MBR wrote:

> ...
> the contents
> of the "src=" attribute on the <img> tag that fetches the image.  In
> addition to the hostname and path to the image, it sends CGI arguments
> which contain MY email address!  Ingenious of someone to figure out
> that CGI arguments are not limited to <a href=...>, and you can send
> them in <img src=...> as well, but nasty!

That's a very old trick. SpamAssassin is not the program to defeat it
though. It's a spam detector, not a spam cleaner. Even if it were,
spammers would quickly find a way around it, e.g. embedding your address
(possibly encrypted) in the base image filename. I wouldn't be surprised
if that's already been done.

Some possible solutions

1) don't open spam
2) read all mail as plain text. Even traditionally insecure clients like
MS Outlook [Express] can do this these days
3) restrict access by your mail client to machines you trust. To keep
things simple, I have my firewall set to allow my mail client access
only to stmp and pop3 ports, which works just as well (for the moment).

-- Mat.



-------------------------------------------------------
This SF.Net email sponsored by: Free pre-built ASP.NET sites including
Data Reports, E-commerce, Portals, and Forums are available now.
Download today and enter to win an XBOX or Visual Studio .NET.
http://aspnet.click-url.com/go/psa00100006ave/direct;at.asp_061203_01/01
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to