About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 62. Chapters: DNSBL, Anti-spam techniques, Type I and type II errors, Sender Policy Framework, Bayesian spam filtering, DomainKeys Identified Mail, Proofpoint, Inc., Greylisting, Barracuda Networks, Scunthorpe problem, SpamAssassin, Challenge-response spam filtering, Hashcash, Callback verification, Sender ID, The Abusive Hosts Blocking List, Bayesian poisoning, Mail Abuse Prevention System, Messaging Architects, Sendio, Nolisting, Sieve, MARID, IntY, SMTP proxy, Spam Reader, Boxbe, Content filtering, Postini, CRM114, Vouch by Reference, Cost-based anti-spam systems, Cloudmark, MIMEDefang, E-mail filtering, Akismet, DSPAM, SpamBayes, MailScanner, POPFile, Complement set email filtering, Red Condor, Anti-Spam SMTP Proxy, Bogofilter, Policyd-weight, MailChannels, Microsoft Forefront Online Protection for Exchange, Markovian discrimination, DNSWL, X-ASVP eXtensible Anti-spam Verification Protocol, Tagged Message Delivery Agent, Distributed Checksum Clearinghouse, Guinevere, Trusted Email Open Standard, Vipul's Razor, Context filtering, Mailwasher, Hexamail Guard, Microsoft Exchange Hosted Services, Spam Bully, Anti-spam appliances, OCML, ARMM, Ingo, Penny Black, Sparse binary polynomial hashing. Excerpt: To prevent e-mail spam (aka unsolicited bulk email), both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate e-mail vs. not rejecting all spam, and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by e-mail administrators, those th...