1
Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 Introduction to countering
e-mail spam
6.1 Concept and Characteristics of spam
6.2 Approaches to
countering e-mail spam
7 Anti-spam technologies
7.1 Overview
7.2 The importance of
tool/technology context
7.3 Combining tests
7.4 Types of anti-spam technologies
7.5 Existence of the sender's domain and eliciting a response
7.6 Existence of a pointer record (PTR)
7.7 Blacklists/whitelists
7.8 Address of the sending server treated as either "dynamic"
or "residential"
7.9 Filtering
7.10 HELO/CSV
7.11 Greylisting
7.12 Tokens/passwords
7.13 Various techniques
7.14 How to use this review of technologies and factors to consider
7.15 Rejection in the SMTP session
7.16 Silent rejection
7.17 Rejection by sending a DSN (delivery status notification or
"bouncing")
7.18 Delivery to a spam box
7.19 Marking
Appendix I – Activities on countering e-mail spam
I.1 Introduction
I.2
International activities on countering
spam
I.3
Development of technical specifications
for countering spam
I.4
List of industry
alliances and initiatives for countering spam
Bibliography