Visit Our UNIX and Linux User Community


I need help with contact form


 
Thread Tools Search this Thread
Special Forums Cybersecurity I need help with contact form
# 1  
Old 09-27-2009
I need help with contact form

How can I change my email address from text into an image? Someone told me that this way it won't be picked up by spam bots and it will reduce spam.

---------- Post updated 09-27-09 at 12:57 AM ---------- Previous update was 09-26-09 at 10:53 AM ----------

---------- Post updated at 12:58 AM ---------- Previous update was at 12:57 AM ----------

I already found contactmeform , so I placed a contact form instead... My email address is not visible anywhere now, so zero spam Smilie

Previous Thread | Next Thread
Test Your Knowledge in Computers #640
Difficulty: Medium
After the purchase of NeXT by Apple, NeXT became the source for macOS, iOS, watchOS, and tvOS.
True or False?

5 More Discussions You Might Find Interesting

1. Web Development

Contact Form for Download

Hi all, My skills in Web Development are shaky at best. What I want to do is have a simple form on my website. User puts in name & email address -> verification email is sent to them to make sure it is really there email. After this is confirmed, I want to send them a secure download like to... (1 Reply)
Discussion started by: fedora18
1 Replies

2. Shell Programming and Scripting

Remove x lines form top and y lines form bottom using AWK?

How to remove x lines form top and y lines form bottom. This works, but like awk only cat file | head -n-y | awk 'NR>(x-1)' so remove last 3 lines and 5 firstcat file | head -n-3 | awk 'NR>4' (5 Replies)
Discussion started by: Jotne
5 Replies

3. Shell Programming and Scripting

Transpose Data form Different form

HI Guys, I have data in File A.txt RL03 RL03_A_1 RL03_B_1 RL03_C_1 RL03 -119.8 -119.5 -119.5 RL07 RL07_A_1 RL07_B_1 RL07_C_1 RL07 -119.3 -119.5 -119.5 RL15 RL15_A_1 RL15_C_1 RL15 -120.5 -119.4 RL16... (2 Replies)
Discussion started by: asavaliya
2 Replies

4. UNIX for Advanced & Expert Users

Changing Unix form to Microsoft Word form to be able to email it to someone.

Please someone I need information on how to change a Unix form/document into a microsoft word document in order to be emailed to another company. Please help ASAP. Thankyou :confused: (8 Replies)
Discussion started by: Cheraunm
8 Replies

5. Post Here to Contact Site Administrators and Moderators

Contact Us ???

My Contact Us link at the bottom takes me to the Search screen, not a contact screen. How do I contact an administrator? This web site stopped recognizing me as the registered user jimbo a week or two ago. I have been an active daily user for months until a week or two ago. I reregistered... (3 Replies)
Discussion started by: jimbo3
3 Replies
BMF(1)																	    BMF(1)

NAME
bmf - efficient Bayesian mail filter SYNOPSIS
bmf [-t] [-n] [-s] [-N] [-S] [-f fmt] [-d db] [-i file] [-k n] [-m type] [-p] [-v] [-V] [-h] DESCRIPTION
bmf is a Bayesian mail filter. In its normal mode of operation, it takes an email message or other text on standard input, does a statisti- cal check against lists of "good" and "spam" words, registers the new data, and returns a status code indicating whether or not the message is spam. BMF is written with fast, zero-copy algorithms, coded directly in C, and tuned for speed. It aims to be faster, smaller, and more versatile than similar applications. bmf supports both mbox and maildir mail storage formats. It will automatically process multiple messages within an mbox file separately. OPTIONS
Without command-line options, bmf processes the input, registers it as either "good" or "spam", and returns the appropriate error code. The wordlist directory and nonexistent wordfiles are created if absent. -t Test to see if the input is spam. The word lists are not updated. A report is written to stdout showing the final score and the tokens with the highest deviation form a mean of 0.5. -n Register the input as non-spam. -s Register the input as spam. -N Register the input as non-spam and undo a prior registration as spam. -S Register the input as spam and undo a prior registration as non-spam. -f fmt Specify database format. Valid formats are text, db, and mysql. Text is always valid. The others may not be available if the corre- sponding option was not enabled at compile time. The default is db if available, else text. -d db Specify database or directory for loading and saving word lists. The default is ~/.bmf in text mode. -i file Use file for input instead of stdin. -k n Specify the number of extrema (keepers) to use in the Bayes calculation. The default is 15. -m fmt Specify mail storage format. Valid formats are mbox and maildir. The default is to automatically detect the mail storage format. This option is deprecated. -p Copy the input to the output (passthrough) and insert spam headers in the style of SpamAssassin. An X-Spam-Status header is always inserted with processing details. The contents of this header always begin with either "Yes" or "No". If the input is judged to be spam, the header "X-Spam-Flag: YES" is also inserted. -v Be more verbose. This option is not well supported yet. -V Display version information. -h Display usage information. THEORY OF OPERATION
bmf treats its input as a bag of tokens. Each token is checked against "good" and "bad" wordlists, which maintain counts of the numbers of times it has occurred in non-spam and spam mails. These numbers are used to compute the probability that a mail in which the token occurs is spam. After probabilities for all input tokens have been computed, a fixed number of the probabilities that deviate furthest from aver- age are combined using Bayes's theorem on conditional probabilities. While this method sounds crude compared to the more usual pattern-matching approach, it turns out to be extremely effective. Paul Graham's paper A Plan For Spam: http://www.paulgraham.com/spam.html is recommended reading. bmf improves on Paul's proposal by doing smarter lexical analysis. In particular, hostnames and IP addresses are not discarded, and certain types of MTA information are discarded (such as message ids and dates). MIME and other attachments are not decoded. Experience from watching the token streams suggests that spam with enclosures invariably gives itself away through cues in the headers and non-enclosure parts. Nonetheless, I would like to add the ability to decode quoted-printable and perhaps base64 encodings for textual attachments. INTEGRATION WITH OTHER TOOLS
Please see the /usr/share/doc/bmf/README.gz for samples and suggestions. RETURN VALUES
In passthrough mode: zero for success, nonzero for failure. In non-passthrough mode: 0 for spam; 1 for non-spam; 2 for I/O or other errors. FILES
~/.bmf/goodlist.txt List of good tokens for text mode. ~/.bmf/spamlist.txt List of bad tokens for text mode. ~/.bmf/goodlist.db List of good tokens for libdb mode. ~/.bmf/spamlist.db List of bad tokens for libdb mode. BUGS
Only one copy of bmf(1) instance can access the database (see options -d and -f). In Procmail recipes, ensure sequential access with a lock file: :0 fw: bmf.lock | bmf -p The lexer does not recognize multiline headers. The lexer does not recognize MIME attachments. Content-Transfer-Encoding is not decoded. AUTHOR
Tom Marshall <tommy@tig-grr.com>. The Bayes algorithm is from bogofilter by Eric S. Raymond <esr@thyrsus.com>. bogofilter can be found at the bogofilter project page: http://bogofilter.sourceforge.net/. BMF(1)

Featured Tech Videos