COMDOM Software

Displaying 1-2 of 2 results

  • White Papers // Mar 2009

    IPv6 and Spam

    Implementation of Internet Protocol version 6 (IPv6) appears necessary for further growth and development of integrated communications networks. However, this important enhancement to the Internet Protocol has failed to gain widespread acceptance. This paper highlights that the persistence and sophistication of spam reduces incentives to deploy IPv6. The analysis suggests...

    Provided By COMDOM Software

  • White Papers // Oct 2008

    The Robustness of New Email Identification Standards

    Vulnerabilities in email protocols allow spammers to readily hide their true identities. These shortcomings have motivated proposals for new standards for authenticating messages. Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) represent two such mechanisms. Both authentication schemes are nevertheless open to abuse by spammers. This paper explores the...

    Provided By COMDOM Software

  • White Papers // Mar 2009

    IPv6 and Spam

    Implementation of Internet Protocol version 6 (IPv6) appears necessary for further growth and development of integrated communications networks. However, this important enhancement to the Internet Protocol has failed to gain widespread acceptance. This paper highlights that the persistence and sophistication of spam reduces incentives to deploy IPv6. The analysis suggests...

    Provided By COMDOM Software

  • White Papers // Oct 2008

    The Robustness of New Email Identification Standards

    Vulnerabilities in email protocols allow spammers to readily hide their true identities. These shortcomings have motivated proposals for new standards for authenticating messages. Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) represent two such mechanisms. Both authentication schemes are nevertheless open to abuse by spammers. This paper explores the...

    Provided By COMDOM Software