No code.
You receive an HTML message.
In the HTML it includes <img
src=http://someIP/TrackingImages/SomeUniquelyGeneratedImageName.Gif>
The Gif file is probably a blank image and can be generated by the
server.  The fact that the image is requested - because the client tries
to pull it from the Internet to display it is tracked and because the
name of the file is unique to the recipient they then know that emnail
address to be active.  Unfortunately, unlike other distinctions in your
IE settings this setting cannot be associated with your security zone.
So, you don't have the option to view images in Internet Explorer when
viewing sites in your Internet zone, but not in email when viewing from
your Restricted Sites Zone.

Since you are using scanning software, perhaps you could strip <img>
tags from HTML email, but this might render some newsletters unreadable.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of RBHATIA
Sent: Thursday, March 20, 2003 10:22 AM
To: Exchange Discussions
Subject: Can this happen with Spam ?


Hi,
As I try to battle the tons of spam related email my organization
receives everyday, I am amazed at the increasing number of emails
targetting our organization despite the fact that we do have a filtering
technology in place. Which brings me to the question - are we doing
something to invite these emails ? I came across an article by Brian
Livingstone recently about spam and how certain tactics can invite
spammers to your organization. I quote a statement from his article
relating to the results of an experiment they carried out at some law
firm - "They found that 83 percent of the spam being received contained
a coded "tracking" image. When the image was downloaded to be displayed
in the message, it alerted the senders that a message sent to a specific
address had been viewed. This is now the most prevalent mechanism by
which spammers find "live" accounts, in my opinion." Is this possible in
Outlook ? The article said something about with the Preview pane being
turned on in Outlook, this was more likely to happen or just opening an
email with this sort of an image in it could also trigger the code. How
can this happen ? This means Outlook is allowing some code to get
executed that passes information back to the source. Isn't there a
security patch to prevent this from happening ? RB

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]


_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to