Hashing spam
I work on an approach to block spam with a database of hash (md5) string of spam email: 1) Reporting a verified spam to the database server on the web 2) the mail client check incoming mail, generate a hash string send to and verify the presence on the server, is yes block email. 3) download a hot list to block directly on the machine i don't know if it's a good or bad idea. --giuseppe
Re: Rf Id tag protocol
The purpose of the protocol is to manage over the internet the information stored in a RF-ID tag. More in detail the idea is to develop a crittography system and a certification authority. To encrypt the data stored into the tag will be necessary to prevent frauds on the tagged products. The purpose of the protocol is to manage over the internet the information stored in a RF-ID tag. More in detail the idea is to develop a crittography system and a certification authority. giuseppe canale
Rf Id tag protocol
Anyone is interested to help me to write a protocol for the Rf ID? Thanks in advance giuseppe canale