digplanet beta 1: Athena
Share digplanet:


Applied sciences






















Screenshot of a web page of a Wikimedia Foundationproject. Filing a blacklisting request
Blacklist IRC.

In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, URLs, etc.), except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, which means only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.

For example, a company might prevent a list of software from running on its network or a school might prevent a list of web sites from being accesses on its computers.

Information systems[edit]

The opposite of whitelisting, blacklisting allows everything to run unless it is on a predetermined "blacklist." A blacklist includes certain types of software that are not allowed to run in the company environment. For example, a company might blacklist peer to peer file sharing on its systems. In addition to software, people, devices and Web sites can also be blacklisted. [1]


Most email providers have an anti-spam feature that essentially blacklists certain email addresses if they are deemed unwanted. How this happens is when a successful phishing attack (from an address that is forged from reliable accounts to try to recover personal information) is executed, then the email device deems the address to be spam, and proceeds to blacklist the address.


  • Companies like Google, Symantec and Sucuri keep internal blacklists of sites known to have malware and they display a warning before allowing the user to click them.
  • Content-control software such as DansGuardian and SquidGuard may work with a blacklist in order to block URLs of sites deemed inappropriate for a work or educational environment.
  • An e-mail spam filter may keep a blacklist of addresses, any mail from which would be prevented from reaching its intended destination. A popular technique for implementing blacklists is DNS blacklisting (DNSBL).
  • A firewall or IDS may also use a blacklist to block known hostile IP addresses and/or networks. An example for such a list would be the OpenBL project.
  • Many copy protection schemes include software blacklisting.
  • Members of online auction sites may add other members to a personal blacklist. This means that they cannot bid on or ask questions about your auctions, nor can they use a "buy it now" function on your items.
  • Yet another form of list is the yellow list which is a list of email server IP addresses that send mostly good email but do send some spam. Examples include Yahoo, Hotmail, and Gmail.[citation needed] A yellow listed server is a server that should never be accidentally blacklisted. The yellow list is checked first and if listed then black list tests are ignored.
  • In Linux modprobe, the blacklist modulename entry in a modprobe configuration file indicates that all of the particular module's internal aliases are to be ignored. There are cases where two or more modules both support the same devices, or a module invalidly claims to support a device.
  • Many web browsers have the ability to consult anti-phishing blacklists in order to warn users who unwittingly aim to visit a fraudulent website.
  • Many peer-to-peer file sharing programs support blacklists that block access from sites known to be owned by companies enforcing copyright. An example is the Bluetack[2] blocklist set.


  1. ^ Rainer, Watson (2012). Introduction to Information Systems. Wiley Custom Learning Solutions. ISBN 978-1-118-45213-4. 
  2. ^ [1][dead link]

External links[edit]

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Blacklist_(computing) — Please support Wikipedia.
A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
1351 videos foundNext > 

Disable "Trusted Computing" Chip in Linux!

Many computers ship with TPM (Trusted Computing) chips installed. Today I will show you how to detect them if loaded by the Linux Kernel and then BLACKLIST t...

Splinter Cell Blacklist Xbox 360 Vs PC DX11 Highest Graphic Settings SC Blacklist Graphic Comparison

http://www.redgamingtech.com for more gaming news, reviews & tech http://www.facebook.com/redgamingtech - Follow us on Facebook! Royalty Free Music - www.aud...

Splinter Cell Blacklist - On Intel HD Graphics 4600 Test

System: i7-4770s, iGPU 4600, 16GB 2000MHz, win7 x64.

Tom Clancy's Splinter Cell Blacklist-Gameplay on Radeon HD7750

Tom Clancy's Splinter Cell Blacklist-Gameplay on Radeon HD7750 FPS:30-40 Graphics:High,1920x1080 My PC: CPU:Intel Core i5-3330 GPU:Saphire Radeon HD 7750-102...

Tom Clancy's Splinter Cell: Blacklist - Intel HD Graphics 3000 - BR

Configuração do Jogo: Resolução: 800x600 Proporção: 5:3 Texturas: Low Filtros: Desabilitados Especificações: Processador : Intel Core i5 - 2410m 2.3 Ghz Memo...

Splinter Cell Blacklist on HD 5770 + Phenom II x4 965 BE (MAXED)

Splinter Cell Blacklist Gameplay on AMD HD 5770 and Phenom II x4 965 BE Everything on MAX SETTINGS (FXAA) Resolution: HD 1280x720 FPS Recording: 30FPS FPS No...

When Not To Open E-mail, San Diego Computer Support

http://ezitsandiego.com Your e-mail security solution is completely transparent to your network. We will help you to create a white list and blacklists that ...

Splinter Cell: Blacklist - E3 2013: Scope Trailer

Name: Splinter Cell: Black List Release date: August 20, 2013 Platform(s): PC, PlayStation 3, Xbox 360 and Wii U Publisher(s): Ubisoft Developer(s): Ubisoft ...

Rackspace Email & Apps: Whitelist and Blacklist 101

Informational video from Email & Apps brought to you by support Rackers!

BBC Computer coding taught in Estonian primary schools 08.01.2014

BBC NEWS BBC NEWS BBC NEWS BBC NEWS BBC NEWS BBC NEWS BBC NEWSLessons in computer programming will be adopted by the national curriculum for primary schools ...

1351 videos foundNext > 

We're sorry, but there's no news about "Blacklist (computing)" right now.


Oops, we seem to be having trouble contacting Twitter

Talk About Blacklist (computing)

You can talk about Blacklist (computing) with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!