Here is a puzzle ……. The following quote is the “source code for an email massage that, when viewed, looks like the print out attached. I get at least two of these per day and because the text is fragmented, i..e. broken into pieces, in the source, and then reassembled or somehow made to appear correctly assembled in the mal view, my junk filters are not effective. There are simply no “keys” to trigger the filter. Can you or your team figure out how this scam message works and a way to defeat the onslaught of junk generated by the methodology?
QUOTE
function popupPrint(){
var print_win_param = ‘width=750,height=500,resizable=1,scrollbars=1’;
var action = “http://mail.pcdco.com/cgi-bin/” + “viewmail.exe”;
var id = “id=01de2e7d63007858d0dc3128080267ea8615”;
var threadid = “threadid=H343792243339910”;
var xsl = “xsl=preview.xsl”;
var url = action + “?” + id + “&” + threadid + “&” + xsl + “&ftl=”;
var print_win = window.open(url,””,print_win_param);
print_win.focus();
}
Retrieving E-mail
Please wait a moment while we retrieve your e-mail….
|
UNQUOTE