| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: `web bug` blocking |
From: "Geo."
"Rich" wrote in message news:3ebbdade{at}w3.nls.net...
>> I don't know what you have in your page. What I look at are the many
ways you can make an external reference from HTML. There are many.<<
1) http://216.144.1.23/oe.gif?=
%subject%"
alt=3D"oe.gif (1024 bytes)">
2) >http://216.144.1.23:119/oe.gif?=
%subject%"
alt=3D"oe.gif (1024 bytes)">
Basically people would firewall their mail client outbound port 80 and then
email me they were safe, so the second one does outbound on the NNTP port.
I suppose I could also have set it up for port 25 and 110 as well. The
%subject% is just a variable I use to get their email address into the link
so it gets logged.
If you know of other techniques, show me the critical parts and I'll build
a whole set of tests. I'm not really concerned with mime encoding or other
ways of getting webbugs past a spam filter, I mean techniques to get an
outbound connection that can be logged as verification.
Geo.
--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.