The Newest Front in the Anti-Spam Wars

Published: 9 September 2003 y., Tuesday
As spammers dream up new strategies for slithering into e-mail inboxes worldwide, their counterparts, anti-spam software developers, are always on the lookout for new ways to stop them cold. A bevy of companies think they may have a good answer in challenge-response technology . The tactic is a simple one, requiring an e-mailer to verify his or her identity before being added to a "white list" that enables him or her to send e-mail unrestricted in the future, but the technology is not perfect yet. Some anti-spam advocates fret that the technique is too cumbersome or not entirely effective. However, amid a surge of user desperation nearly as powerful as the flood of spam sweeping across the Internet, the tactic's growing popularity speaks for itself. Will challenge-response emerge as the next big spam killer? The most common method of stopping unsolicited e-mail in its tracks is filtering, which lets individuals and IT administrators cull legitimate messages from the ever-growing sea of spam. Challenge-response works differently. Rather than using a multitude of rules to determine what may or may not be spam, the software takes the approach of a club bouncer to keep undesirables out. When e-mail arrives from an unknown sender, challenge-response software sends back a message asking the sender to identify himself. If the sender is legitimate, he then types a one-word response and is allowed through the barrier for good. With most challenge-response programs, a single verification in a given domain is enough to let a sender transmit messages to anyone within that domain.
Šaltinis: E-Commerce Times
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

DEA awards e-commerce contract

The Drug Enforcement Administration announced Nov. 26 that it has awarded a $6 million, two-year contract to PEC Solutions Inc. more »

Small victory

Via takes early round in graphics dispute with Intel more »

A trial date

Russian programmer gets April court date more »

Hardcore About Blocking Porn

The most people agree that work is the worst place for it to arrive. more »

Hardware vendors seek Web services opportunities

A host of IT vendors are jumping on the Web-based services bandwagon as hardware vendors realize the additional margins available from helping companies manage hardware from PCs to printers. more »

FBI software cracks encryption wall

‘Magic Lantern’ part of new ‘Enhanced Carnivore Project’ more »

E-Commerce Getting Ready for a Lean, Mean 2002

E-businesses are putting tech spending and other elements of their organizations on a much shorter leash in an effort to get ready for 2002, analysts say. more »

search.lt news

search.lt presents newest links more »

The report

Internet An Ideal Tool For Extremists - FBI more »

IT spend up 1% in 2001 - IDC

The "perfect storm" of the 11 September terrorist attacks, slowing global economy, and the telecommunications supply-demand mismatch, means that worldwide IT spending will only increase one per cent in 2001. more »