Email filtering

Results: 1836



#Item
431Cryptographic protocols / Computer security / Computing / Yahoo! / Electronic documents / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Domain Name System / Email authentication / Spam filtering / Cryptography

Internet Engineering Task Force (IETF) Request for Comments: 6541 Category: Experimental ISSN: M. Kucherawy

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-02-29 13:57:51
432Internet / Email / Anti-spam techniques / Spamming / S/MIME / Computer appliance / Computing / Technology / Spam filtering

www.astaro.com Astaro Security Gateway Mail Security

Add to Reading List

Source URL: www.astaro.com

Language: English - Date: 2009-09-15 09:54:23
433Computer-mediated communication / Spam filtering / Spamming / Content-control software / Internet safety / Lightspeed Systems / Spam / Anti-spam techniques / Mobile business intelligence / Internet / Computing / Email

Web Filter Protect students with CIPA-compliant, safe access to the Web. You get flexible policies, SSL inspection, cross-platform mobile filtering on and off the network, and infinite scalability.

Add to Reading List

Source URL: files.lightspeedsystems.com

Language: English - Date: 2015-04-13 11:46:40
434Computing / Internet / Spamming / Spam filtering / Online chat / Message transfer agent / Email / Computer-mediated communication / Port

3.Simple Execution Model This section describes a simple execution model for Joule. It is intended to describe the rules that all Joule computations must follow, and to give the reader an intuition of how Joule computat

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:55
435Internet Relay Chat / Online chat / Email / Spamming / Spam filtering / Anti-spam techniques / Computing / Internet / Computer-mediated communication

5.Language Definition This chapter presents a complete description of the present state of the Joule language design. First, the computational primitives are described, along with typical techniques for their use. This

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:57
436Email / Computer security / Spamming / Cryptographic protocols / DomainKeys Identified Mail / Sender Policy Framework / Anti-spam techniques / Barry Leiba / DomainKeys / Spam filtering / Email authentication / Computing

www.computer.org/internet computing An Introduction to Internet Standards Barry Leiba Vol. 12, No. 1

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2012-03-08 10:28:00
437Computing / Internet / Spam filtering / Television / Email / Jem / Mail

(Proposal Cover Page Submitted for JEM/SMILES RA) Proposal Number: (TBD on Submit) 1. Information on Principal Investigator

Add to Reading List

Source URL: smiles.tksc.jaxa.jp

Language: English - Date: 2013-04-15 01:52:13
438Computing / Spam filtering / Internet / Whitelist / Feedback loop / Email marketing / Sender Policy Framework / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Spamming

Understanding & Improving Email Deliverability Table of Contents What is Email Deliverability?

Add to Reading List

Source URL: www.vision6.com.au

Language: English - Date: 2012-01-11 18:09:52
439Message queue / Transmission Control Protocol / Internet Message Access Protocol / Message-oriented middleware / Spam filtering / Advanced Message Queuing Protocol / Simple Mail Transfer Protocol / Computing / Inter-process communication / Email

Solution: Versions supported: Description: Microsoft Exchange

Add to Reading List

Source URL: www.heroix.com

Language: English - Date: 2008-03-10 15:37:53
440Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:55
UPDATE