On Sun, 4 Jul 2010 23:12:22 -0400, Paul M Foster wrote: > On Sun, Jul 04, 2010 at 11:44:29PM +0100, Ashley Sheridan wrote: > ><snip> > >> It is nice to be able to format emails nicely, but you have to realise >> when to restrain yourself. I've been getting loads of emails from Adobe >> lately that haven't been formatted well at all, and appear awfully in my >> email client (Evolution, which I consider to be a very good client) until >> I download all the images they've used as backgrounds. It's situations >> like this that give HTML emails an awful name. > > Isn't this a popular exploit these days? I don't really watch these > things since I use Linux and view mail as straight text. But isn't there > some current exploit where images which can be downloaded as part of an > email actually contain code which can be used to sniff your system or > somesuch? If nothing else, it is useful as a tracking tool. When the request to download the images occurs, it tells the spammer mothership that the email _was_ received and *actually* read. Ergo, it's a 'live' email addy. The image URIs are usually encoded with unique-by-email-address text. Jonesy -- Marvin L Jones | jonz | W3DHJ | linux 38.24N 104.55W | @ config.com | Jonesy | OS/2 * Killfiling google & XXXXbanter.com: jonz.net/ng.htm -- PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php