TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Rich
date: 2003-05-09 18:20:06
subject: Re: `web bug` blocking

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0E0F_01C31657.9E314220
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   If you want other techniques, look at the HTML specs from Microsoft =
and others.  Every place a URL can appear is a potential external =
reference.  I don't care about encoding either.  It is irrelevant as the =
decoded HTML is what gets rendered.  It may matter to virus walls and =
spam filters but they are something else.

Rich

  "Geo."  wrote in message =
news:3ebc3636$1{at}w3.nls.net...
  "Rich"  wrote in message news:3ebbdade{at}w3.nls.net...
  >>   I don't know what you have in your page.  What I look at are the =
many
  ways you can make an external reference from HTML.  There are many.<<

  1)  http://216.144.1.23/oe.gif?=3D
  %subject%"
      alt=3D3D"oe.gif (1024 bytes)">

  2)  >http://216.144.1.23:119/oe.gif?=3D
  %subject%"
      alt=3D3D"oe.gif (1024 bytes)">

  Basically people would firewall their mail client outbound port 80 and =
then
  email me they were safe, so the second one does outbound on the NNTP =
port. I
  suppose I could also have set it up for port 25 and 110 as well. The
  %subject% is just a variable I use to get their email address into the =
link
  so it gets logged.

  If you know of other techniques, show me the critical parts and I'll =
build a
  whole set of tests. I'm not really concerned with mime encoding or =
other
  ways of getting webbugs past a spam filter, I mean techniques to get =
an
  outbound connection that can be logged as verification.

  Geo.


------=_NextPart_000_0E0F_01C31657.9E314220
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   If you want other =
techniques, look at=20
the HTML specs from Microsoft and others.  Every place a URL can =
appear is=20
a potential external reference.  I don't care about encoding =
either. =20
It is irrelevant as the decoded HTML is what gets rendered.  It
may = matter=20
to virus walls and spam filters but they are something =
else.
 
Rich
 

  "Geo." <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net>
wrote=20
  in message news:3ebc3636$1{at}w3.nls.net..."Rich"=20
  <{at}> wrote in message news:3ebbdade{at}w3.nls.net...>=
>  =20
  I don't know what you have in your page.  What I look at are the=20
  manyways you can make an external reference from HTML.  There =
are=20
  many.<<1)  <img
src=3D3D"http://216.144.1.23/oe.gif?=3D=">http://216.144.1.23/oe.gif?=3Dhttp://216.144.1.23/oe.gif">http://216.144.1.23/oe.gif?=3D=
>%subject%"   =20
  alt=3D3D"oe.gif (1024
bytes)">2)  ><img =
src=3D3D"http://216.144.1.23:119/oe.gif=">http://216.144.1.23:119/oe.gifhttp://216.144.1.23:119/oe.gif">http://216.144.1.23:119/oe.gif=
>?=3D%subject%"   =20
  alt=3D3D"oe.gif (1024
bytes)">Basically people would =
firewall their=20
  mail client outbound port 80 and thenemail me they were safe, so =
the=20
  second one does outbound on the NNTP port. Isuppose I could also =
have set=20
  it up for port 25 and 110 as well. The%subject% is just a variable =
I use=20
  to get their email address into the linkso it gets =
logged.If you=20
  know of other techniques, show me the critical parts and I'll build =
awhole=20
  set of tests. I'm not really concerned with mime encoding or =
otherways of=20
  getting webbugs past a spam filter, I mean techniques to get =
anoutbound=20
  connection that can be logged as=20
verification.Geo.

------=_NextPart_000_0E0F_01C31657.9E314220--

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.