The Newest Front in the Anti-Spam Wars

Published: 9 September 2003 y., Tuesday
As spammers dream up new strategies for slithering into e-mail inboxes worldwide, their counterparts, anti-spam software developers, are always on the lookout for new ways to stop them cold. A bevy of companies think they may have a good answer in challenge-response technology . The tactic is a simple one, requiring an e-mailer to verify his or her identity before being added to a "white list" that enables him or her to send e-mail unrestricted in the future, but the technology is not perfect yet. Some anti-spam advocates fret that the technique is too cumbersome or not entirely effective. However, amid a surge of user desperation nearly as powerful as the flood of spam sweeping across the Internet, the tactic's growing popularity speaks for itself. Will challenge-response emerge as the next big spam killer? The most common method of stopping unsolicited e-mail in its tracks is filtering, which lets individuals and IT administrators cull legitimate messages from the ever-growing sea of spam. Challenge-response works differently. Rather than using a multitude of rules to determine what may or may not be spam, the software takes the approach of a club bouncer to keep undesirables out. When e-mail arrives from an unknown sender, challenge-response software sends back a message asking the sender to identify himself. If the sender is legitimate, he then types a one-word response and is allowed through the barrier for good. With most challenge-response programs, a single verification in a given domain is enough to let a sender transmit messages to anyone within that domain.
Šaltinis: E-Commerce Times
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Lindows faces a reality check

Lindows.com, the Linux operating system maker, is being forced to re-evaluate its strategy to lure the average computer user away from Windows more »

Cyberterrorism Concerns IT Pros

Threats of terrorism concern IT professionals, and almost half of those surveyed indicated that a major cyber attack on the U.S. government could be imminent more »

search.lt news

search.lt presents newest links more »

Wearable Security Locks Laptop Data

If a user wearing the system's security token walks away from his or her laptop, the system senses it and begins securing the computer by encrypting all data more »

Russia, Iraq May OK 40 Billion US Dollars Deal

Iraq and Russia are close to signing a US$40 billion economic cooperation plan, Iraq's ambassador said Saturday more »

search.lt news

search.lt presents newest links more »

Gold medalists to sue US media

Russian figure skating champions Anton Sikharulidze and Yelena Berezhnaya have voiced their intention to sue US media companies for libel more »

Microsoft finds Content Management Server holes

Microsoft has released a patch for three vulnerabilities, one of which is "critical," in its Content Management Server 2001 product for building and maintaining Web sites. more »

DOD, Army testing biometrics

The Defense Department's Biometrics Management Office (BMO) and the Army's Communications-Electronics Command (Cecom) are partnering to test the integration of fingerprint technology into the Army's tactical Network Operations Center-Vehicle more »

The CAD 3D Working Group

ParallelGraphics Joins Forces with Leading Technology Companies to Establish the CAD 3D Working Group more »