473,395 Members | 1,623 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

How to prevent spamming without using a recaptcha?

ram09
45
Hi All,

I have a contact-us form in my asp.net website and I want to prevent spamming without using a recaptcha. Is there any way or technique where I can prevent people from playing/spamming in my contact-us form?

Thanks,
RAM
Nov 10 '09 #1
2 1803
tlhintoq
3,525 Expert 2GB
Just some wild guesses from way outside the field...

Random questions like "What is 2 x3?"... Serving the same purpose by making the user have to read and respond with thought.

In some way have the contact-us page be generated at a new URL every time someone clicks "contact-us".. that way a bot can't latch onto one address?

Can most spam-bots handle drop-down selections? If readers have to select criteria for contacting from drop downs it is easier for them and might block bots. ???? "Department : Sales, shipping, payroll", "Reason: New customer, lost order, feedback"
Nov 10 '09 #2
ram09
45
Hi tlhintoq,

Yup my contact us form is in a different url, as well as my thank you page for the contact us form.

Here is how my contact us form works.
A user will input his/her name, his/her email address, and his/her message for us.
In my form, I also have a dropdown that contains a subject. Because the users must choose a subject depending on the concern that they want to raise. Each of the subjects will be sent to a corresponding recipient in my site. I am just worried that a user may fill-up my form, and click back then send over and over.

I am wondering if there mite be a script or something for this case. =)

Thanks for the quick answer. I appreciate it much.

Thanks,
RAM
Nov 12 '09 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: Brian Mitchell | last post by:
How do I prevent other people from using the dll's I create? I looked at identity permissions but it looks like those are more for identifying an assembly. Any help would be great. Thanks!!
20
by: modemer | last post by:
Question is as in subject. For example: class BaseClass { public: void func() { do something; } // I don't want this function being overloaded in its inherited class };
9
by: Daniel Walzenbach | last post by:
Hi I am faced with the following problem: I have a page (let’s call this page page1.aspx) containing some TextBoxes and a hyperlink which opens another page (let’s call this page page2.aspx)...
9
by: Larry Woods | last post by:
I have a method in my base class that I want ALL derived classes to use. But, I find that I can create a "Shadow" method in my derived class that "overrides" the method in my base class. Can't...
12
by: Claude | last post by:
Hi, I've designed my own form checking code for name, address, email, comment box etc. What my client keeps getting in his consumer feedback forms is "spam" from companies who repeatedly...
2
by: sukeshchand | last post by:
How to prevent changes in textbox when we use Ctrl+V or Paste using mouse without effecting the previously stored values in the text box. I want to Prevent the changes in the textbox by using...
1
by: dineshkaku | last post by:
Does anyone know any codes for live validation of the recaptcha? My registration process is full of live validations and the register buttin does not get activated unless all fields are error free....
3
by: KHurst | last post by:
How do I get rid of reCaptcha fields that are emailed when I submit a form? I guess what I am asking is how do you exclude unwanted fields from being posted to email from a form in PHP? Thanks,...
1
by: Subcomandante | last post by:
Hi, Did anyone try and succeeded to defeat reCAPTCHA script?
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.