Linuxdoc Linux Questions
Click here to ask our community of linux experts!
Custom Search

Chapter 2. Techniques

In this chapter, we look at various ways to weed out junk mail during the SMTP transaction from remote hosts. We will also try to anticipate some of the side effects from deploying these techniques.