Whitelist

A whitelist or allowlist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of blacklisting, the practice of identifying entities that are denied, unrecognized, or ostracized.[citation needed]

Email whitelists

Spam filters often include the ability to "whitelist" certain sender IP addresses, email addresses or domain names to protect their email from being rejected or sent to a junk mail folder. These can be manually maintained by the user[1] or system administrator - but can also refer to externally maintained whitelist services.[citation needed][2]

Non-commercial whitelists

Non-commercial whitelists are operated by various non-profit organizations, ISPs, and others interested in blocking spam. Rather than paying fees, the sender must pass a series of tests; for example, their email server must not be an open relay and have a static IP address. The operator of the whitelist may remove a server from the list if complaints are received.[citation needed][3]

Commercial whitelists

Commercial whitelists are a system by which an Internet service provider allows someone to bypass spam filters when sending email messages to its subscribers, in return for a pre-paid fee, either an annual or a per-message fee. A sender can then be more confident that their messages have reached recipients without being blocked, or having links or images stripped out of them, by spam filters. The purpose of commercial whitelists is to allow companies to reliably reach their customers by email.[citation needed]

Advertising whitelists

Many websites rely on ads as a source of revenue, but the use of ad blockers is increasingly common.[citation needed] Websites that detect an adblocker in use often ask for it to be disabled - or their site to be "added to the whitelist"[4] - a standard feature of most adblockers.[citation needed]

Network whitelists

LAN whitelists

A use for whitelists is in local area network (LAN) security. Many network admins set up MAC address whitelists, or a MAC address filter, to control who is allowed on their networks. This is used when encryption is not a practical solution or in tandem with encryption. However, it's sometimes ineffective because a MAC address can be faked.[citation needed]

IP whitelist

Firewalls can usually be configured to only allow data-traffic from/to certain (ranges of) IP-addresses.[citation needed]

Application whitelists

One approach in combating viruses and malware is to whitelist software which is considered safe to run, blocking all others.[5][6][7][8] This is particularly attractive in a corporate environment, where there are typically already restrictions on what software is approved.[citation needed]

Leading providers of application whitelisting technology include Bit9, Velox, McAfee, Lumension, ThreatLocker, Airlock Digital and SMAC.[9][10][11]

On Microsoft Windows, recent versions include AppLocker, which allows administrators to control which executable files are denied or allowed to execute. With AppLocker, administrators are able to create rules based on file names, publishers or file location that will allow certain files to execute. Rules can apply to individuals or groups. Policies are used to group users into different enforcement levels. For example, some users can be added to a report-only policy that will allow administrators to understand the impact before moving that user to a higher enforcement level.[citation needed]

Linux systems typically have AppArmor and SE Linux features available which can be used to effectively block all applications which are not explicitly whitelisted, and commercial products are also available.[12]

On HP-UX introduced a feature called "HP-UX Whitelisting" on 11iv3 version.[13]

See also

References

  1. ^ e.g. Kindle users control the whitelist for email access. Besides Amazon itself, only e-mail addresses whitelisted by the device's registered owner can send content ("personal documents") to that device.
  2. ^ "IP and domain reputation". Spamhaus Project.
  3. ^ "Spamhaus' Blocklists".
  4. ^ "Adblock Instructions". Forbes. Retrieved 2017-12-09.
  5. ^ John Harrison, Enhancing Network Security By Preventing User-Initiated Malware Execution, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) (Wireless Ad Hoc/Sensor Networks and Network Security Track), Volume II - Volume 02; pages 597-602; IEEE Computer Society Washington, DC, USA 2005.
  6. ^ "SANS Institute: Reading Room - Analyst Papers" (PDF). www.sans.org. Archived from the original (PDF) on 2012-03-02. Retrieved 27 August 2018.
  7. ^ "Dark Reading - Security - Protect The Business - Enable Access". Dark Reading. Archived from the original on 2019-12-12. Retrieved 2008-10-02.
  8. ^ "Application Whitelisting Gains Traction". eweek.com. 25 September 2008.
  9. ^ Blum, Dan (February 8, 2014). "Lessons Learned from Target Breach". Security-Architect Blog. Dan Blum. Retrieved July 18, 2014.
  10. ^ Vamosi, Robert (2008-07-21). "Will you be ditching your antivirus app anytime soon?". CNET. Archived from the original on 2012-10-24. Retrieved 2010-03-22.
  11. ^ Korobov, EVGENIY (2020-07-27). "SMAC - application whitelist platform". iqp. Retrieved 2020-07-27.
  12. ^ Cooprider, Nathan (2016-02-03). "Live Whitelisting!". Threat Stack. Retrieved 20 December 2018.
  13. ^ "HP-UX Whitelisting". HP. Retrieved 20 December 2018.

Read other articles:

Artikel ini membutuhkan penyuntingan lebih lanjut mengenai tata bahasa, gaya penulisan, hubungan antarparagraf, nada penulisan, atau ejaan. Anda dapat membantu untuk menyuntingnya. Dalam nama yang mengikuti kebiasaan penamaan Slavia Timur ini, patronimiknya adalah Abdulmanapovich dan nama keluarganya adalah Nurmagomedov. Khabib NurmagomedovХабиб Нурмагомедов (Rusia)Nurmagomedov pada tahun 2019.LahirKhabib Abdulmanapovich Nurmagomedov20 September 1988 (umur 35)Sildi, ...

 

Lebong TandaiDesaNegara IndonesiaProvinsiBengkuluKabupatenBengkulu UtaraKecamatanNapal PutihKode pos38363Kode Kemendagri17.03.13.2016 Luas... km²Jumlah penduduk... jiwaKepadatan... jiwa/km² Lebong Tandai adalah salah satu desa di Kecamatan Napal Putih, Kabupaten Bengkulu Utara, provinsi Bengkulu, Indonesia. Desa ini dialiri oleh Sungai Lusang yang cukup jernih dan terdapat Bendungan bernama Tokorotan yang dibangun kolonial Belanda. Kebutuhan listrik di Lebong Tandai terpenuhi selama 24...

 

Anglo-zanzibariska kriget Del av kapplöpningen om Afrika Sultanens palats efter bombardemanget. Ägde rum 09:02–09:40 EAT (06:02–06:40 UTC), 27 augusti 1896 Plats Zanzibars stenstad, Zanzibar Resultat Brittisk seger Stridande Brittiska imperiet  Zanzibar Befälhavare och ledare Harry Rawson Lloyd Mathews Khalid bin Bargash Saleh Styrka Land:1 050Sjö:3 kryssare,2 kanonbåtar Land:2 800Artilleri:flera Maxim-kulsprutor1 Gatlingkulspruta1 kanon2 fältkanonerSjö:1 kungajakt,2 bå...

12 Angry MenAdegan dalam film.DistributorUnited ArtistsTanggal rilisDurasi96 minutesPendapatankotor$1,000,000 (rentals)[1] Trailer film 12 Angry Men adalah film drama Amerika Serikat tahun 1957 yang diadaptasi dari seri televisi “Teleplay” dengan nama yang sama, karya Reginald Rose. Ditulis dan diproduksi ulang oleh Rose sendiri dan disutradarai oleh Sidney Lumet. Latar belakang Film persidangan ini bercerita tentang juri yang terdiri dari 12 laki-laki di mana mereka membahas...

 

Lack of visible changes in ovulating females Concealed ovulation or hidden estrus in a species is the lack of any perceptible change in an adult female (for instance, a change in appearance or scent) when she is fertile and near ovulation. Some examples of perceptible changes are swelling and redness of the vulva in baboons and bonobos, and pheromone release in the feline family. In contrast, the females of humans and a few other species[1] that undergo hidden estrus have few external...

 

This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Tarsus Waterfall – news · newspapers · books · scholar · JSTOR (December 2009) (Learn how and when to remove this message) WaterfallTarsus Waterfall Tarsus Waterfallclass=notpageimage| Location of Tarsus Waterfall Tarsus waterfall Tarsus Waterfall is located on the northern outs...

Overview of the events of 1992 in video games List of years in video games … 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 … Art Archaeology Architecture Literature Music Philosophy Science +... 1992 saw many sequels and prequels in video games, such as Dragon Quest V, Final Fantasy V, Sonic the Hedgehog 2, Street Fighter II: Champion Edition, Super Mario Land 2: 6 Golden Coins, and Super Mario Kart, along with new titles such as...

 

此條目可能包含不适用或被曲解的引用资料,部分内容的准确性无法被证實。 (2023年1月5日)请协助校核其中的错误以改善这篇条目。详情请参见条目的讨论页。 各国相关 主題列表 索引 国内生产总值 石油储量 国防预算 武装部队(军事) 官方语言 人口統計 人口密度 生育率 出生率 死亡率 自杀率 谋杀率 失业率 储蓄率 识字率 出口额 进口额 煤产量 发电量 监禁率 死刑 国债 ...

 

Greek chieftain Kapetan (Chieftain)Ioannis RamnalisRamnalis during the Macedonian Struggle.Native nameΙωάννης ΡάμναληςBirth nameIoannis Villioglou (Ιωάννης Βίλλιογλου)Bornc. 1885Rafna, Salonika Vilayet, Ottoman Empire (now Isoma [el], Greece)Died5 December 1923 (aged 37–38)Lagkadikia, Kingdom of GreeceAllegiance Kingdom of GreeceService/branch HMC  Hellenic Army Battles/warsMacedonian StruggleBalkan Wars First Balkan War Second Balk...

「アプリケーション」はこの項目へ転送されています。英語の意味については「wikt:応用」、「wikt:application」をご覧ください。 この記事には複数の問題があります。改善やノートページでの議論にご協力ください。 出典がまったく示されていないか不十分です。内容に関する文献や情報源が必要です。(2018年4月) 古い情報を更新する必要があります。(2021年3月)出...

 

2015 video game 2015 video gameChinese Paladin 6Developer(s)Softstar Technology (Beijing) Co. Ltd.Publisher(s)TW: SoftstarCHN: ChangyouNA: EastAsiaSoftDirector(s)Yao ZhuangxianProducer(s)Luan JingComposer(s)Zeng ZhihaoWu XinruiZhou ZhihuaSeriesThe Legend of Sword and FairyEngineUnityPlatform(s)Microsoft WindowsXbox OnePlayStation 4ReleaseMicrosoft WindowsTW: July 8, 2015CHN: July 8, 2015WW: November 14, 2017 (Steam)PlayStation 4NA: April 2, 2019CHN: April 2, 2019Xbox OneTBAGenre(s)Role-playin...

 

  ميّز عن ابن الحداد. أبو بكر الحداد معلومات شخصية الاسم الكامل أبو بكر بن علي بن محمد الحداد الزبيدي اليمني تاريخ الوفاة 800هـ؛ 1397م الإقامة اليمن الحياة العملية تخصص أكاديمي مفسر وفقيه تعلم لدى والده، وعلي بن نوح، وعلي بن عمر العلوي المهنة رجل قانون  أعمال بارزة كتاب...

German philosopher (1844–1900) Nietzsche redirects here. For other uses, see Nietzsche (disambiguation). Friedrich NietzscheNietzsche in Basel, Switzerland, c. 1875BornFriedrich Wilhelm Nietzsche(1844-10-15)15 October 1844Röcken, Province of Saxony, Prussia, German ConfederationDied25 August 1900(1900-08-25) (aged 55)Weimar, Saxe-Weimar-Eisenach, German EmpireResting placeRöcken ChurchyardAlma mater University of Bonn Leipzig University Era19th-century philosophyRegionWestern ph...

 

Stream in Virginia, USA Lagrange CreekTributary to Rappahannock RiverLagrange Creek near Urbanna, on the Rappahannock River, VirginiaLocation of Lagrange Creek mouthShow map of VirginiaLagrange Creek (Rappahannock River tributary) (the United States)Show map of the United StatesLocationCountryUnited StatesStateVirginiaCountyMiddlesexPhysical characteristicsSourceBriery Swamp and Wyatt Swamp divide • locationabout 2 miles southeast of Jamaica, Virginia • co...

 

シュウエケ邸 シュウエケ邸(シュウエケてい、Choueke House)は兵庫県神戸市中央区にある異人館。 重要伝統的建造物群保存地区「北野町山本通」の伝統的建造物。 概要 明治29年(1896年)、建築家A.N.ハンセルの自邸として建設されたゴシックを基調するコロニアルスタイルの西洋館。広い庭園は芝生に石灯籠を配置した和洋折衷で、他にも屋根に鯱がのるといった和の�...

Pickup truck manufactured by Isuzu Motors Not to be confused with DMAX (engines). Motor vehicle Isuzu D-MaxOverviewManufacturerIsuzu MotorsProduction2002–presentBody and chassisClassCompact pickup truck (2002–2011) Mid-size pickup truck (2011–present)Body style 2-door chassis cab 2-door pickup truck 4-door chassis cab 4-door pickup truck LayoutFront-engine, rear-wheel driveFront-engine, four-wheel driveChronologyPredecessorIsuzu FasterSuccessorChevrolet Colorado (for Chevrolet D-Ma...

 

For people named Chris Cross, see Chris Cross. ChrisCrossChrisCross at the New York Comic Con in February 2008.BornChristopher WilliamsNationalityAmericanArea(s)ArtistNotable worksBlood SyndicateCaptain MarvelFirestorm Christopher Williams, who goes by ChrisCross, is a comic book illustrator, known mostly for his stints pencilling Milestone Comics' Blood Syndicate and Heroes, Marvel Comics' Captain Marvel and Slingers and DC Comics' Firestorm. He created the comic book character Jason Rusch w...

 

Pour les articles homonymes, voir Ouville (homonymie) et Rivière (homonymie). Cet article est une ébauche concernant une commune de la Seine-Maritime. Vous pouvez partager vos connaissances en l’améliorant (comment ?). Le bandeau {{ébauche}} peut être enlevé et l’article évalué comme étant au stade « Bon début » quand il comporte assez de renseignements encyclopédiques concernant la commune. Si vous avez un doute, l’atelier de lecture du projet Communes de F...

FCN1 بنى متوفرة بنك بيانات البروتينOrtholog search: PDBe RCSB قائمة رموز معرفات بنك بيانات البروتين 2D39, 2JHH, 2JHI, 2JHK, 2JHL, 2JHM, 2WNP معرفات أسماء بديلة FCN1, FCNM, ficolin 1 معرفات خارجية الوراثة المندلية البشرية عبر الإنترنت 601252 MGI: MGI:1341158 HomoloGene: 1518 GeneCards: 2219 علم الوجود الجيني وظائف جزيئية • sialic acid binding• �...

 

Combined military forces of Lebanon Not to be confused with Lebanese Forces, a Lebanese political party. Lebanese Armed Forcesالقوات المسلحة اللبنانية (Arabic)Emblem of the Lebanese Armed ForcesFlag of the Lebanese Armed ForcesMottoHonor, Sacrifice, Loyalty(Arabic: شرف · تضحية · وفاء, romanized: Sharaf.Tadhia.Wafa)Founded1 August 1945Current form1991Service branches Lebanese Ground Forces Lebanese Navy Lebanese Air ForceHeadquartersYarze...