TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Rich
from: Geo.
date: 2003-05-09 19:15:30
subject: Re: `web bug` blocking

From: "Geo." 

"Rich"  wrote in message news:3ebbdade{at}w3.nls.net...
>>   I don't know what you have in your page.  What I look at are the many
ways you can make an external reference from HTML.  There are many.<<

1)  http://216.144.1.23/oe.gif?=
%subject%"
    alt=3D"oe.gif (1024 bytes)">

2)  >http://216.144.1.23:119/oe.gif?=
%subject%"
    alt=3D"oe.gif (1024 bytes)">

Basically people would firewall their mail client outbound port 80 and then
email me they were safe, so the second one does outbound on the NNTP port.
I suppose I could also have set it up for port 25 and 110 as well. The
%subject% is just a variable I use to get their email address into the link
so it gets logged.

If you know of other techniques, show me the critical parts and I'll build
a whole set of tests. I'm not really concerned with mime encoding or other
ways of getting webbugs past a spam filter, I mean techniques to get an
outbound connection that can be logged as verification.

Geo.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 633/267 270
@PATH: 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.