1   
 Scope  
 2     References  
 3     Definitions   
 4     Abbreviations and acronyms         
 5     Conventions      
 6     Introduction to countering
e-mail spam      
        6.1     Concept and Characteristics of spam          
        6.2     Approaches to
countering e-mail spam        
 7     Anti-spam technologies     
        7.1     Overview   
        7.2     The importance of
tool/technology context   
        7.3     Combining tests      
        7.4     Types of anti-spam technologies      
        7.5     Existence of the sender's domain and eliciting a response     
        7.6     Existence of a pointer record (PTR)            
        7.7     Blacklists/whitelists 
        7.8     Address of the sending server treated as either "dynamic"
or "residential"      
        7.9     Filtering   
       7.10     HELO/CSV          
       7.11     Greylisting 
       7.12     Tokens/passwords 
       7.13     Various techniques 
       7.14      How to use this review of technologies and factors to consider       
       7.15     Rejection in the SMTP session       
       7.16     Silent rejection       
       7.17     Rejection by sending a DSN (delivery status notification or
"bouncing")       
       7.18     Delivery to a spam box      
       7.19     Marking 
Appendix I – Activities on countering e-mail spam     
        I.1        Introduction          
        I.2   
    International activities on countering
spam  
        I.3   
    Development of technical specifications
for countering spam           
        I.4   
    List of industry
alliances and initiatives for countering spam 
Bibliography