[G3]-Technews
[G3]-TechNews : Home| RSS | Atom | MSN | WAP

 Stickies:
Article: Step-by-Step Guide: How to set up a VPN
Article: Download: Microsoft Monad (Beta)
Article: Building a 64-Bit Multimedia Workstation
Article: Coming Soon to Windows: The Microsoft Shell (MSH)
Article: How to Reset Win NT / 2000 / XP Administrator Password
Article: The Technology Behind Dual Core CPUs
Article: How-To: Wireless Network Security
Article: Article: PCI Express - technology backgrounder
Article: Tutorial: Access Hidden Files on Your iPod
Article: Troubleshooting drivers with XP's hidden Driver Verifier Manager
Article: How to Make a 5 in 1 Network Cable
Article: Comparison - Blu-ray & HD DVD
Article: Beginners Guides Linux : Part 1 | Part 2 | Part 3
Article: How To Crack WEP (Wired Equivalent Privacy)
Article: Email Addresses Spoofing.
Link: Free PHP ebook
Link: FREE ASP.NET books and eLearning course
Link: Free registration code for Opera 8.
Invitations: Gazzag (Here) | Yahoo! 360 (Here)  | Orkut (Here)

Yahoo! and Cisco systems combine antispam technology
Contributed by: G3nu1n3, at 6/03/2005 09:10:00 PM.

Yahoo! Inc. and Cisco Systems are combining their antispam technologies to create a new e-mail authentication system, the companies said this week.

The new system, called DomainKeys Identified Mail (DKIM), will draw on Yahoo's DomainKeys authentication technology and Cisco's Internet Identified Mail. The technology will be offered to many other industry players on a royalty-free basis in an effort to reduce the amount of spam that spreads across the Internet, the companies said.

Yahoo's DomainKeys uses public-key cryptography to authenticate the sender of an e-mail at the domain level. The sending system generates a signature and inserts it in the e-mail header. The receiving system then verifies the signature using a public key published in the Domain Name System.

Cisco's authentication technology also uses cryptography but it associates the key signature with the message itself. In its system, the sending server signs the message and inserts the signature and pubic key used to create it in a new and additional header. The receiving system verifies that the public key used to sign the message is authorized for use by the sending e-mail address.

View: More Details


Important:
To Read MOST UPDATED News Items browse to HOME page.

0 Comments:

Post a Comment

<< Home



[G3]-TechNews : Home| RSS | Atom | MSN | WAP


Archives :

- Monthly Archives :


- Post Count: 1,783 before June 1, 2005. (Since: October 26, 2004)