1. Background DKIM is a widely used method for the authentication of emails. But when DKIM is not used correctly, it is not effective and can offer a false sense of security. For this reason, here we...
Search Results for: DMARC
In the first place, what is phishing? Phishing is an invented word cobbled out of the two words “password” and “fishing”. Criminals use fake emails to try to obtain personal data – in particular logi...
Commissioning a mail server is initially not terribly complicated, but at the latest when it comes to keeping an eye on your reputation, or if you want to implement authentication measures like SPF (S...
Commissioning a mail server is initially not terribly complicated, but at the latest when it comes to keeping an eye on your reputation, or if you want to implement authentication measures like SPF (S...
Why was IPv6 developed? IPv4 allows for around 4 billion addresses, of which 3.7 billion are usable. This address space is becoming increasingly exhausted. At the end of July 2015 only 160,000 IPv4 a...