A method for identifying unsolicited electronic mail messages in a
computer network. The method includes receiving an electronic mail
message and removing non-static data from the electronic mail message. A
checksum is generated based on data remaining within the electronic mail
message and compared with a database containing checksums for previously
identified unsolicited messages. The method further includes identifying
the electronic message as an unsolicited message if the generated
checksum matches one of the database checksums.