Embedded http links to images |
Post Reply ![]() |
Author | |
fclass ![]() Guest Group ![]() |
![]() ![]() ![]() ![]() ![]() Posted: 13 September 2004 at 12:47pm |
Is there a way to block emails that have no real text, just images that are pulled in from embedded html code referencing them. This is the majority of spam messages that are getting through the spam filter. Thanks.... |
|
![]() |
|
LogSat ![]() Admin Group ![]() ![]() Joined: 25 January 2005 Location: United States Status: Offline Points: 4105 |
![]() ![]() ![]() ![]() ![]() |
This is something very hard to do, as the emails will usually do
contain some minimal text, and blocking on that feature alone could
potentially introduce too many false positives.
Roberto F. LogSat Software |
|
![]() |
|
fclass ![]() Guest Group ![]() |
![]() ![]() ![]() ![]() ![]() |
There is usually no text at all. It is just images that get loaded via html referencing them from an offsite location. Will the SpamFilter look for words in the html or does it only look at normal body text? Could I put the image name it is referencing in the keywords or attachments list and block it? Thanks... |
|
![]() |
|
LogSat ![]() Admin Group ![]() ![]() Joined: 25 January 2005 Location: United States Status: Offline Points: 4105 |
![]() ![]() ![]() ![]() ![]() |
James,
SpamFilter looks at the original source of the email when scanning for keywords. It will scan all text text body parts of the email, so it will look in the html source for any tags you wish. Please note that some email clients, notably MS Outlook, completely change the email's content when presenting it to the user. Even if you choose to "View Source" form their GUI, that will be usually completely different from the original email's source. Roberto F. LogSat Software |
|
![]() |
|
fdickey ![]() Guest Group ![]() |
![]() ![]() ![]() ![]() ![]() |
I usually add the domains in the URL's referenced within the HTML code to my keywords black list. Some of these types of email appear to be from the same source (advertising with the exact same image only with a different file name each time) and appear to be using randomly generated domain names with random IP sources and from addresses, meaning they are most likely coming from zombie systems, systems infected with some sort of spyware/mass mailer worm being remote controlled by spammers. With a lot of these, they appear to have the same or similar subject lines. Also, I recently added "unsubscribe.php" and a few other commonly referenced php files to my black list in an attempt to thwart these types of spam that seem to be making it through. The adult stuff is the most worrisome as we pay particular attention to any of that slipping through to our business clients. |
|
![]() |
Post Reply ![]() |
|
Tweet
|
Forum Jump | Forum Permissions ![]() You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You cannot vote in polls in this forum |
This page was generated in 0.180 seconds.