Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Composite_Blocking_List> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- Composite_Blocking_List abstract "In computer networking, the Composite Blocking List (CBL) is a DNS-based Blackhole List of suspected E-mail spam sending computer infections.The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics such as: Open proxies of various sorts (HTTP, socks, AnalogX, wingate etc.) Worms/viruses/botnets that do their own direct mail transmission, or are otherwise participating in a botnet. Trojan horse or "stealth" spamware.The CBL attempts to avoid listing real mail servers, but certain misconfigurations of mail servers can make the system appear infected (for example, servers that send HELO with 'localhost' or a similar incorrect domain.)Entries automatically expire after a period of time.The CBL does not provide public access to gathered evidence.CBL data are used in Spamhaus XBL list.".
- Composite_Blocking_List wikiPageExternalLink cbl.abuseat.org.
- Composite_Blocking_List wikiPageExternalLink lookup.cgi.
- Composite_Blocking_List wikiPageID "5933477".
- Composite_Blocking_List wikiPageRevisionID "502845280".
- Composite_Blocking_List hasPhotoCollection Composite_Blocking_List.
- Composite_Blocking_List subject Category:Computer_security_procedures.
- Composite_Blocking_List subject Category:Spamming.
- Composite_Blocking_List type Abstraction100002137.
- Composite_Blocking_List type Act100030358.
- Composite_Blocking_List type Activity100407535.
- Composite_Blocking_List type ComputerSecurityProcedures.
- Composite_Blocking_List type Event100029378.
- Composite_Blocking_List type Procedure101023820.
- Composite_Blocking_List type PsychologicalFeature100023100.
- Composite_Blocking_List type YagoPermanentlyLocatedEntity.
- Composite_Blocking_List comment "In computer networking, the Composite Blocking List (CBL) is a DNS-based Blackhole List of suspected E-mail spam sending computer infections.The CBL takes its source data from very large spamtraps/mail infrastructures, and only lists IPs exhibiting characteristics such as: Open proxies of various sorts (HTTP, socks, AnalogX, wingate etc.) Worms/viruses/botnets that do their own direct mail transmission, or are otherwise participating in a botnet.".
- Composite_Blocking_List label "Composite Blocking List".
- Composite_Blocking_List sameAs m.0ff6g5.
- Composite_Blocking_List sameAs Q16989882.
- Composite_Blocking_List sameAs Q16989882.
- Composite_Blocking_List sameAs Composite_Blocking_List.
- Composite_Blocking_List wasDerivedFrom Composite_Blocking_List?oldid=502845280.
- Composite_Blocking_List isPrimaryTopicOf Composite_Blocking_List.