Rather than using a multitude of rules to determine what may or may not be spam, challenge-response software takes the approach of a club bouncer to keep undesirables out of users' inboxes
Published:
9 September 2003 y., Tuesday
As spammers dream up new strategies for slithering into e-mail inboxes worldwide, their counterparts, anti-spam software developers, are always on the lookout for new ways to stop them cold. A bevy of companies think they may have a good answer in challenge-response technology .
The tactic is a simple one, requiring an e-mailer to verify his or her identity before being added to a "white list" that enables him or her to send e-mail unrestricted in the future, but the technology is not perfect yet. Some anti-spam advocates fret that the technique is too cumbersome or not entirely effective.
However, amid a surge of user desperation nearly as powerful as the flood of spam sweeping across the Internet, the tactic's growing popularity speaks for itself. Will challenge-response emerge as the next big spam killer?
The most common method of stopping unsolicited e-mail in its tracks is filtering, which lets individuals and IT administrators cull legitimate messages from the ever-growing sea of spam.
Challenge-response works differently. Rather than using a multitude of rules to determine what may or may not be spam, the software takes the approach of a club bouncer to keep undesirables out.
When e-mail arrives from an unknown sender, challenge-response software sends back a message asking the sender to identify himself. If the sender is legitimate, he then types a one-word response and is allowed through the barrier for good. With most challenge-response programs, a single verification in a given domain is enough to let a sender transmit messages to anyone within that domain.
Šaltinis:
E-Commerce Times
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
search.lt presents newest links
more »
A new e-mail worm that's just beginning to wiggle its way across the Internet scours infected computers for image files containing child pornography, and alerts government agencies if any suspicious files are discovered.
more »
Two Teen Tech Titans Make the Grade
more »
The news that the Meta Group has found that between 65 and 75 percent of WAP users in Europe and Asia are no longer using their WAP services via their mobile phones, is indicative of this market segment.
more »
Trust services firm VeriSign Inc., owner of Network Solutions Inc., the largest registry/registrar in the world, Thursday threw the switch on its long-running Domain-Policy mailing list.
more »
If a Canadian firm successfully follows through with plans to retransmit network television content over the Internet, the multibillion-dollar entertainment industry could be thrown into the same sort of turmoil that the music industry faced because of th
more »
Criminal charges were brought against 90 people and companies Wednesday as part of a joint operation between the Justice Department and the National White Collar Crime Center -- charged with cutting down on Internet fraud.
more »
America Online, Inc.'s Instant Messenger service (AIM) is now available to VoiceStream Corp.'s 4 million subscribers.
more »
The web is often thought of either as a lawless place, filled with pornographers, gamblers, criminals and anarchists, or a vast virtual shopping mall where hordes of crazed consumers are feverishly maxing out their credit cards.
more »
search.lt presents newest links
more »