David Lesher said:

>The Phish wars are way past that...
Past what?

>I see gif's with the URL embedded in the GIF & similar.
Your point being? In a text-only email message Gifs are largely
irrelevant, reside on the hard disk or in my case, because of scripting,
in my trash can. If one allow messages to automatically fetch materials
from the net, then that is a serious security risk.

I still maintain that you can't redirect a URL pointing to server A and
make it go to server B, unless you hack server A or intercept the browser
call and pretend to be server A while you're not. 
But of course you can make it seem, to a unknowing user, like it points
to server A even in a text-only message by calling the URL something
like: <servera.serverb.com>, but if the user knows that it is the first
domain string to the immediate left of the .com top domain that
determines the server, that won't fool him/her. Hmmm, I suppose you could
also hack the DNS server. How would anyone determine that and protect
themselves?

This all said, it's also still good advice to skip the URL inside the
email message and go to your browser and log in where you usually log in.... 


-- 
G-Books is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-Books list info:      <http://lowendmac.com/lists/g-books.html>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-books%40mail.maclaunch.com/>



---------------------------------------------------------------
>The Think Different Store
http://www.ThinkDifferentStore.com
---------------------------------------------------------------


Reply via email to