Blacklist (computing)
In computing, a blacklist or block list is a basic access control mechanism that allows everyone access, except for the members of the black list (i.e. list of denied accesses). The opposite is a whitelist, which means allow nobody, except members of the white list. As a sort of middle ground, a greylist, contains entries that are temporarily blocked or temporarily allowed. Greylist items may be reviewed or further tested for inclusion in a blacklist or whitelist.
An organization may keep a blacklist of software or websites in its computer system. Titles on the list would be banned and everything else would be allowed. For example, a school might blacklist Limewire and ICQ; other Internet services would still be allowed.
Examples
- Companies like Google, Norton and Sucuri keep internal blacklists of sites known to have malware and they display a warning before allowing the user to click them.
- Content-control software such as DansGuardian and SquidGuard may work with a blacklist in order to block URLs of sites deemed inappropriate for a work or educational environment.
- An e-mail spam filter may keep a blacklist of addresses, any mail from which would be prevented from reaching its intended destination. A popular technique for implementing blacklists is DNS blacklisting (DNSBL).
- A firewall or IDS may also use a blacklist to block known hostile IPs and/or networks. An example for such a list would be the OpenBL project.
- Many copy protection schemes include software blacklisting.
- Members of online auction sites may add other members to a personal blacklist. This means that they cannot bid on or ask questions about your auctions, nor can they use a "buy it now" function on your items.
- Yet another form of list is the yellow list which is a list of email server IP addresses that send mostly good email but do send some spam. Examples include Yahoo, Hotmail, and Gmail. A yellow listed server is a server that should never be accidentally blacklisted. The yellow list is checked first and if listed then black list tests are ignored.
- In Linux modprobe, the
blacklist modulename
entry in a modprobe configuration file indicates that all of the particular module's internal aliases are to be ignored. There are cases where two or more modules both support the same devices, or a module invalidly claims to support a device.
- Many browsers have the ability to consult anti-phishing blacklists in order to warn users who unwittingly aim to visit a fraudulent website.
- Many P2P programs support blacklists that block access from sites known to be owned by Intellectual Property holders. An example is the Bluetack[1] blocklist set.
See also
References
External links