Beauregard T. Shagnasty replied to hisself: > robertbaer wrote: >> * Picky; you darn well know what i mean - NO running of internal >> scripts, which BTW includes VB scripts..
Should have mentioned that VBScript in malicious email is probably non- existent. No email client I know will execute it. > All of the webmail apps I know of must have JavaScript enabled in order > to meet even their basic functions. This means that any embedded > JavaScript in an email you receive can and will execute. Any malicious > executable file is still executable - and on your computer. One more thing the webmail apps are not capable of... when HTML email from either malicious or regular mail uses web beacons to track you and your opening of the email - thus proving you're a live person and you opened the email - you cannot stop it. Most email clients like SM and TB allow you to *block* the loading of these beacons. Examine the source code of most spam and most business email; you will find code calling up 1 pixel by 1 pixel images, with coded parameters. You read in webmail, you've been tagged. This is especially good for the spammers, who will now send you much more of it. -- -bts -This space for rent, but the price is high _______________________________________________ support-seamonkey mailing list [email protected] https://lists.mozilla.org/listinfo/support-seamonkey

