Given the format below which might be img src=http://www.bigspammer.com/myscript.asp?optionaldata=like&whois=mike.nice @ImBeingSpammed.com
This leads to the temptation for corporate HTTP proxies to strip corporate E-mails from outgoing URLs. The next way spammers get around that is to just use dns - img src=http://348474.bigspammer.com/myscript.asp where the 348474 is the spamee ID number and resolves to WWW's IP. DNS logs correlate to E-mail hit information. > the article didn't mention until halfway through. Meanwhile, they are > screaming about cookies in spam -- a non-existent problem (searching > through about 3,500 recent spams showed 0 that set cookies). They are technically incorrect, but cookies are a legitimate problem. The image GET request is created with the browser. It will include any cookies from your last visit to the site serving up the image. Network solutions was one of the first to use this technique. Please visit http://www.ipswitch.com/support/mailing-lists.html to be removed from this list. An Archive of this list is available at: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Please visit the Knowledge Base for answers to frequently asked questions: http://www.ipswitch.com/support/IMail/
