Anti-spam techniques/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>David MacQuigg No edit summary |
Pat Palmer (talk | contribs) mNo edit summary |
||
Line 1: | Line 1: | ||
{{subpages}} | |||
{{TOC|right}} | {{TOC|right}} | ||
==Parent topics== | ==Parent topics== |
Revision as of 08:23, 27 November 2022
- See also changes related to Anti-spam techniques, or pages that link to Anti-spam techniques or to this page or whose text contains "Anti-spam techniques".
Parent topics
- Email system [r]: General overview of how the Internet electronic mail system works. [e]
- Spam (e-mail) [r]: Add brief definition or description
Subtopics
Granularity
Methods
- IP blacklist [r]: A list of known web site addresses that are considered off limits or dangerous. [e]
- Email greylisting [r]: A spam prevention method in which the receiving mail server rejects a message the first time it is received. [e]
- Email challenge-response [r]: An authentication method that verifies the purported sender's address by sending a challenge to that address. [e]
- Whitelisting [r]: Add brief definition or description
- Port filtering [r]: Add brief definition or description
- Closed relays [r]: Add brief definition or description
Related topics
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
- Botnet [r]: A set of compromised computers which can collectively provide services to a "bot herder". [e]
- Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]