Rather than using a multitude of rules to determine what may or may not be spam, challenge-response software takes the approach of a club bouncer to keep undesirables out of users' inboxes
Published:
9 September 2003 y., Tuesday
As spammers dream up new strategies for slithering into e-mail inboxes worldwide, their counterparts, anti-spam software developers, are always on the lookout for new ways to stop them cold. A bevy of companies think they may have a good answer in challenge-response technology .
The tactic is a simple one, requiring an e-mailer to verify his or her identity before being added to a "white list" that enables him or her to send e-mail unrestricted in the future, but the technology is not perfect yet. Some anti-spam advocates fret that the technique is too cumbersome or not entirely effective.
However, amid a surge of user desperation nearly as powerful as the flood of spam sweeping across the Internet, the tactic's growing popularity speaks for itself. Will challenge-response emerge as the next big spam killer?
The most common method of stopping unsolicited e-mail in its tracks is filtering, which lets individuals and IT administrators cull legitimate messages from the ever-growing sea of spam.
Challenge-response works differently. Rather than using a multitude of rules to determine what may or may not be spam, the software takes the approach of a club bouncer to keep undesirables out.
When e-mail arrives from an unknown sender, challenge-response software sends back a message asking the sender to identify himself. If the sender is legitimate, he then types a one-word response and is allowed through the barrier for good. With most challenge-response programs, a single verification in a given domain is enough to let a sender transmit messages to anyone within that domain.
Šaltinis:
E-Commerce Times
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Email churn surges into the tens of billions
more »
Experts say the Nimda virus spreads through e-mail, vulnerable servers, and the Internet via open network sharing features and altered Web pages.
more »
Hackers have begun attacking Web sites connected to Afghanistan's Taliban rulers and to other Islamic nations
more »
Corporate altruism is replacing shock as some tech companies offer free services and bandwidth to businesses affected by last week's attacks.
more »
In an apparent response to terrorist attacks on America, a notorious hacker known as "Fluffi Bunni" defaced potentially tens of thousands of high-profile Web sites, replacing their home pages with a rant about religion, capitalism, and violence.
more »
U.S. consumers are more likely to revisit Web sites that are fast loading, customizable and more informative than those that offer rich media or content delivery to wireless handsets, according to research by Jupiter Media Metrix.
more »
Entertainment industry lobbyists say programmers and open-source activists should not be alarmed by a controversial proposal to embed copy-protection controls in nearly all PCs and consumer electronic devices.
more »
Homegrown instant messaging start-up Odigo, Inc. has scored a lucrative deal to develop and power "MTV Messenger", a new IM communications tool for MTV-owned Web sites in Europe.
more »
search.lt presents newest links
more »
A South Korean Internet portal has filed a complaint with fair trade regulators, alleging Microsoft is shutting out competition by tying a range of application software into its new Windows operating system.
more »