If I'm not mistaken, Kurt Wismer addressed this yesterday, in another
post. Essentially, executable code (scripting language) can be embedded in
an email and you run the *risk* of executing it, which in turn could
install other, malicious code, through OE's use of IE's html engine. At
the very least, you should place your mail client in IE restricted zone,
make sure that zone is set to high security, disable OE's preview pane and
patch your system with all of the XP critical patches. Obviously, if
you're very judicious about what mail you open and from whom, your risk
can be mitigated.
And adding to the security side... consider the following:
<img
src="
http://spam-scum.com/spam-run-1/who-opened-mail.php?id=muppet0001
/>
You open the mail.. do nothing and delete it as it's spam.
Joe-scum comes along in the evening and checks his database...
"oh, muppet0001!! add mail address to 'good addresses' list"
So you don't even have to verify by clicking the "unsubscribe link" if
applicable (not that they work normally anyway).. but in the database,
Joe-scum will have something like:
+------------------------------------------+
| ID | mail_address |
+------------------------------------------+
| muppet0001 | (e-mail address removed) |
+------------------------------------------+
So now Joe-scum knows that you opened his shitlet and that your address is
valid (ok, obviously there are exceptions with aliases etc.. but in
general.........). If the logs are checked or the receiving page has more
detailed code to get the '/spam-run-1/' directory too.. then Joe-scum also
knows exactly _what_ mail you opened too (ie: pills.. pr0n.. mortgage...
etc) This technique is often known as a "web-bug".
Regards,
Ian