473,387 Members | 1,575 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

PHP and Protecting Email

Jim
I have contact info including email address in MySQL. If I use php to
extract them into online directory, can a spambot harvest the address? or
does the spambot read the raw php code?

I previously used javascript to hide my email addresses but more and more
people are disabling javascripting for security reasons. I need to find a
way to keep my email address from being harvested.

Does encoding the email with Ultimate Mailto (hex and dec code) help?

How can I protect the emails in MySQL when they are displayed on a page?

Thanks

Jul 17 '05 #1
2 2443
"Jim139" wrote:
I have contact info including email address in MySQL. If I use php to extract them into online directory, can a spambot harvest the address? or
does the spambot read the raw php code?

I previously used javascript to hide my email addresses but more and more
people are disabling javascripting for security reasons. I need to
find a
way to keep my email address from being harvested.

Does encoding the email with Ultimate Mailto (hex and dec code) help?
How can I protect the emails in MySQL when they are displayed on a
page?

Thanks


spambot is not going to read php, and is only going to read the html
rendered page.

The rest of your question really does not pertain to a php newsgroup,
and you should be able to find your answer elsewhere. In my case, I
hide it behind a button and a text box. A certain text string has to
be inserted in the text box, and the button pushed until the email
address becomes visible. Something beyond the reach of a bot.

There are also many other solutions.

--
http://www.dbForumz.com/ This article was posted by author's request
Articles individually checked for conformance to usenet standards
Topic URL: http://www.dbForumz.com/PHP-Protecti...ict130515.html
Visit Topic URL to contact author (reg. req'd). Report abuse: http://www.dbForumz.com/eform.php?p=435421
Jul 17 '05 #2
>I have contact info including email address in MySQL. If I use php to
extract them into online directory, can a spambot harvest the address? or
does the spambot read the raw php code?
Clients do not read raw php code. The server won't send it.
(Unless you manage to break PHP, e.g. briefly while upgrading it,
or misconfigure it, e.g. naming a PHP script foo.pjp, which the
server treats as text.) If you're concerned about harvesting
email addresses, also worry about your database password, which
could give away the mother lode of spam targets.

If the email address is sent to a client, you can assume that a
spambot *WILL* harvest it, unless you limit access to that page to
a small group of trusted people with passwords or some other
authentication method. The mere idea of having an "online directory"
invites spam.
I previously used javascript to hide my email addresses but more and more
people are disabling javascripting for security reasons. I need to find a
way to keep my email address from being harvested.
Javascript is nearly worthless for hiding email addresses from
spambots (aside from the fact that it is Turned Off(tm) and a
Security Hole(tm)). Spambots likely just do a regular-expression-match
on email addresses in amongst the HTML and Javascript code; they
don't actually bother to format any of it, much less run any
Javascript. (If it shows up looking like an email address with
View Source, it's vulnerable). Whether or not actual people with
browsers run Javascript is not very relevant here. They aren't
your main threat. However, if you ARE worried about them, remember
that cut 'n paste or eyeball-and-keyboard can harvest stuff designed
to be 'bot-proof.
Does encoding the email with Ultimate Mailto (hex and dec code) help?
I don't know what this is.
How can I protect the emails in MySQL when they are displayed on a page?


If they are displayed on a page, anyone who can view that page
can harvest them. The solutions are (a) DON'T display them, or
(b) severely limit who you display them to. One approach is to
only display email addresses the user already knows (his own).

One possibility is to render the email address into an image
using an unusual font (say, the Kidnap font) and transfer it
as an image. That's still vulnerable if any spammer manages
to convince one of your people with access to transcribe it
for them with promises of $$$.

Gordon L. Burditt
Jul 17 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

24
by: Yang Li Ke | last post by:
Hi guys! Anyone know a way so that users purchasing my scripts would not be able to share them with other people ? Yang
12
by: Roland Hall | last post by:
I read Aaron's article: http://www.aspfaq.com/show.asp?id=2276 re: protecting images from linked to by other sites. There is a link at the bottom of that page that references an interesting...
3
by: netsurfer | last post by:
hi..I'm working on a project that requires files to be password protected on a UNIX based site. The people that own the web site want to be able to change the password every so often. ...
7
by: Shawn | last post by:
Hi. I have a folder that contains a lot of different documents. xls, .doc, .pdf etc. Different users have access to different documents. The problem is that if a user knows the name of a...
0
by: Mark Stokes | last post by:
Hi there, I am currently writing a webmail client in asp.net with C#. I currently support HTML email bodies, but badly formed HTML can cause problems with the rest of my page. Of course, I...
8
by: Iain Napier | last post by:
I'm in the middle of developing a website with a downloads section. It's a wad of educational software for an LEA which for obvious reasons needs password protecting. Users have to authenticate...
21
by: solomon_13000 | last post by:
I am using ms access database and asp 3.0 as my front end. In my database there is a table called account and a field called password. How do I protect the password stored in the database.
16
by: rogerjames1 | last post by:
How would I go about protecting a whole directory, e.g. http://www.example.com/members/ and all sub-directories with login protection? I wouldn't like to put a .php script in each directory and...
1
by: =?Utf-8?B?S2xhdXMgSmVuc2Vu?= | last post by:
Hi I have in the past had succes with protecting pdf-files from download by unauthenticated users by adding an application extension in IIS and mapping pdf.files to be served by the...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.