mikepultz.com
What are Blacklists and How Do They Work? (Part 1) | mike pultz
https://mikepultz.com/2015/07/what-are-rbls-and-how-do-they-work-part-1
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. What are Blacklists and How Do They Work? Originally Posted on RBLTracker Blacklist Check Service. Real-Time Blacklists (RBL) are a simple but effective way for organizations around the world, to share the location (in this case, the IP addresses) of email systems that are reputed to send email SPAM. The most common implementation of these lists are distributed via DNS. RBLs based on user input are the most commo...
en.wikipedia.org
Domain Name System Security Extensions - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/DNSSEC
Domain Name System Security Extensions. From Wikipedia, the free encyclopedia. The Domain Name System Security Extensions. Is a suite of Internet Engineering Task Force. IETF) specifications for securing certain kinds of information provided by the Domain Name System. DNS) as used on Internet Protocol. IP) networks. It is a set of extensions to DNS which provide to DNS clients (resolvers) origin authentication. Trust anchors and authentication chains. Signatures and zone signing. DNSSEC reveals zone data.
mikepultz.com
rbltracker | mike pultz
https://mikepultz.com/tag/rbltracker-2
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. RBLTracker: Facebook Threat Exchange, New Website, and More! After more than six month of design and development, we’ve launched a brand new version of the RBLTracker Blacklist Monitoring. Service and website. This release includes some long sought-after features, including a completely redesigned management portal, support for the Facebook Threat Exchange. And much much more. Some key new features include:.
mikepultz.com
dnsbl | mike pultz
https://mikepultz.com/tag/dnsbl
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. How Do RBLs Affect Me? Originally posted on RBLTracker. Of our series, I talked about what RBLs are, how they work, and how RBLs are used by administrators to control the day-to-day onslaught of SPAM on their email systems. In this article I’m going to talk about how RBLs affect you, your business, and why you should care. So Why Do I Care? Getting listed on an RBL or URIBL is not uncommon- it happens. By listing...
mikepultz.com
mike | mike pultz
https://mikepultz.com/author/admin
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. Net DNS2 v1.4.2 – SMIMEA and AVC Resource Records and SHA-256 SSHFP. I’ve released version 1.4.2 of the PEAR Net DNS2 library- you can install it now through the command line PEAR installer. Pear install Net DNS2. Or, you can also add it to your project using composer. Composer require pear/net dns2. Version 1.4.2. Changed the role for the README.md file to doc. Added EDNS0 defines to the lookup class. Since our ...
mikepultz.com
authentication | mike pultz
https://mikepultz.com/tag/authentication
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. RBLTracker: Two-factor Authentication using Clef. You can now log in to your RBLTracker. Account using secure, two-factor authentication using Clef. Clef is secure two-factor authentication using your mobile device, with no passwords or tokens, and no personal data is shared between RBLTracker and Clef. Simply download the Clef Mobile App. This entry was posted in Development. My Animals for Kids!
mikepultz.com
getclef | mike pultz
https://mikepultz.com/tag/getclef
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. RBLTracker: Two-factor Authentication using Clef. You can now log in to your RBLTracker. Account using secure, two-factor authentication using Clef. Clef is secure two-factor authentication using your mobile device, with no passwords or tokens, and no personal data is shared between RBLTracker and Clef. Simply download the Clef Mobile App. This entry was posted in Development. My Animals for Kids!
mikepultz.com
secops | mike pultz
https://mikepultz.com/tag/secops
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. How Do RBLs Affect Me? Originally posted on RBLTracker. Of our series, I talked about what RBLs are, how they work, and how RBLs are used by administrators to control the day-to-day onslaught of SPAM on their email systems. In this article I’m going to talk about how RBLs affect you, your business, and why you should care. So Why Do I Care? Getting listed on an RBL or URIBL is not uncommon- it happens. By listing...
mikepultz.com
How Wind Mobile Took My Autistic Brother for a Ride | mike pultz
https://mikepultz.com/2013/04/left-blowing-in-the-wind-how-wind-mobile-took-my-autistic-brother-for-a-ride
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. How Wind Mobile Took My Autistic Brother for a Ride. I just received a call from Ayesha at Wind Mobile- from the “Office of the President”. She spent most of the call re-iterating their policies to me, and suggesting that i’m lying about calling in before the 14 day window. As a follow up to our conversation today, the reference ID for our conversation is CXXXXXXXX. Office of the President. My brother is autistic.
mikepultz.com
How Are Blacklists Used? (Part 2) | mike pultz
https://mikepultz.com/2015/07/how-are-rbls-used-part-2
Personal and professional blog of mike pultz, technology specialist and serial entrepreneur. How Are Blacklists Used? Originally posted on RBLTracker Blacklist Check Service blog. Of our series we talked about what RBLs are, and the different types of RBLs. In this article, we’ll talk more about how they can be used by administrators to control the flow of SPAM into their networks. How Are They Used? As a quick example, the Exim. Configuration option in the smtpd recipient restrictions. DNSBL, you would ...