Example of validating communication
These communications may be a nuisance to users who receive them.
 Spam may utilize the resources of a user's electronic device for receiving e-mail, such as computers, personal digital assistants (PDA's), cellular telephones and the like.
BRIEF DESCRIPTION OF THE DRAWINGS  In the accompanying drawings, which are incorporated in and constitute a part of the specification, embodiments are illustrated which, together with the detailed description given below, serve to describe the example embodiments.
It will be appreciated that the embodiments illustrated in the drawings are shown for the purpose of illustration and not for limitation.
Both singular and plural forms of all terms fall within each meaning.
 As used in this application, the term "computer component" refers to a computer- related entity, either hardware, firmware, software, a combination thereof, or software in execution.
DETAILED DESCRIPTION  The following includes definitions of selected terms used throughout the disclosure.Messages identified as sent from spammers may be prevented from reaching a user or being viewed by a user.