Frequently Asked Questions:
Search the FAQ:
How do I make my Mailing List more secure?
The following are configuration options for your list to help protect it from unwanted mailings.
Configuration options for your list can be changed using the List Configuration Wizard in Listserv's Web Interface. Detailed inline help is available on these and other list configuration options within the web interface.
- Send= - This option controls who can send to your list. You should make this value as limited as possible, choosing either Owner, which would allow only the owner of the list to send to the list or Private, which would allow only members of the list to send to the list. You also have the option to set the Confirm flag for the sender which would mean that any time any of the allowed senders sends a message to the list, Listserv will first send a message to the sender's email address asking for confirmation before delivering messages. This is an effort to catch situations where a malicious third party has forged the sender's email address.
- Review= - This option controls who can ask Listserv for information about the list. You should make this value as limited as possible, choosing Owner(s) or even specifying that only one owner can review the list.
- Subscription= - This option controls who can subscribe new members to the list. You should make this value as limited as possible, choosing By owner.
- Confidential= - This option determines whether the list would be included in any listing of the lists available on this server. You should choose Yes to hide your list.
- Service= - This option will define an area within which members can communicate with the list. This area can be an IP address, domain or even country.
- Validate= - This option determines whether Listserv will require a password or send a confirmation email when it receives a request to act upon the list. The most secure option is Yes,Confirm. Protected commands are validated using the "OK" mechanism by default, although personal passwords are also accepted where appropriate.
Information Systems and Computing, University of Pennsylvania