Well, IMHO this is no better than my solution using JS What
do you do if someone has cookies disabled?
I for my part often reject cookies 'just because' when I dont
feel they're really needed...
java script is client side.
it only prevents that a form can be submittet.
what if you
About that lynx discussion...
I don't think you're losing a single customer because your websites
don't support lynx. Usually people want to see a picture of the product
they're buying. And then there's the aspect, of who your target-market
is. Usually it's not the Linux-Geek (and even if it
Markus Wild wrote:
One that is less cumbersome than the type in the word in the weird
image approach is to set a cookie-like hidden parameter from the
server when it generates the form (I'm assuming php or perl behind
Well, IMHO this is no better than my solution using JS
What do you do
Glogger Steven wrote:
Well, IMHO this is no better than my solution using JS What
do you do if someone has cookies disabled?
I for my part often reject cookies 'just because' when I dont
feel they're really needed...
java script is client side.
it only prevents that a form can be
I will never recommend PHP to a customer or even a friend; however I
heard about an Apache module (by SuSE apparently) which is designed as a
security layer for mod_perl and mod_php. I haven't even tried it yet, but
I will the next time I need to support others' bad decisions.
If you know
Hi Folks!
We're facing a growing amount of automatically generated HTTP POST requests,
all containing spamvertising links like
http://19.altribeati.com/homoerectus/
As far as i know, there are the following ways to handle that:
a) Spamfilter of recipient shall filter that
b) Web-user has
Salut,
On Tue, Aug 15, 2006 at 05:35:26PM +0200, Matthias Hertzog wrote:
b) Web-user has to enter a unique number (generated image) in the form to
prove, he's a human being.
The problem here is that spam bots are apparrently exceptionally good
already at reading these characters out of the
Jeroen Massar wrote:
Matthias Hertzog wrote:
Hi Folks!
We're facing a growing amount of automatically generated HTTP POST
requests, all containing spamvertising links like
http://19.altribeati.com/homoerectus/
As far as i know, there are the following ways to handle that:
Does anyone out
Salut,
On Tue, Aug 15, 2006 at 06:19:21PM +0200, Matthias Keller wrote:
One thing I have been pretty successful in blocking spam is javascript...
Of course one can argue not all browser support or execute JS but today
when every 3rd site completely relies on JS this is no valid point
On Tue, 2006-08-15 at 17:35 +0200, Matthias Hertzog wrote:
We're facing a growing amount of automatically generated HTTP POST requests,
all containing spamvertising links
We are also struggling with this issue, but not only since a few days or
weeks. I get 3-6 abused forms each day!
IMO it's
Tonnerre LOMBARD wrote:
Salut,
On Tue, Aug 15, 2006 at 06:19:21PM +0200, Matthias Keller wrote:
One thing I have been pretty successful in blocking spam is javascript...
Of course one can argue not all browser support or execute JS but today
when every 3rd site completely relies on JS
@MK: Your method implies, that the user has a javascript enabled
browser, else the post would fail. This means in the end you loose
customers, because they're surfing with lynx.
Peter
On 8/15/06, Matthias Keller [EMAIL PROTECTED] wrote:
Tonnerre LOMBARD wrote:
Salut,
On Tue, Aug 15, 2006
12 matches
Mail list logo