NEW in Netquery Version 2.3Email Address Validation!
See it
HERE! Download it
HERE! Discuss it
HERE!Version 2.3 of Netquery, the complete PHP/SQL open-source toolkit of network information utilities, includes a new email address validation feature. It first checks the entry for correct format and then checks the domain portion against MX and other DNS records. Finally, if the option is enabled, it queries the MX server itself to verify the full address.* Version 2.3 also includes the latest ports table data update, a port services popup for admin checking of variants in new submissions, and the CMS editions include a "Netquery Quick" block for most query types, including email address validation.
Netquery's current major features include:
- multidomain & IP/AS whois lookups,
- DNS and Dig (ANY, SOA, NS, MX) queries,
- email address format & MX validation,
- port services & exploits lookup with status check,
- HTTP HEAD and GET requests,
- ICMP pings (local and/or remote),
- traceroutes (local and/or remote),
- looking glass router interrogation,
- whois TLD server autodiscovery, and
- user submissions with admin notice & approval.
The administrator can enable or disable each feature individually and can configure local execution and/or a remote server script for the ping and traceroute features. The administrator can also edit all of the data tables used by the whois, port services and looking glass features and can allow site users to submit port services and exploits information for acceptance. Major data tables can be downloaded and updated independently of the module itself.
For additional details, please see the
Netquery Manual or go to the
VIRtech Forums for discussion and answers. Comments may also be posted under the
Dev.Xoops Project.
__________
[size=x-small]* Please note that email address validations do
not send any email message to anyone. However, MX server queries connect on port 25 and do require bidirectional traffic on that port. For sites hosted on Microsoft Windows servers, only format checking is possible unless the server has read-execute access for the operating system's nslookup.exe file.[/size]