CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Introduction to countering e-mail spam     
        6.1     Concept and Characteristics of spam         
        6.2     Approaches to countering e-mail spam       
 7     Anti-spam technologies    
        7.1     Overview  
        7.2     The importance of tool/technology context  
        7.3     Combining tests     
        7.4     Types of anti-spam technologies     
        7.5     Existence of the sender's domain and eliciting a response    
        7.6     Existence of a pointer record (PTR)           
        7.7     Blacklists/whitelists
        7.8     Address of the sending server treated as either "dynamic" or "residential"     
        7.9     Filtering  
       7.10     HELO/CSV         
       7.11     Greylisting
       7.12     Tokens/passwords
       7.13     Various techniques
       7.14      How to use this review of technologies and factors to consider      
       7.15     Rejection in the SMTP session      
       7.16     Silent rejection      
       7.17     Rejection by sending a DSN (delivery status notification or "bouncing")      
       7.18     Delivery to a spam box     
       7.19     Marking
Appendix I – Activities on countering e-mail spam     
        I.1        Introduction         
        I.2        International activities on countering spam 
        I.3        Development of technical specifications for countering spam          
        I.4        List of industry alliances and initiatives for countering spam
Bibliography