| 3:02 pm on Feb 20, 2001 (gmt 0)|
var visname = "John Doe";
var recip01 = "johndoe";
var dom02 = "hotmail.com";
document.write("<a href=" + "mail" + "to:" + recip01 + "@" + dom02 + ">" + visname + "</a>")
Has anyone tried js to set the recipient address on an online form?
| 4:05 pm on Feb 20, 2001 (gmt 0)|
I tried this for forms [webmasterworld.com]
| 5:34 am on Feb 21, 2001 (gmt 0)|
Not sure how effective this is, but I read somewhere that the harvesters weren't partial to the numeric HTML entities such as those in the ISO Latin-1 character set.
So, instead of using something like this:
You just use this:
<a href="& # 1 0 9 ; & # 9 7 ; & # 1 0 5 ; & # 1 0 8 ; & # 1 1 6 ; & # 1 11 ; & #5 8 ; & # 1 0 9 ; & # 1 2 1 ; & # 6 4 ; & # 1 0 1 ; & # 1 0 9 ; & # 9 7 ; & # 1 0 5 ; & # 10 8 ; & # 46 ; & # 9 9 ; & # 1 1 1 ; & # 1 0 9 ; " > & # 1 0 9 ; & # 1 2 1 ; & # 6 4; & # 1 0 1 ; & # 1 0 9 ; & # 9 7 ; & # 1 0 5 ; & # 1 0 8 ; & # 4 6 ; & # 9 9 ; & # 1 1 1 ; & # 1 0 9 ;</a>
I had to add spaces between the above code because these forums were translating the ISO Latin-1 characters as plain text. Not even the code tag helped...
Browsers read it the same as plain text HTML, but it wouldn't be picked up by harvesters.
| 7:23 pm on Feb 21, 2001 (gmt 0)|
It would seem you could just replace a couple of characters out of the email address:
username& # 64;domainname& # 46;com (unicode for @ and .)
That's what I do on one site to prevent harvesting.
| 6:05 am on Mar 25, 2001 (gmt 0)|
Ican tell that ISO thing replacement isn't working. Spammers just laugh at it. It's easier than you think to convert it back and I am sure it is implemented in their new harvesters. I have samples on my page @:
script is a couple lines and it converts back and forth. I also have some simple stripping script there.
In my opinion it time to fight hard against spam companies that host those stupid buyers of the mail list and make it impossible to conduct business for them. Too many people fall for their "great opportunuty" sloagan and if they're stopped - next time they'll think twice before buying into the whole deal.
| 11:29 pm on Dec 15, 2001 (gmt 0)|
I have long decided to not try and outsmart the email harvesters. So I dont bother with emails on my website.
But for mailing lists and websites that require email to enter their sites I doo one thing.
Since I administer my mail server I can make as many aliases as I want. I started a year ago creating a serialized email to use at these sites. f.i. email@example.com for amazon, firstname.lastname@example.org for yahoo groups, etc... All are aliases for my real email that is email@example.com
Then when I get a spam through one of them I send a heated abusive letter to the company that got that email. (Knowing that I only used that email there). And normally I do a whois tracert and CC (so the site admins can see the CC) to the abuse@ their ISP/network providers.
Usually works like a charm. Caught quite a few sites that have "lent" my email address without asking me.
| 5:04 am on Dec 16, 2001 (gmt 0)|
I traced a spam back and went to thier web site. They, of course, didn't have any Email addresses on the site, only an information request form. So I sat for about a half hour and just kept submitting the form with the message "How do you like me wasting your bandwidth with information you don't want. Spam me again and I'm sure I can find a lot of people to do this with me." Never heard from them again. :)
| 6:19 am on Dec 16, 2001 (gmt 0)|
Try using visualwares, visualroute [visualware.com]. Great for getting detailed information about a host, including their network provider and more. whois/arp contact data etc..
I only use this nowadays when I want some detail on a specific IP.