Senders need to not use namespace mining approaches towards Outlook.com inbound e mail servers. This is the practice of verifying email addresses with out sending (or seeking to ship) emails to those addresses. This technique is commonly used by malicious senders to produce lists of valid e-mail addresses they can mail spam, phishing e-mail or malw