Anti-spam techniques/Related Articles: Difference between revisions
Jump to navigation
Jump to search
Pat Palmer (talk | contribs) mNo edit summary |
No edit summary |
||
Line 21: | Line 21: | ||
{{r|Botnet}} | {{r|Botnet}} | ||
{{r|Denial of service}} | {{r|Denial of service}} | ||
==Articles related by keyphrases (Bot populated)== | |||
{{r|Key management}} | |||
{{r|Email}} |
Latest revision as of 06:01, 11 July 2024
- See also changes related to Anti-spam techniques, or pages that link to Anti-spam techniques or to this page or whose text contains "Anti-spam techniques".
Parent topics
- Email system [r]: General overview of how the Internet electronic mail system works. [e]
- Spam (e-mail) [r]: Add brief definition or description
Subtopics
Granularity
Methods
- IP blacklist [r]: A list of known web site addresses that are considered off limits or dangerous. [e]
- Email greylisting [r]: A spam prevention method in which the receiving mail server rejects a message the first time it is received. [e]
- Email challenge-response [r]: An authentication method that verifies the purported sender's address by sending a challenge to that address. [e]
- Whitelisting [r]: Add brief definition or description
- Port filtering [r]: Add brief definition or description
- Closed relays [r]: Add brief definition or description
Related topics
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Botnet [r]: A set of compromised computers which can collectively provide services to a "bot herder". [e]
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]