NOTICE: Citizendium is still being set up on its newer server, treat as a beta for now; please see here for more.
Citizendium - a community developing a quality comprehensive compendium of knowledge, online and free. Click here to join and contribute—free
CZ thanks our previous donors. Donate here. Treasurer's Financial Report -- Thanks to our content contributors. --

Search results

Jump to: navigation, search

Page title matches

  • ...blocklists, blackhole lists, or DNSBL's<ref>DNSBL is an acronym meaning a BlackList that is published in DNS, the [[Domain Name System]].</ref>) are most commo ...tes and other locations where criminals typically "harvest" addresses. IP blacklists are most useful in efficiently blocking high-volume and persistent sources
    832 B (126 words) - 17:19, 5 November 2009
  • 116 B (17 words) - 05:03, 1 October 2009
  • [http://en.wikipedia.org/wiki/DNSBL DNS Blacklist] - WP article
    77 B (12 words) - 17:20, 5 November 2009
  • 909 B (144 words) - 19:30, 1 October 2009

Page text matches

  • ...blocklists, blackhole lists, or DNSBL's<ref>DNSBL is an acronym meaning a BlackList that is published in DNS, the [[Domain Name System]].</ref>) are most commo ...tes and other locations where criminals typically "harvest" addresses. IP blacklists are most useful in efficiently blocking high-volume and persistent sources
    832 B (126 words) - 17:19, 5 November 2009
  • ...dozens of other addresses (perhaps a chain letter). If any one of those recipient's computers is infected, these cc'd addresses can be "harvested". ...computer lab), and the traffic is light enough that it takes no special equipment to extract the right data packets. If these packets are plain text (no
    15 KB (2,320 words) - 23:53, 26 December 2010
  • ...elisting]] by individual recipients when there is a pre-existing relationship. ...atistics on each identity are too sparse. Nevertheless, [[IP blacklist|IP blacklists]] are useful in efficiently blocking high-volume and persistent sources, a
    5 KB (822 words) - 07:42, 3 February 2010
  • ...blocks are processes that handle the message on its way from Author to Recipient. The links between blocks are [[Transmission Control Protocol|TCP conn ...tion. It may be something as simple as consolidation of the mail from multiple departmental servers to one corporate server.
    17 KB (2,712 words) - 20:14, 26 September 2009
  • {{r|IP blacklist}}
    323 B (40 words) - 17:34, 5 November 2009
  • Auto-populated based on [[Special:WhatLinksHere/IP address]]. Needs checking by a human. {{r|IP blacklist}}
    581 B (76 words) - 22:22, 11 January 2010
  • On the other hand, a delay will always give more time for new sources to be blacklisted. ...y from a different IP is most likely with large organizations that use multiple transmitters.
    846 B (129 words) - 10:38, 3 November 2013
  • ...to perform a recursive sequence of database lookups with both the sender's IP address and given e-mail address after the 'MAIL FROM' command in the SMTP ...by e-mail. At first, spammers used their own sender addresses, which were blacklisted soon. Later they used random sender addresses, but again this could easil
    41 KB (6,790 words) - 08:36, 17 October 2013
  • ...plained by looking separately at different perspectives, applying the principle of [[Separation of concerns|separation of concerns]]. There are two coeq ...P/IP, and the functionality of routers is entirely encapsulated within the IP layer of this [[Internet Protocol Suite | protocol stack]]. We can ignore
    11 KB (1,671 words) - 11:06, 29 August 2013
  • ...plained by looking separately at different perspectives, applying the principle of [[Separation of concerns|separation of concerns]]. There are two coeq ...P/IP, and the functionality of routers is entirely encapsulated within the IP layer of this [[Internet Protocol Suite | protocol stack]]. We can ignore
    11 KB (1,673 words) - 11:07, 29 August 2013
  • A Border shows where there is no prior relationship between Agents. --> Direction of mail flow (no statement as to relationship)
    4 KB (524 words) - 09:10, 9 December 2009
  • ...d revealing diplomatic material which critics say needs to be private for diplomats to function. More generally, critics contend that not all secrets sho ...w if that is legitimate? If too much is revealed, how are the military or diplomats to function?
    70 KB (10,269 words) - 23:37, 7 April 2014