At second part of this article elaborate to regarding the method:
- Bayesian Analisis
- Authentication and Reputation (A&R)
- Sender-supported whitelist and tag
- HAM Password
- Cost Based System
- Tarpits and Honeypot
- Challenge or Response System (C/R System)
to read this article is further please click here.