Just be sure not to use formmail.cgi in a directory named cgi-bin: probably half my 404 traffic comes from spammers prospecting for /cgi-bin/formmail.cgi, /cgi-bin/FormMail.cgi, /cgi-bin/formmail.pl, and /cgi-bin/FormMail.pl. If I could come up with a good sticky trap for a program that thinks it’s filling out a formmail.cgi script, I’d be happy to put something there for them.
]]>mailto:
links on my sites, yet I have clickable links that will open an e-mail client in most browsers.
This is done using simple CSS and a mod_rewrite hack. The mod_rewrite hack sets a http Location: header with a mailto, something spam harvesters seem to ignore, but browsers seem to understand (Even lynx does).
]]>Some of you may have noticed that in my bio and to the right I’ve posted an obfuscated version of my e-mail address. Basically, the obfuscation is a small javascript that, when the link is clicked, causes your mail client…
]]>A few days ago I told you I had to change email addresses because I was receiving too much spam. Well, today while searching the girlie matters I found an article on spamproofing email in a website….
]]>Phil Ringnalda has a cool idea for obfuscating email addresses in a web page: he constructs the address dynamically in client script in an onmouseover handler. He credits someone else with the idea, but he’s got a nice clear example.
]]>