473,387 Members | 3,810 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

can open email tracking be trusted ?

hi !

I use to track ( with an image with id attached to its link ) the
opening of some html messages ( don't worry I am not a spammer,they are
newsletters sent to the salesforce ).
Today I received a reply from one of the recipients who told me he just
read today my email 'cause he now uses a different mail address while I
knew he read it 2 weeks ago.
My question is : did he just lie to me or using an image within the
body of the message is not such a good method ?
I know that messages could be read offline or with images turned off so
there could be more readers than the ones actually tracked, but this is
the opposite case.
I wonder how the tracking showed me the opening of the email if he
didn't use that account...

what do you think ?

johnny

Jul 17 '05 #1
1 2564
>I use to track ( with an image with id attached to its link ) the
opening of some html messages ( don't worry I am not a spammer,they are
newsletters sent to the salesforce ).
Today I received a reply from one of the recipients who told me he just
read today my email 'cause he now uses a different mail address while I
knew he read it 2 weeks ago. My question is : did he just lie to me or using an image within the
body of the message is not such a good method ?
Some virus scanners (on mail servers, among other places) have the
ability to fetch links and images and scan those, so they can
eliminate emails with links to viruses. These will generate false
"mail has been read" hits.

Outlook may generate hits for email displayed in the preview pane
without anyone actually looking at it or clicking on it. In this
way, Outlook can catch viruses unattended with nobody operating the
mouse. I think Microsoft considers this to be a feature.
I know that messages could be read offline or with images turned off so
there could be more readers than the ones actually tracked, but this is
the opposite case.
I wonder how the tracking showed me the opening of the email if he
didn't use that account...

what do you think ?


If I catch trackers in email sent to me, your email address and probably
IP netblock goes into spam filter blacklist.

Gordon L. Burditt
Jul 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

188
by: Ilias Lazaridis | last post by:
I'm a newcomer to python: - E01: The Java Failure - May Python Helps? http://groups-beta.google.com/group/comp.lang.python/msg/75f0c5c35374f553 - I've download (as suggested) the python...
0
by: Unigroup of New York | last post by:
Content-Type: multipart/mixed; boundary="------------C465DF38DCB38DD2AF7117E0" Lines: 327 Date: Tue, 15 Feb 2005 23:36:38 -0500 NNTP-Posting-Host: 24.46.113.251 X-Complaints-To: abuse@cv.net...
19
by: Albretch | last post by:
Hi, client wants for a window with no toolbars to open (technical and 'esthetical' reasons) after the window, user clicks on, is being closed. I told them about security settings in browsers...
3
by: NeverLift | last post by:
But, if it's not open, I don't want to open it . . . using window.open will open it if it doesn't exist, even if the url in that open is null (the window is then empty -- but it's open). The...
7
by: Ben Amada | last post by:
Hi ... I have an HTML page containing a bunch of <alinks. Some of the links redirect the visitor to a page at a different website in a new browser window (target=_blank) and other links are...
5
by: colin | last post by:
Hi, Im looking for an open source http/web proxy server hopefully in c# there seems to be quite a few in python or java, but not come acros one in c# yet. is there anything around ? I wouldnt...
23
by: andyoye | last post by:
How can I launch Outlook on users machines when they click a button on a web form (InfoPath)? Thanks
0
by: trixxnixon | last post by:
i have a form that is being designed to pend requests in a requests database. the pend form is opened from an update form used by an employee to enter updates. when the pend form is updated, the...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.