next message in archive
next message in thread
previous message in archive
previous message in thread
Index of Subjects
Index of Subjects
On Wed, 4 Oct 2000, Christopher Majka wrote:
[snip]
> 2) Something (not RCS, yes?) injects the <link> elements into HTML files.
> Mostly useful in ascribing ownership to files and hence the Lynx C)omment
> function. However, this hasn't really been widely employed and (I
> sometimes fear) is a convenient source from which spam engines harvest
> addresses.
[snip]
If the addresses were coded as "mailto:username@domain" instead
of "mailto:username@domain" this would break most of the spammers'
harvesters. Most of them just look for anything with '@' in the middle.
I have already tossed a suggestion at the tech team that some script be
generated that would change all occurrences of '@' in selected html files
into '@' to foil the harvesters -- possibly one that could be run
against a directory for IPs and that could be run against tagged files
in lynx for users.
Additional obfuscation, such as:
<quote>
If you have any comments about this site<br>
<A HREF="mailto:%20af380@( Norman )chebucto( De Forest ).ns( CIH.html ).ca">
send me an email message</A>.</P>
</quote>
can be left up to the editors. And, yes, that address works in an HTML
document. I have had three requests for assistance with virus problems
addressed:
To: af380@( Norman )chebucto( De Forest ).ns( CIH.html ).ca
since I started changing the addresses on my web pages (not quite
finished).
--
Norman De Forest http://www.chebucto.ns.ca/~af380/Profile.html
af380@chebucto.ns.ca [=||=] (A Speech Friendly Site)
"O'Reilly is to a system administrator as a shoulder length latex glove
is to a veterinarian." -- Peter da Silva in the scary devil monastery
next message in archive
next message in thread
previous message in archive
previous message in thread
Index of Subjects