junk mail analysis, part 2