Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
(→SMTP techniques: add SMTP pull) |
(→Administrative techniques: Added retaliation) |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 6: | Line 6: | ||
* [[Adaptive filters]] | * [[Adaptive filters]] | ||
** [[Bayesian filters]] | |||
** [[Collaborative filters]] | |||
* [[URL filtering]] | * [[URL filtering]] | ||
Line 44: | Line 46: | ||
* [[Path validation]] | * [[Path validation]] | ||
** [[Path validation manual techniques]] | |||
** [[SPF]] (Sender permitted from) | |||
** [[Sender-ID]] | |||
** [[SRS]] (Sender Rewriting Scheme) | |||
* [[Marking valid mail client hosts]] | |||
* [[Signatures]] | * [[Signatures]] | ||
Line 72: | Line 80: | ||
* [[Do not spam lists]] | * [[Do not spam lists]] | ||
* [[Abuse Reporting]] | |||
* [[Retaliation]] |
Latest revision as of 10:57, 30 September 2010
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.
Message content techniques
SMTP techniques
Address management
Network techniques
Whitelist techniques
- Path validation
- Path validation manual techniques
- SPF (Sender permitted from)
- Sender-ID
- SRS (Sender Rewriting Scheme)