But an HREF would relate to a link in the email itself which would have to be clicked on to send that information through correct ? How would the mere display of an image trigger off the code ?
-----Original Message----- From: Roger Seielstad [mailto:[EMAIL PROTECTED] Sent: Thursday, March 20, 2003 12:13 PM To: Exchange Discussions Subject: RE: Can this happen with Spam ? Yup - it's a standard reference. Basically, they use a dynamic page that takes one URL parameter, which is the address of the user that the email was sent to. That gets filed away into their database and viola, you're a live user. The HTML code would probably look something like this: <A HREF=http://www.spamhaus.com/[EMAIL PROTECTED] Yet another reason HTML mail sux. -------------------------------------------------------------- Roger D. Seielstad - MCSE Sr. Systems Administrator Inovis Inc. > -----Original Message----- > From: RBHATIA [mailto:[EMAIL PROTECTED] > Sent: Thursday, March 20, 2003 10:22 AM > To: Exchange Discussions > Subject: Can this happen with Spam ? > > > Hi, > As I try to battle the tons of spam related email my > organization receives everyday, I am amazed at the increasing > number of emails targetting our organization despite the fact > that we do have a filtering technology in place. Which brings > me to the question - are we doing something to invite these > emails ? I came across an article by Brian Livingstone > recently about spam and how certain tactics can invite > spammers to your organization. I quote a statement from his > article relating to the results of an experiment they carried > out at some law firm - "They found that 83 percent of the > spam being received contained a coded "tracking" image. When > the image was downloaded to be displayed in the message, it > alerted the senders that a message sent to a specific address > had been viewed. This is now the most prevalent mechanism by > which spammers find "live" accounts, in my opinion." Is this > possible in Outlook ? The article said something about with > the Preview pane being turned on in Outlook, this was more > likely to happen or just opening an email with this sort of > an image in it could also trigger the code. How can this > happen ? This means Outlook is allowing some code to get > executed that passes information back to the source. Isn't > there a security patch to prevent this from happening ? RB > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED] _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]

