I've seen on some websites that email address are "hidden" and protected from
"spam bots". I've inquired how this is done in HTML and ASP newsgroups, but
nobody seems to know... or answer. This is probably not the right newsgroups
either, but can someone point me in the right direction (or if they know)
advise how this is done?
Thanks, 2 1648
"charliewes t" <ch*********@di scussions.micro soft.com> wrote in message news:45******** *************** ***********@mic rosoft.com... I've seen on some websites that email address are "hidden" and protected from "spam bots". I've inquired how this is done in HTML and ASP newsgroups, but nobody seems to know... or answer. This is probably not the right newsgroups either, but can someone point me in the right direction (or if they know) advise how this is done? Thanks,
There are several ways to do it, but I use javascript. Here is the code I use, which I found on someone else's site:
<a href="../tmpl/admin/mail.htm" onmouseover="th is.href='mai' + 'lto:' + 'vagabondia' + '@' + 'san.rr.com'">C ontact Webmaster</a>
Here is the what it looks like on a web-page: http://home.san.rr.com/vagabondia/admin/mail.htm
This is a test site and still under construction, but the email obfuscation works.
carl This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Paminu |
last post by:
In math this expression:
(a < b) && (b < c)
would be described as:
a < b < c
But why is it that in C these two expressions evaluate to something
different for the same values of a, b and c?
|
by: hsuntn |
last post by:
I am grabbing Outlook MailItems using the Items property on my
Outlook inbox. When I iterate through them, I notice that they are
not ordered in ReceivedTime or CreationTime order. For example,
Items.ReceivedTime is April 2005
Items.ReceivedTime is May 2005
Items.ReceivedTime is October 2005
Items.ReceivedTime is June 2005
I did some experiments and the following seems to explain how
|
by: Claude |
last post by:
Hi,
I've designed my own form checking code for name, address, email, comment
box etc.
What my client keeps getting in his consumer feedback forms is "spam" from
companies who
repeatedly insert their hyperlinks in all fields, of course along with their
"hype"...
Is is possible with Javascript to refuse form contents whose strings contain
|
by: Frank |
last post by:
I am attempting to develop a solution where I handle bounced e-mails.
I wish to field all bounced emails in a custom email account such a
bounced@mycompany.com
From the aricle at http://www.systemwebmail.com/faq/2.7.aspx, I gather I
could use:
mail.Headers.Add( "Reply-To", "alternate_email@mycompany.com" );
When I test this from a test web app, I don't seem to field a bounced email
|
by: Jason |
last post by:
I'm troubleshooting a program that I didn't build, so forgive me on
this one. It's called email.php, and it looks like a program that the
original developer must have downloaded from somewhere.
The part of the program that sends an email states this:
$headers = 'MIME-Version: 1.0' . "\r\n";
$headers .= 'Content-type: text/html; charset=iso-8859-1' . "\r\n";
// Additional headers
if (isset($_REQUEST)){ $headers .= 'Bcc: '.$bcc....
| |
by: 2Barter.net |
last post by:
Date: Jul 8, 2007 9:50 AM
Subject: Faith is like?
To: http://video.google.com/videoplay?docid=-6593906684323060189
Cc: http://www.youtube.com/watch?v=1tCUeAAK9fg
Bcc: http://www.youtube.com/watch?v=-UeYkxePW2c
This is...
" Working in Faith "
Enjoy your first Net Casting Company
with " VISION "
Were if it is not good news then it is not news to?
|
by: elias.farah |
last post by:
Hello Everyone,
I'm having some very weird behavior on a couple of Access forms. (Not
all forms, just some of them).
The forms have been working for years, under Access XP/2003 etc, and
last week upgraded from Windows XP/Office 2003 to Vista x64/Office
2007.
Under Access 2007, a couple of forms are now taking 60 seconds to
|
by: Mathieu Maes |
last post by:
Hello everyone,
I have created a simple guestbook for my bandsite (http://www.thefirm-
online.be). As you might expect, some spambots have jumped on it as
soon as it went online. At the moment, I've put the following measures
in place:
- Protection against XSS attacks, SQL injections, etc...
- Check the IP address - if the origin is abroad, the post is inactive
and needs approval by a moderator (me).
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |