Beauregard T. Shagnasty replied to hisself:

> robertbaer wrote:
>> * Picky; you darn well know what i mean - NO running of internal
>> scripts,  which BTW includes VB scripts..

Should have mentioned that VBScript in malicious email is probably non-
existent. No email client I know will execute it.

> All of the webmail apps I know of must have JavaScript enabled in order
> to meet even their basic functions. This means that any embedded
> JavaScript in an email you receive can and will execute. Any malicious
> executable file is still executable - and on your computer.

One more thing the webmail apps are not capable of... when HTML email 
from either malicious or regular mail uses web beacons to track you and 
your opening of the email - thus proving you're a live person and you 
opened the email - you cannot stop it. Most email clients like SM and TB 
allow you to *block* the loading of these beacons.

Examine the source code of most spam and most business email; you will 
find code calling up 1 pixel by 1 pixel images, with coded parameters. 
You read in webmail, you've been tagged. This is especially good for the 
spammers, who will now send you much more of it.

-- 
   -bts
   -This space for rent, but the price is high
_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to