bookmark this page - make qweas your homepage | ||
Help Center - What's New - Newsletter - Press | ||
Get Buttons - Link to Us - Feedback - Contact Us |
Home | Download | Store | New Releases | Most Popular | Editor Picks | Special Prices | Rate | News | FAQ |
|
Email Cloaker for Web 1.21 - User Guide and FAQScreenshots - More DetailsSpam Protection Methods 1. XInbox.com Unbreakable HTML Cloak When this protection method is used, your email address is not specified in HTML code in any way. Instead, it is registered at the free service http://XInbox.com only once. This service creates a special page with a Contact Form on it for your email address. Those who want to contact you can use this page even without a mail client. It is recommended to use this method for protecting all your email addresses. Besides, try not to specify your email address in its plain form anywhere. Instead, give the link to your Contact Form at XInbox wherever possible. 2. Advanced Javascript Cloak When this protection method is used, the e-mail address is divided into parts and encrypted. It is decrypted directly in the browser window when the page is opened. This protection method is effective against most software collecting e-mail addresses, but the Internet browser must support Javascript to be able to display an address encrypted in such a way. Nevertheless, all modern browsers currently support it so we recommend that you use this method to protect addresses you are afraid to encrypt with the XInbox Unbreakable protection method. 3. Simple Html Cloak When this protection method is used, all characters in the e-mail address are replaced with their codes, which helps to keep your address in secret from a lot of software that collect addresses for spamming. However, this method is not effective enough. The unquestionable advantage of this protection method is that an e-mail address encrypted in such a way will be correctly displayed in all modern browsers with any security settings. That is why it is recommended to apply such encryption to all addresses you are afraid to protect with other methods. Screenshots - More Details |
Search -
Download -
Store -
Directory -
Service -
Developer Center
© 2006 Qweas Home - Privacy Policy - Terms of Use - Site Map - About Qweas |