digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

Screenshot of a web page of a Wikimedia Foundationproject. Filing a blacklisting request
Blacklist IRC.

In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, URLs, etc.), except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, which means only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.

For example, a company might prevent a list of software from running on its network or a school might prevent a list of web sites from being accesses on its computers.

Information systems[edit]

The opposite of whitelisting, blacklisting allows everything to run unless it is on a predetermined "blacklist." A blacklist includes certain types of software that are not allowed to run in the company environment. For example, a company might blacklist peer to peer file sharing on its systems. In addition to software, people, devices and Web sites can also be blacklisted. [1]

Email[edit]

Most email providers have an anti-spam feature that essentially blacklists certain email addresses if they are deemed unwanted. How this happens is when a successful phishing attack (from an address that is forged from reliable accounts to try to recover personal information) is executed, then the email device deems the address to be spam, and proceeds to blacklist the address.

Examples[edit]

  • Companies like Google, Symantec and Sucuri keep internal blacklists of sites known to have malware and they display a warning before allowing the user to click them.
  • Content-control software such as DansGuardian and SquidGuard may work with a blacklist in order to block URLs of sites deemed inappropriate for a work or educational environment.
  • An e-mail spam filter may keep a blacklist of addresses, any mail from which would be prevented from reaching its intended destination. A popular technique for implementing blacklists is DNS blacklisting (DNSBL).
  • A firewall or IDS may also use a blacklist to block known hostile IP addresses and/or networks. An example for such a list would be the OpenBL project.
  • Many copy protection schemes include software blacklisting.
  • Members of online auction sites may add other members to a personal blacklist. This means that they cannot bid on or ask questions about your auctions, nor can they use a "buy it now" function on your items.
  • Yet another form of list is the yellow list which is a list of email server IP addresses that send mostly good email but do send some spam. Examples include Yahoo, Hotmail, and Gmail.[citation needed] A yellow listed server is a server that should never be accidentally blacklisted. The yellow list is checked first and if listed then black list tests are ignored.
  • In Linux modprobe, the blacklist modulename entry in a modprobe configuration file indicates that all of the particular module's internal aliases are to be ignored. There are cases where two or more modules both support the same devices, or a module invalidly claims to support a device.
  • Many web browsers have the ability to consult anti-phishing blacklists in order to warn users who unwittingly aim to visit a fraudulent website.
  • Many peer-to-peer file sharing programs support blacklists that block access from sites known to be owned by companies enforcing copyright. An example is the Bluetack[2] blocklist set.
  • Another model is a community blacklist, where anybody can report abuse and as a result, an IP address blacklist is created for anyone to download and use. An example is the badips[3] blacklist.


See Also[edit]

References[edit]

  1. ^ Rainer, Watson (2012). Introduction to Information Systems. Wiley Custom Learning Solutions. ISBN 978-1-118-45213-4. 
  2. ^ [1][dead link]
  3. ^ [2]"badips.com - an IP based abuse tracker". 

External links[edit]


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Blacklist_(computing) — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
5369 videos foundNext > 

Disable "Trusted Computing" Chip in Linux!

Many computers ship with TPM (Trusted Computing) chips installed. Today I will show you how to detect them if loaded by the Linux Kernel and then BLACKLIST t...

Splinter Cell : Blacklist on R7 260x OC 2GB | Ultra Settings |

Hey, Whats up Youtube!! I am Arpan A Lambore (TheAppzGamer) and I am here with a gameplay of Splinter Cell blacklist on R7 260x 2GB.This game runs smooth on ...

Splinter Cell Blacklist Xbox 360 Vs PC DX11 Highest Graphic Settings SC Blacklist Graphic Comparison

http://www.redgamingtech.com for more gaming news, reviews & tech http://www.facebook.com/redgamingtech - Follow us on Facebook! Royalty Free Music - www.aud...

Splinter Cell: Blacklist - PC - Custom / Ultra Settings - MSI Radeon R9 270 OC / FX-8350

Specs: AMD FX-8350 (OC - 4.4 GHz) 8GB Dual-Channel DDR3 1600 (4GB x2) Gigabyte 990FXA-UD3 AMD Radeon R9 270 2GB Gamer Edition OC (MSI) Windows 8.1 64-bit Cus...

Tom Clancy's Splinter Cell Blacklist-Gameplay on Radeon HD7750

Tom Clancy's Splinter Cell Blacklist-Gameplay on Radeon HD7750 FPS:30-40 Graphics:High,1920x1080 My PC: CPU:Intel Core i5-3330 GPU:Saphire Radeon HD 7750-102...

Splinter Cell Blacklist on HD 5770 + Phenom II x4 965 BE (MAXED)

Splinter Cell Blacklist Gameplay on AMD HD 5770 and Phenom II x4 965 BE Everything on MAX SETTINGS (FXAA) Resolution: HD 1280x720 FPS Recording: 30FPS FPS No...

Splinter Cell: Blacklist - PC - Walkthrough - "American Consumption"

Walkthrough for the "American Consumption" level in Splinter Cell: Blacklist (Solo Campaign) to achieve Ghost status. The video is only for achieving the Gho...

Splinter Cell Blacklist Gameplay using ASUS AMD Radeon R9 270

Splinter Cell Blacklist Gameplay using AMD FX 64 4100 Quad Core Processor 3.60GHz, 16GB RAM and ASUS AMD Radeon R9 270 2GB.

Tom Clancy's Splinter Cell: Blacklist - Linux

Linux Mint 15 KDE Wine 1.7.3 Wine prefix Windows Vista vcrun2010 d3dx9_36 i5 2500k @4.5 GTX460 OC.

Assassin's Creed 4 & Splinter Cell Blacklist Giveaway Winner!

Congrats to the winner. I have sent you a PM.

5369 videos foundNext > 

We're sorry, but there's no news about "Blacklist (computing)" right now.

Loading

Oops, we seem to be having trouble contacting Twitter

Talk About Blacklist (computing)

You can talk about Blacklist (computing) with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!