Senders have to not use namespace mining strategies in opposition to Outlook.com inbound e-mail servers. Here is the exercise of verifying e mail addresses without sending (or attempting to send) email messages to People addresses. This process is often employed by malicious senders to produce lists of valid e-mail addresses which they can mail spa