翻訳と辞書
Words near each other
・ "O" Is for Outlaw
・ "O"-Jung.Ban.Hap.
・ "Ode-to-Napoleon" hexachord
・ "Oh Yeah!" Live
・ "Our Contemporary" regional art exhibition (Leningrad, 1975)
・ "P" Is for Peril
・ "Pimpernel" Smith
・ "Polish death camp" controversy
・ "Pro knigi" ("About books")
・ "Prosopa" Greek Television Awards
・ "Pussy Cats" Starring the Walkmen
・ "Q" Is for Quarry
・ "R" Is for Ricochet
・ "R" The King (2016 film)
・ "Rags" Ragland
・ ! (album)
・ ! (disambiguation)
・ !!
・ !!!
・ !!! (album)
・ !!Destroy-Oh-Boy!!
・ !Action Pact!
・ !Arriba! La Pachanga
・ !Hero
・ !Hero (album)
・ !Kung language
・ !Oka Tokat
・ !PAUS3
・ !T.O.O.H.!
・ !Women Art Revolution


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

ROKSO : ウィキペディア英語版
The Spamhaus Project

The Spamhaus Project is an international organisation, based in both London and Geneva, founded in 1998 by Steve Linford to track email spammers and spam-related activity. The name ''spamhaus'', a pseudo-German expression, was coined by Linford for an Internet service provider, or other firm, which spams or knowingly provides service to spammers.
==Anti-spam lists==
The Spamhaus Project is responsible for compiling several widely〔(【引用サイトリンク】 title=Cyberattack on anti-spam group Spamhaus has ripple effects )〕 used anti-spam lists. Many〔(【引用サイトリンク】 title=Dutchman arrested over huge web attack )internet service providers and email servers use the lists to reduce the amount of spam that reaches their users. In 2006, the Spamhaus services protected 650 million email users, including the European Parliament, US Army, the White House and Microsoft, from billions of spam emails a day.〔
Spamhaus distributes the lists in the form of DNS-based Blocklists (DNSBLs) and Whitelists (DNSWLs). The lists are offered as a free public service to low-volume mail server operators on the Internet.〔(Spamhaus DNSBL Usage )〕 Commercial spam filtering services and other sites doing large numbers of queries must instead sign up for an rsync-based feed of these DNSBLs, which Spamhaus calls its Datafeed Service.〔(【引用サイトリンク】title=Spamhaus Datafeed, )〕 Spamhaus outlines the way its DNSBL technology works in a document called Understanding DNSBL Filtering.〔(【引用サイトリンク】title=Understanding DNSBL Filtering )
The Spamhaus Block List (SBL)〔(【引用サイトリンク】title=Spamhaus Block List (SBL) )〕 targets "verified spam sources (including spammers, spam gangs and spam support services)." Its goal is to list IP addresses belonging to known spammers, spam operations, and spam-support services. The SBL's listings are partially based on the ROKSO index of known spammers.
The Exploits Block List (XBL)〔(【引用サイトリンク】title=Spamhaus Exploits Block List (XBL) )〕 targets "illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, virus-infected PCs & servers and other types of trojan-horse exploits." That is to say it is a list of known open proxies and exploited computers being used to send spam and viruses. The XBL includes information gathered by Spamhaus as well as by other contributing DNSBL operations such as the Composite Blocking List (CBL).
The Policy Block List (PBL)〔(【引用サイトリンク】title=Spamhaus Policy Block List (PBL) )〕 is similar to a Dialup Users List. The PBL lists not only dynamic IP addresses but also static addresses that should not be sending email directly to third-party servers. Examples of such are an ISP's core routers, corporate users required by policy to send their email via company servers, and unassigned IP addresses. Much of the data is provided to Spamhaus by the organizations that control the IP address space, typically ISPs.
The Domain Block List (DBL)〔(【引用サイトリンク】title=Spamhaus Domain Block List (DBL) )〕 was released in March 2010 and is a list of domain names, which is both a domain URI Blocklist and RHSBL. It lists spam domains including spam payload URLs, spam sources and senders ("right-hand side"), known spammers and spam gangs, and phish, virus and malware-related sites. It later added a zone of "abused URL shortners", a common way spammers insert links into spam emails.
The Botnet Controller List (BCL)〔(【引用サイトリンク】title=Spamhaus Botnet Controller List (BCL) )〕 was released in June 2012 and is a list of IP addresses. It lists IP addresses of which Spamhaus believes to be operated by cybercriminals for the exclusive purpose of hosting botnet Command&Control infrastructure. Such infrastructure is commonly used by cybercriminals to control malware infected computers.
The Spamhaus White List (SWL)〔(【引用サイトリンク】title=Spamhaus White List (SWL) )〕 was released in October 2010 and is a whitelist of IPv4 and IPv6 addresses. The SWL is intended to allow mail servers to separate incoming email traffic into 3 categories: Good, Bad and Unknown. Only verified legitimate senders with clean reputations are approved for whitelisting and there are strict terms to keeping a Spamhaus Whitelist account.
The Domain White List (DWL)〔 was released in October 2010 and is a whitelist of domain names. The DWL enables automatic certification of domains with DKIM signatures. Only verified legitimate senders with clean reputations are approved for whitelisting and there are strict terms to keeping a whitelist account.
Spamhaus also provides two combined lists. One is the SBL+XBL and the second is called ZEN,〔(【引用サイトリンク】title=Spamhaus ZEN )〕 which combines all the Spamhaus IP address-based lists.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「The Spamhaus Project」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.