Revisiting the decay of scientific email addresses
نویسندگان
چکیده
منابع مشابه
Email addresses to contact persons
page 22 tion point that a majority of the traffic to and from the Internet will pass through. What is still unknown is how to handle 4, or 6, or more really fast ATM links that all end up at SUNET Stockholm (since we start off with 34 Mbit/s leased lines as of today, 34 Mbit/s ATM is below the very minimum). What kind of switching equipment is needed? What kind of routing equipment? [6] Moldekl...
متن کاملIP Addresses in Email Clients
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP address in most email server software, it turns out to be surprisingly difficult to do so in email client software: we explain why. This implies that either alternative approaches are needed (typically signature-based) or tha...
متن کاملMaking Sense of Email Addresses on Drives
Drives found during investigations often have useful information in the form of email addresses, which can be acquired by search in the raw drive data independent of the file system. Using these data, we can build a picture of the social networks in which a drive owner participated, even perhaps better than investigating their online profiles maintained by social-networking services, because dr...
متن کاملInexpensive Email Addresses An Email Spam-Combating System
This work proposes an effective method of fighting spam by developing Inexpensive Email Addresses (IEA), a stateless system of Disposable Email Addresses (DEAs). IEA can cryptographically generate exclusive email addresses for each sender, with the ability to re-establish a new email address once the old one is compromised. IEA accomplishes proof-of-work by integrating a challenge-response mech...
متن کاملRevisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Association for Information Science and Technology
سال: 2021
ISSN: 2330-1635,2330-1643
DOI: 10.1002/asi.24545