This document discusses the evolution of spam and techniques used to fight it. It begins with definitions and a brief history of spam. It then covers the messaging process and how spammers operate with intent to market products, conduct phishing, or spread malware. Various anti-spam technologies are described, including whitelists/blocklists, greylisting, SPF, DKIM, filters, and reputation systems. Organized spamming techniques like targeting low priority servers and evading filters are also outlined. Sample spam messages are shown to illustrate different spamming methods.