Rather than using a multitude of rules to determine what may or may not be spam, challenge-response software takes the approach of a club bouncer to keep undesirables out of users' inboxes
Published:
9 September 2003 y., Tuesday
As spammers dream up new strategies for slithering into e-mail inboxes worldwide, their counterparts, anti-spam software developers, are always on the lookout for new ways to stop them cold. A bevy of companies think they may have a good answer in challenge-response technology .
The tactic is a simple one, requiring an e-mailer to verify his or her identity before being added to a "white list" that enables him or her to send e-mail unrestricted in the future, but the technology is not perfect yet. Some anti-spam advocates fret that the technique is too cumbersome or not entirely effective.
However, amid a surge of user desperation nearly as powerful as the flood of spam sweeping across the Internet, the tactic's growing popularity speaks for itself. Will challenge-response emerge as the next big spam killer?
The most common method of stopping unsolicited e-mail in its tracks is filtering, which lets individuals and IT administrators cull legitimate messages from the ever-growing sea of spam.
Challenge-response works differently. Rather than using a multitude of rules to determine what may or may not be spam, the software takes the approach of a club bouncer to keep undesirables out.
When e-mail arrives from an unknown sender, challenge-response software sends back a message asking the sender to identify himself. If the sender is legitimate, he then types a one-word response and is allowed through the barrier for good. With most challenge-response programs, a single verification in a given domain is enough to let a sender transmit messages to anyone within that domain.
Šaltinis:
E-Commerce Times
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Virus writer and hacker activity has stepped up dramatically since the U.S. and U.K. armed forces started their war against Iraq
more »
A top EU commissioner has been banging on about the importance of eGovernment
more »
But within hours, firm suffers denial of service attack
more »
Commercial Alliance-Bank will be the first among RK banks implementing a transaction through international chip cards "Visa Smart Debit & Credit (VSDC)" through single processing center
more »
All those interested in British-Polish economic issues now have a new Internet site www.bpcc.org.pl
more »
Minsk to Welcome Belarusian Congress on Telecommunications, Information and Banking Technologies
more »
A drop in federal funding could delay some projects under the Electronic Russia program, which aims to boost the use of information technology throughout the country, the Communications Ministry said Tuesday
more »
The European Commission is consulting its 15 national member governments over a draft decision to pick a Belgian-led consortium to run the long-awaited .eu top-level domain name registry
more »
Previously undiscovered flaw used to attack Army Web site
more »
Wincor Nixdorf presents a range of propositions with the spotlight focused on the specific needs and problems facing the banking industry under the key headings of Branch, Multichannel and Cash Management
more »