Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

PHP Implementation of HashCash

Posted on 2007-04-03
2
Medium Priority
?
545 Views
Last Modified: 2008-02-01
Does anyone know of a PHP implementation of hashcash?

Also, is there an estimate of what percentage of mail servers support hashcash?
0
Comment
Question by:sypder
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 1500 total points
ID: 18845127
HashCash is supported in spamassassin versions 3.0 and upwards. Spamassassin is probably the most popular antispam system for mail servers so it should be widely supported.


I could not find a php library for hashcash but wordpress does have hashcash support and it is written in php. See http://elliottback.com/wp/archives/2005/10/23/wordpress-hashcash-30-beta/
0
 
LVL 3

Author Comment

by:sypder
ID: 18845598
I am surprised there is not a php library, I had no lucky with Google. I will take a look at wordpress and try to understand it.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question