One way to deal with is to use a firewall theory. I contain a list of e-mail address of people. So if I receive a e-mail, if it is not in my e-mail address list, it is discarded. The only problem is e-mail addresses can be faked. For example, its configuration could be: Allow <ietf@ietf.org> Deny <*@*.com>