Given the format below which  might be

  img
src=http://www.bigspammer.com/myscript.asp?optionaldata=like&whois=mike.nice
@ImBeingSpammed.com

 This leads to the temptation for corporate HTTP proxies to strip corporate
E-mails from outgoing URLs.  The next way spammers get around that is to
just use dns -

  img src=http://348474.bigspammer.com/myscript.asp

   where the 348474 is the spamee ID number and resolves to WWW's IP.   DNS
logs correlate to E-mail hit information.

> the article didn't mention until halfway through.  Meanwhile, they are
> screaming about cookies in spam -- a non-existent problem (searching
> through about 3,500 recent spams showed 0 that set cookies).

   They are technically incorrect, but cookies are a legitimate problem.
The image GET request is created with the browser.  It will include any
cookies from your last visit to the site serving up the image.  Network
solutions was one of the first to use this technique.



Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Please visit the Knowledge Base for answers to frequently asked
questions:  http://www.ipswitch.com/support/IMail/

Reply via email to