Browse Definitions :
Definition

greylist (or graylist)

A graylist (also spelled greylist) is a list of E-mail addresses or domain names a spam filter can use to identify suspected spam. If a message arrives from an address or domain on the list, it will be quarantined and then delivered to the subscriber only if the sender attempts to send the message again within a certain period of time. Once a sender has been recognized as legitimate, its address is removed from the list and future messages from that address can pass through the filter unhindered.

The chief advantage of graylisting is the fact that it eliminates most spam while giving desired e-mail traffic a chance to get through. It requires no special configuration efforts on the part of the end user and places no additional burden on the resources of the end user's computer. However, unless a sender transmits its first message to a graylist user twice from the same e-mail address within the prescribed time, the filter will reject the message. Graylisting can also cause annoying delays in the receipt of initial messages.

The term graylist arises from the fact that its mode of operation is between that of a blacklist and a whitelist. A blacklist is a list of e-mail addresses or domain names known to be sources of spam. After filtering, traffic from an address or domain on the list disappears forever. A whitelist works in the opposite way; it is a list of e-mail addresses or domain names from which an e-mail filter allows messages to be received.

This was last updated in April 2007

Continue Reading About greylist (or graylist)

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

Close