But an HREF would relate to a link in the email itself which would have to
be clicked on to send that information through correct ? How would the mere
display of an image trigger off the code ?


-----Original Message-----
From: Roger Seielstad [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 20, 2003 12:13 PM
To: Exchange Discussions
Subject: RE: Can this happen with Spam ?


Yup - it's a standard reference. Basically, they use a dynamic page that
takes one URL parameter, which is the address of the user that the email was
sent to. That gets filed away into their database and viola, you're a live
user. The HTML code would probably look something like this:

<A HREF=http://www.spamhaus.com/[EMAIL PROTECTED]

Yet another reason HTML mail sux.

--------------------------------------------------------------
Roger D. Seielstad - MCSE
Sr. Systems Administrator
Inovis Inc.


> -----Original Message-----
> From: RBHATIA [mailto:[EMAIL PROTECTED] 
> Sent: Thursday, March 20, 2003 10:22 AM
> To: Exchange Discussions
> Subject: Can this happen with Spam ?
> 
> 
> Hi,
> As I try to battle the tons of spam related email my 
> organization receives everyday, I am amazed at the increasing 
> number of emails targetting our organization despite the fact 
> that we do have a filtering technology in place. Which brings 
> me to the question - are we doing something to invite these 
> emails ? I came across an article by Brian Livingstone 
> recently about spam and how certain tactics can invite 
> spammers to your organization. I quote a statement from his 
> article relating to the results of an experiment they carried 
> out at some law firm - "They found that 83 percent of the 
> spam being received contained a coded "tracking" image. When 
> the image was downloaded to be displayed in the message, it 
> alerted the senders that a message sent to a specific address 
> had been viewed. This is now the most prevalent mechanism by 
> which spammers find "live" accounts, in my opinion." Is this 
> possible in Outlook ? The article said something about with 
> the Preview pane being turned on in Outlook, this was more 
> likely to happen or just opening an email with this sort of 
> an image in it could also trigger the code. How can this 
> happen ? This means Outlook is allowing some code to get 
> executed that passes information back to the source. Isn't 
> there a security patch to prevent this from happening ? RB
> 
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
> 

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to