Blog

From the Lab

This is part 7 of an 8 part series on Email Authentication, to go to part one click here. ISP Adoption of Email Authentication As stated earlier, there has been no general adoption of one specific email authentication standard by the ISP and receiving communities. Additionally, ISPs generally have not been forthcoming about what authentication methods […]

Continue Reading

This is part 6 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys Identifed Mail (DKIM) DomainKeys Identified Mail (DKIM) is the successor to Yahoo DomainKeys. Being very similar in functionality to DomainKeys, DKIM has additionally adopted aspects from Cisco’s Identified Internet Mail standard (IIM), and the result […]

Continue Reading

This is part 5 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys DomainKeys is a domain-level authentication standard that uses public/private key encryption, DNS, and multiple policies to prove the legitimacy and contents of an email message. It verifies the domain used in the “from” or “sender” header. […]

Continue Reading

This is part 4 of an 8 part series on Email Authentication, to go to part one click here. Sender ID Framework (Sender ID) Very similar to SPF version 1 is SPF 2.0, more commonly known as Sender ID. Sender ID works on the same principles as SPF, with the exception that it not only has […]

Continue Reading

This is part 3 of an 8 part series on Email Authentication, to go to part one click here. Sender Policy Framework (SPF) For purposes of clarification, the term SPF used in this section refers to SPFv1 or SPF Classic. SPF 2.0 will be discussed in the next section under Sender ID. Sender Policy Framework (SPF) […]

Continue Reading

This is part 2 of an 8 part series on Email Authentication, to go to part one click here. A Brief History of Email Authentication Meng Weng Wong and Sender Policy Framework The concept of email authentication – validating sender email either by IP address or encryption – dates back as far as 1997. Multiple specifications […]

Continue Reading

Introduction The objective of this paper is to provide a brief overview and description of the most commonly used email authentication practices and methodologies. It is not exhaustive in nature, and does not cover every aspect of every technology in use today. It does, however, cover the main topics and points of discussion with regard […]

Continue Reading

Server administrators who host mail accounts for multiple customers need to answer the question, “Should each customer have their own dedicated IP address or should they all share a single IP?” The answer might not be as easy as you think because both email options have positives and negatives. This question should be answered based […]

Continue Reading

If you are experiencing email delivery problems or delay issues when sending to the larger ISP’s then most likely there is a reputation problem with your IP address.  The first thing any ISP will tell you when you ask how you can improve your reputation is to follow their best practices guide.  The problem is […]

Continue Reading

Someone recently asked me, “What is the optimum frequency for delivering email messages to a subscribed user base?” This person was trying to determine email frequency so that he could minimize the number of people opting out of his communications. I explained to him that it is not only the frequency, but many other variables […]

Continue Reading

Customers Who Trust in SocketLabs

You’re in good company when working with SocketLabs. Here are some companies who have also trusted SocketLabs.

Why SocketLabs?