Saturday, May 27, 2006

Used by Antispam Method part 02

At second part of this article elaborate to regarding the method:

  • Bayesian Analisis
  • Authentication and Reputation (A&R)
  • Sender-supported whitelist and tag
  • HAM Password
  • Cost Based System
  • Tarpits and Honeypot
  • Challenge or Response System (C/R System)

to read this article is further please click here.

1 comment:

Muhammad Amir said...

With the increase in how do you stop spam usage of email, many users receive a number of unwanted and unsolicited commercial email messages that are known as spam.