02-17-2003
Thanks Norsk!
That is a great tip! Just the kind of great antispam technique this special topic forum needs. I have never heard of 'POP before SMTP'...
My mother (a grandmother and savvy net user) has been on the net (doing email) since 1992 and now says, for her, the Internet is "not fun anymore' because of the mountains of spam she receives.
I think spam is the number one problem on the net today...... recently I was overseas in an Internet kiosk and spent most of my 'on-line' time deleting a thousand junk message that accumlated over a day in airports and planes.....
Thanks! Neo
6 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a file that reads File (X.txt)
Contents of record 1:
rdrDESTINATION_ADDRESS (String) "91 971502573813"
rdrDESTINATION_IMSI (String) "000000000000000"
rdrORIGINATING_ADDRESS (String) "d0 movies"
rdrORIGINATING_IMSI (String) "000000000000000"
rdrTRAFFIC_EVENT_TIME... (0 Replies)
Discussion started by: magedfawzy
0 Replies
2. Shell Programming and Scripting
Hi all,
I am quite new to Unix shell scripting and I am trying to create a common function to send mail that is capable of adding multiple attachments. The script works if there is only one attachment. But when there is more than one, it just won't work. It gives a syntax message "Usage:... (3 Replies)
Discussion started by: dongzky
3 Replies
3. Red Hat
I have encountered some problems in my school work.
Here is the question:
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies
4. Homework & Coursework Questions
The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography.
4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering
I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies
5. Cybersecurity
Hi guys, I'm trying to configure iptables to only allow certain ports access.
I set the first set of rules to block everything and then subsequently open ports as needed, but everything still seems to be blocked.
I have read that the order matters (new to iptables), perhaps this is an issue.... (6 Replies)
Discussion started by: 3therk1ll
6 Replies
6. UNIX for Dummies Questions & Answers
Hello!
I run an HP Unix system which I host oracle databases on, as well as oracle based apps used by my company. My IA department needs to scan my files to ensure I am following IA procedures and check for vulnerabilities in scripts etc. The scan is coming from corporate, and they asked for... (2 Replies)
Discussion started by: hpuxguy
2 Replies
LEARN ABOUT DEBIAN
jifty::plugin::user::mixin::model::user
Jifty::Plugin::User::Mixin::Model::User(3pm) User Contributed Perl Documentation Jifty::Plugin::User::Mixin::Model::User(3pm)
NAME
Jifty::Plugin::User::Mixin::Model::User - user model base mixin
SYNOPSIS
package MyApp::Model::User;
use Jifty::DBI::Schema;
use MyApp::Record schema {
# column definitions
};
# Import columns: name, email and email_confirmed
use Jifty::Plugin::User::Mixin::Model::User;
DESCRIPTION
This mixin may be added to a model to give your user accounts a name and an email address. This module may be used as the basic building
block for building account models in your application. It can be combined with mixins from an authentication plugin to create an object
suitable for a given authentication mechanism.
SCHEMA
This mixin model adds the following columns to the model.
name
This is the username/nickname for the user of the account.
email
This is the email address of the account. It is intended as a bare minimum confirmation of identity and for communication of password
resets and other account information.
email_confirmed
This is a flag indicating whether the user has confirmed ownership of the given email address.
METHODS
set_email ADDRESS
Whenever a user's email is set to a new value, we need to make sure they reconfirm it.
validate_email
Makes sure that the email address looks like an email address and is not taken.
SEE ALSO
Jifty::Plugin::Authentication::Password, Jifty::Plugin::Authentication::Password::Mixin::Model::User
LICENSE
Jifty is Copyright 2005-2010 Best Practical Solutions, LLC. Jifty is distributed under the same terms as Perl itself.
perl v5.14.2 2010-12-10 Jifty::Plugin::User::Mixin::Model::User(3pm)