Hashing spam

2003-12-18 Thread escom
I work on an approach to block spam with a database of hash (md5) string of
spam email:
1) Reporting a verified spam to the database server on the web
2) the mail client check incoming mail, generate a hash string send to and
verify the presence on the server, is yes block email.
3) download a hot list to block directly on the machine

i don't know if it's a good or bad idea.

--giuseppe




Re: Rf Id tag protocol

2003-11-20 Thread escom



The purpose of the protocol is to manage over the 
internet the information stored in a RF-ID tag. More in detail the idea is to 
develop a crittography system and a certification authority.

To encrypt the data stored into the tag will be 
necessary to prevent frauds on the tagged products.

The purpose of the protocol is to manage over the 
internet the information stored in a RF-ID tag. More in detail the idea is to 
develop a crittography system and a certification authority.

giuseppe canale


Rf Id tag protocol

2003-11-19 Thread escom



Anyone is interested to help me to write a protocol 
for the Rf ID?

Thanks in advance

giuseppe canale