Joke Collection Website - Blessing messages - What are whitelists and blacklists?

What are whitelists and blacklists?

Mobile phones generally come with whitelist and blacklist functions. White list means that only the people in this white list will call and send you text messages after setting. Anyone who calls you or sends you a text message that is not on the white list will be directly hidden by the system screen.

Blacklist means that after you add people you don't want to contact, people on the blacklist will be directly blocked by the system when they call you, and the other party will prompt that the number is busy and not in the service area.

The concept of white list corresponds to "blacklist". White list is to set users who can pass, and users outside the white list cannot pass; Blacklist is to set users who can't pass, and all users outside the blacklist can pass; So generally speaking, there are more users restricted by white lists than blacklists. If the white list is set, users (or IP addresses, IP packets, emails, etc. ) will be given priority in the white list and will not be rejected as spam, so the security and speed are greatly improved.

The concept of 1. whitelist corresponds to "blacklist". For example, in the computer system, many softwares apply the black-and-white list rule, such as operating system, firewall, antivirus software, e-mail system, application software and so on. And almost all of them apply the black-and-white list rule in control.

2. White list is to set users who can pass, and users outside the white list cannot pass. There are more users on the white list than on the black list.

3. Whitelisting technology can allow enterprises to approve which processes can run in a specific system. Some vendors' products only include executable files, while others include scripts and macros, which can block a wider range of files.

4. Whitelisting has always been considered to be difficult to deploy and time-consuming to manage, which makes it difficult for enterprises to deal with employees who want to deploy their chosen applications. However, in recent years, the whitelist product has made great progress, which is better combined with the existing terminal security technology, eliminates the obstacles of deployment and management, and provides automatic approval for users who want to install applications quickly.