At 11:45 PM 12/21/2005, Neil Atwood typed:
There is no 'hidden' email address in the form (as such).

The simplest forms use something like this

 <FORM action="mailto:[EMAIL PROTECTED]" method="post">

instead of scripting and these are equally harvestable

It's encoded by server-side scripting, so the answer is no, the spambots have nothing to harvest.

That's the way it should be to prevent harvesting

 <FORM action="http://www.wavijo.com/cgi/somescript.cgi"; method="post">

but people that have sites that don't support scripting such as GeoCities have no choice other than to get another webhosting service.

As you probably know any Input can equal Hidden, Text, Password, Checkbox, Radio, Submit, Reset, File or Image such as

<INPUT TYPE=hidden NAME=recipient VALUE="[EMAIL PROTECTED]">
<INPUT TYPE=hidden NAME=subject VALUE="Feedback on your HTML Reference">

I'm not arguing that forms used with scripting aren't secure or not but rather just pointing out that the simplest form action like I have at the top should be avoided at all costs as it's no better than using mailto: elsewhere in the html. Here is a website devoted to revealing the problems with using "action="mailto:........"; <http://www.isolani.co.uk/articles/mailto.html>

----------+----------
   Wayne D. Johnson
Ashland, OH, USA 44805
<http://www.wavijo.com>

Reply via email to