Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
(→Administrative techniques: Add abuse reporting) |
mNo edit summary |
||
Line 44: | Line 44: | ||
* [[Path validation]] | * [[Path validation]] | ||
** [[Path validation manual techniques]] | |||
** [[SPF]] (Sender permitted from) | |||
** [[Sender-ID]] | |||
** [[SRS]] (Sender Rewriting Scheme) | |||
* [[Signatures]] | * [[Signatures]] | ||
Line 63: | Line 67: | ||
* [[Postage]] | * [[Postage]] | ||
* [[Attention bonds]] | * [[Attention bonds]]* [[Path validation manual techniques]] | ||
* [[SPF]] (Sender permitted from) | |||
* [[Sender-ID]] | |||
* [[SRS]] (Sender Rewriting Scheme) | |||
* [[Captchas]] | * [[Captchas]] |
Revision as of 12:12, 31 January 2010
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.
Message content techniques
SMTP techniques
Address management
Network techniques
Whitelist techniques
- Path validation
- Path validation manual techniques
- SPF (Sender permitted from)
- Sender-ID
- SRS (Sender Rewriting Scheme)
Message validation techniques
Introduction techniques
- SPF (Sender permitted from)
- SRS (Sender Rewriting Scheme)