Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
(→Administrative techniques: Added retaliation) |
|||
(9 intermediate revisions by 3 users not shown) | |||
Line 6: | Line 6: | ||
* [[Adaptive filters]] | * [[Adaptive filters]] | ||
** [[Bayesian filters]] | |||
** [[Collaborative filters]] | |||
* [[URL filtering]] | * [[URL filtering]] | ||
Line 16: | Line 18: | ||
* [[Callbacks]] | * [[Callbacks]] | ||
* [[Rate limits]] | |||
* [[SMTP pull]] | |||
==Address management== | ==Address management== | ||
Line 24: | Line 30: | ||
* [[Disposable addresses]] | * [[Disposable addresses]] | ||
==Network techniques== | ==Network techniques== | ||
Line 42: | Line 46: | ||
* [[Path validation]] | * [[Path validation]] | ||
** [[Path validation manual techniques]] | |||
** [[SPF]] (Sender permitted from) | |||
** [[Sender-ID]] | |||
** [[SRS]] (Sender Rewriting Scheme) | |||
* [[Marking valid mail client hosts]] | |||
* [[Signatures]] | * [[Signatures]] | ||
Line 62: | Line 72: | ||
* [[Attention bonds]] | * [[Attention bonds]] | ||
* [[Captchas]] | |||
==Administrative techniques== | ==Administrative techniques== | ||
Line 68: | Line 80: | ||
* [[Do not spam lists]] | * [[Do not spam lists]] | ||
* [[Abuse Reporting]] | |||
* [[Retaliation]] |
Latest revision as of 10:57, 30 September 2010
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.
Message content techniques
SMTP techniques
Address management
Network techniques
Whitelist techniques
- Path validation
- Path validation manual techniques
- SPF (Sender permitted from)
- Sender-ID
- SRS (Sender Rewriting Scheme)