HP3000-L Archives

June 2002, Week 1

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Jeff Kell <[log in to unmask]>
Reply To:
Jeff Kell <[log in to unmask]>
Date:
Fri, 7 Jun 2002 12:16:09 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (29 lines)
Michel Adam wrote:
>
> ----- Original Message -----
> From: Jeff Kell <[log in to unmask]>
> >
> > ... tracking invisible GIFs ...
> >
> Is this the actual technical term for this? Any pointers as to the
> theory being these, how they operate and how one can protect himself
> from such? Like, what optimum settings in browser to defeat this
> sort of tracking...

Suppose a spammer has a huge list of unverified addresses.  They
generate a "test message" to every address, in HTML format, with
something like <img src="http://spamhost.net/verify.asp height="1"
width="1"> so that attempts to load the image cause the CGI to run.
They can add your address as the argument to the call such as
<img src="[log in to unmask]" target="_blank">http:[log in to unmask] ...>.
The CGI marks "[log in to unmask]" as valid, and kaboom, you are
now on their "verified" list.

But that is only *one* use of such tricks.  For a good scare, read
through http://www.privacyfoundation.org/resources/webbug.asp

Jeff

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2