473,386 Members | 1,790 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,386 software developers and data experts.

email address verification program

I am trying to write a program that can verify an email address
without sending mail to it.

any hint/clue will be quite useful to me.

May 31 '07 #1
4 4334
ak************@gmail.com wrote:
I am trying to write a program that can verify an email address
without sending mail to it.

any hint/clue will be quite useful to me.
This certainly isn't the place to ask.

--
Ian Collins.
May 31 '07 #2
ak************@gmail.com wrote:
I am trying to write a program that can verify an email address
without sending mail to it.
You'll have to decide what you mean by "verify", then. If it's
just syntax, pick a suitable regular expression. If the address
has to "exist", you'll have to build some kind of table of
known addresses and use something like a hash table or search
tree to see if the address you have is one of those.

These techniques are not specific to C; if you want to use them
in C you'll either have to write code for them (questions about
which are topical) or find libraries (topicality of which will
depend on how you ask and the attitudes of the responders).
any hint/clue will be quite useful to me.
Explaining the wider context of your problem will often help
us to give useful answers. Must you write this in C, or would
a shell or Ruby [1] script be OK? Is this an exercise, homework,
or real code? If C, must it be portable or need it work only
on your local system? Are you going to spam the verified addresses
or just check that users have identified themselves sensibly?

Most Recent Repeated Enlightenment: don't fight the tide. Every
programming language & framework has its own oceanography.

[1] Or Perl or Python or ...

--
"The path to the web becomes deeper and wider." - October Project

Hewlett-Packard Limited Cain Road, Bracknell, registered no:
registered office: Berks RG12 1HN 690597 England

May 31 '07 #3
On 31 May, 09:54, "akhilesh.no...@gmail.com"
<akhilesh.no...@gmail.comwrote:
I am trying to write a program that can verify an email address
without sending mail to it.

any hint/clue will be quite useful to me.
This is most certainly not the correct group for your question. For
one possible solution, check out the Perl module Email::Valid at:
http://search.cpan.org/~rjbs/Email-V...Email/Valid.pm

"This module determines whether an email address is well-formed, and
optionally, whether a mail host exists for the domain. Please note
that there is no way to determine whether an address is deliverable
without attempting delivery".
May 31 '07 #4
In article <11********************@o5g2000hsb.googlegroups.co m>,
<ke***@bytebrothers.co.ukwrote:
>On 31 May, 09:54, "akhilesh.no...@gmail.com"
<akhilesh.no...@gmail.comwrote:
>I am trying to write a program that can verify an email address
without sending mail to it.
>check out the Perl module Email::Valid
>"This module determines whether an email address is well-formed, and
optionally, whether a mail host exists for the domain. Please note
that there is no way to determine whether an address is deliverable
without attempting delivery".
Even attempting delivery will not reliably tell you whether the
address is deliverable: I have encountered a fair number of systems
that will accept email for any address apparently in their domain,
returning bounce messages for the undeliverable ones. Or just throwing
away the undeliverable ones. Or doing fuzzy pattern matching on
the address and delivering to the best match...

--
"law -- it's a commodity"
-- Andrew Ryan (The Globe and Mail, 2005/11/26)
May 31 '07 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: vishal | last post by:
how can i verify the email address entered by client??? is there any readily available function for that in php or mysql????? else suggest me some links for verifying email address enetered...
4
by: dmiller23462 | last post by:
So here's my problem.....I need to set up different email distributions based on which option in the following Select form has been chosen....For instance if "Putaway" is chosen it needs to email...
1
by: frekster | last post by:
Hi. Looking for some feedback on how to prevent a specific spam attack. I have a form for a person to subscribe to a mailing list and they can type in their email and click submit to...
2
by: Wayne Wengert | last post by:
I want to write a Windows application to go through all the email addresses in an SQL Server table and to report which ones are invalid. From Googling and perusing NGs it is my understanding that...
2
by: toedipper | last post by:
Hello, php and mysql I am looking to start a newsletter on my site. I imagine I will have a text box that users enter their email address into and a button that says 'subscribe' To stop...
0
by: comp.lang.php | last post by:
I wrote a method that should check if an email address is valid. In another method I've already checked to see if $_POST exists and is well-formed, so those checks are not necessary in this scope....
4
by: Mike | last post by:
Hi all, In my recent ASP.NET 2.0 appl, I need to verify that the supplied email address is valid or not. So, here's my situation: - In my <profilearea, I created <isVerifiedproperty. - Suppose a...
1
by: Jagadesh | last post by:
Hello for all, how to create an email verification... Not an syntax verification,. whether the email id is availble for the domain or not.. I will gave some link.. check that ...there's an...
0
by: WORLD HEALTH ORGANIZATION | last post by:
WORLD HEALTH ORGANIZATION IN CONJUNCTION WITH THE UNITED NATION & THE FEDERAL MINISTRY OF FINANCE ALAMO OFFICE COMPLEX ICY LAGOS WEST AFRICA. Dear Beneficiary, Congratulations as we bring...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.