Email Authentication - Controlling Users

Controlling Users

This section may stray from the topic of the article. Please help improve this section or discuss this issue on the talk page.

There are a number of things that ISPs have done to stop zombies and deliberate spamming by their customers:

  • port 25 can be blocked by access providers in favor of the Mail submission agent's port 587 that should always require authentication,
  • the number of existing Received headers in relayed mail can be limited. A small sample of reports from SpamCop seems to validate this.
  • infected computers can be cleared of viruses and patched to resist further infection,
  • outgoing email can be monitored for any sudden increase in flow or in content that is typical of spam.

Some ISPs have been quite successful, but others don't care to make the effort. With spam now over 80% of all email traffic, it can be expected that there will always be ISPs who are not willing to take the necessary steps. The measures mentioned above don't directly help the entity who operates them to reduce incoming spam. By reducing outgoing spam, they help generic Internet users.

Read more about this topic:  Email Authentication

Famous quotes containing the word controlling: