ask for assistance from Internet companies, say asking his email provider for information, asking Twitter for a list of his followers, Faceb
    11 KB (1,766 words) - 09:26, 31 October 2015
  • ...] systems on an internal network allowing users within one organization to email each other.
    17 KB (2,760 words) - 11:50, 2 February 2023
  • This is a monthly email with separate classified and unclassified sections, focusd militarily or s
    6 KB (756 words) - 01:39, 24 October 2010
  • ::Hmmm. Dr. McTestertester's email stated "We're delighted to welcome you to the Citizendium '''as an author''
    5 KB (852 words) - 19:20, 7 January 2008
  • ...'' tended to be garbled in the transmission. Similarly, the terseness of [[email]] and [[chat rooms]] produced the need for the [[emoticon]]. ...changes between larger numbers of people (many-to-many communication via [[email]], internet forums). On the other hand, many traditional broadcast media an
    15 KB (2,070 words) - 08:57, 22 April 2024
  • ...of CZ's reputation. Most of the time, though, it only involves sending an email or two. [[User:Anton Sweeney|Anton Sweeney]] 10:27, 29 August 2007 (CDT)
    4 KB (704 words) - 05:02, 8 March 2024
  • The ''Miami Herald'' quoted an email from Gordon's superior, Colonel [[David Lapan]], where he characterized Gor
    6 KB (860 words) - 14:52, 15 April 2024
  • ...can say that it is still one of my career highlights,{{'}} Goldie said via email, who was signed at the age of 13.
    7 KB (844 words) - 12:22, 19 August 2022
  • ...are not necessarily considered to be part of the World Wide Web, such as [[email]], instant messaging or digital telephony. ...tocol, was no longer free to use.<ref>{{cite newsgroup|senddate=1993-03-11|email=http://www.nic.funet.fi/pub/vms/networking/gopher/gopher-software-licensing
    12 KB (1,802 words) - 08:48, 22 April 2024
  • ...in a beta testing phase until July 9th, 2009. Beginning with 5GB of free email storage, which was unheard of at that time, it slowly grew to 15GB (shared
    14 KB (2,069 words) - 10:08, 28 February 2024
  • ...s. In many cases, it will be preferable to actively solicit opinions (with email, on User talk: pages, etc.) than to wait passively for feedback. While you
    6 KB (914 words) - 07:34, 27 August 2013
  • In an email confirmed by the U.S. Atlantic Fleet, an officer of the ''Churchill'' descr
    5 KB (843 words) - 15:41, 8 April 2024
  • ...seeing if CZ wants this? I do not know how easy it is to install. Should I email tech group or Larry, etc? - [[User:Robert Badgett|Robert Badgett]] 14:22, 2
    6 KB (952 words) - 10:09, 26 June 2008
  • ...lay only when the user asks for encryption, for example applying PGP to an email message (instead of sending in the clear), logging in to a remote system wi ...been some recent work on an opportunistic end-to-end encryption system for email called STEED for "Secure Transmission of Encrypted Electronic Data"[http://
    14 KB (2,265 words) - 05:49, 8 April 2024
  • ...whatever). (3) is easy. (2) and (4) would have to be modified, replaced by email or something. [[User:Peter Jackson|Peter Jackson]] 08:49, 29 August 2014 (U
    6 KB (1,055 words) - 18:21, 18 September 2014
  • ...components such as firewall, spyware protection, phishing protection, and email spam protection. Those who opt for the simple single purpose or free AV pa
    6 KB (907 words) - 05:49, 8 April 2024
  • ...law Jessica, Vanessa and Katy Mulroney, the Shoebox Project began with an email to close friends. It took off like wildfire, and news traveled word of mou
    7 KB (990 words) - 23:24, 4 January 2024
  • FPI publishes an ''Overnight Brief'' news summary distributed by email.
    6 KB (867 words) - 12:45, 12 May 2024
  • ...is thought to have been exacerbated by the expansion of the Internet and [[email]] from academia into the business world, by the development of the [[World [[Email]] is one of the prime candidates as a factor in information overload and bo
    14 KB (2,131 words) - 08:39, 22 April 2024
  • ...-Chief, and its sole purpose is to offer him *informal* advice by off-line email. As Larry says on the page, the members were chosen "from '''among''' the m
    6 KB (1,059 words) - 12:39, 2 November 2009
  • ...nternet applications, and in 1985 developed the world's first e-zine via [[Email|e-mail]].<ref>{{cite web | url=http://www.amazon.com/Piero-Scaruffi/e/B002U
    7 KB (965 words) - 10:22, 27 March 2023
  • ...are flooding attacks; if an attacker sends you 10,000 emails, your normal email will likely not get through. 100,000,000 might take out not only your perso
    6 KB (1,051 words) - 05:48, 8 April 2024
  • ...y of Rutherford's release. But his brother Brian shared his happiness, via email. Dion's press release thanked the government of Qatar for their help.
    8 KB (1,029 words) - 07:28, 18 March 2024
  • ...time to perform [[word processing]], [[internet]] browsing, [[fax]]ing, [[email]] and other digital messaging, [[multimedia]] playback, [[Computer and vid ...ny traits with other portable computers. They are often used for checking email or calendering, but lack the versatility of computers, and are limited in t
    15 KB (2,382 words) - 08:45, 22 April 2024
  • | quote = The email was sent by Navy Cmdr. Anne Leanos. She's the Pentagon's new public affairs
    9 KB (1,079 words) - 09:16, 3 May 2024
  • '''Pretty Good Privacy''' or '''PGP''' is a [[hybrid cryptosystem]] for [[email]] security, originally developed by [[Phil Zimmermann]].
    7 KB (1,143 words) - 05:49, 8 April 2024
  • * security exploits that use email and Web to get through the perimeter
    7 KB (1,055 words) - 05:49, 8 April 2024
  • Should there be an email address that questions can be addressed to for non-citizens? I would think
    7 KB (1,189 words) - 09:55, 29 October 2010
  • ...the public key algorithm provides other services. For example, in [[PGP]] email encryption the sender generates a random key for the symmetric bulk encrypt
    8 KB (1,233 words) - 05:48, 8 April 2024
  • ...author of [https://gordianknotbook.com Why Nuclear Power Has Been A Flop] email 14 July 2023:<br> '''Response''' from Captain Roger Blomquist, United States Navy (retired)] email 21 Aug 2023:<br>
    21 KB (3,132 words) - 16:09, 27 April 2024
  • ...on-subcribers, though. (Although perhaps we need to slightly obfuscate the email address here, to prevent web-walkers from 'harvesting' it. [[User:J. Noel C
    8 KB (1,333 words) - 18:00, 16 June 2022
  • * [[CZ:Email us an article in word processor format]] - change "Citizendium" to "the ''C
    8 KB (1,458 words) - 10:46, 7 March 2024
  • ...o me quoting his book "Spinoza's Ethics: An Introduction" extensively (via email). So I removed the quotes and references and put things in my own words. Th
    7 KB (1,273 words) - 10:15, 4 June 2022
  • ...include navigation, finding fish, collision avoidance, routine voice and email communications, etc. |Dedicated with phone, fax, email
    24 KB (3,694 words) - 10:10, 24 August 2010
  • The site enables each user to auto-generate an email template to the appropriate representative and make their opinions known.
    8 KB (1,350 words) - 15:22, 8 April 2023
  • ...ch they consult a medical practitioner. Most enquiries are made by mail or email, however, and most are dealt with by the MP's office staff. (In April 2010,
    9 KB (1,436 words) - 08:20, 7 March 2012
  • To apply send an email of interest to [mailto:personnel@citizendium.org personnel@citizendium.org] ...on of servers. Any quirks or strange happenings please report to bugs @ cz email address. Also, our hosting provider is doing network upgrades which may mak
    17 KB (2,618 words) - 05:02, 8 March 2024
  • ...ce as reading a printed product. The tone of good web writing grows out of email. It's more direct, personal, colloquial, urgent, witty, efficient. It doesn
    8 KB (1,186 words) - 15:04, 15 April 2024
  • ..."Security controls for email must be strengthened, and we are adding some email specific features to the Trusted Internet Connections that will allow us to
    20 KB (2,779 words) - 13:29, 20 March 2023
  • :I don't think it's unreasonable to ask that. Most US universities give email addresses to students and faculty free of charge. Even though some people
    8 KB (1,343 words) - 21:51, 27 March 2007
  • ...int, I think, is very straightforward, although you may want this to go to email. The policy on this CZ page says to put comments below the comment to which While I am used to embedding responses in the body of email, where there are textual ways to distinguish who said what, I have learned
    33 KB (5,693 words) - 10:45, 7 March 2024
  • *I'm ''off-duty'' for a few days. I'm answering the occasional email etc. but that's it. Thanks, [[User:Peter Hitchmough|Peter Hitchmough]].
    10 KB (1,525 words) - 09:09, 6 April 2015
  • ...elopment. Among the other projects they have been involved in were PGP for email privacy, FreeSWAN | FreeS/WAN for opportunistic encryption of the whole net }}</ref> looked at an FBI scheme for monitoring email.
    35 KB (5,430 words) - 07:27, 18 March 2024
  • ...Post Office Protocol(POP)]] servers via [[TLS]], and can send and receive email encrypted with [[S/MIME]]. ...software contains such extensive cryptography systems. These browsers and email programs are so ubiquitous that even governments whose intent is to regulat
    20 KB (2,946 words) - 05:49, 8 April 2024
  • Jason Carter, in an email message in 2023, described the type of Buddhism he ascribes to, and this me
    10 KB (1,514 words) - 12:45, 27 March 2024
  • ...n, Children's Division, 63 Inverness Drive East, Englewood, CO 80112-5117. Email http://www.amerhumane.org
    11 KB (1,671 words) - 10:54, 11 June 2009
  • ...)]</ref> There has been talk in the US of charges under the Espionage Act. Email revealed by an Anonymous (group)|Anonymous hack on the private security fir
    14 KB (1,922 words) - 07:31, 18 March 2024
  • ...tat.cmu.edu/R/CRAN/doc/FAQ/R-FAQ.html</ref>. A few of the packages have a email discussion lists including R<ref>R-help -- Main R Mailing List: Primary hel ...ws Vista, the output is saved<ref>Re: using results of pspp, error report. Email thread about PSPP error handling, Pspp-users -- PSPP user discussion. April
    24 KB (3,731 words) - 08:40, 1 September 2013
View (previous 250 | ) (20 | 50 | 100 | 250 | 500)