decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Whew! | 343 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Sorry, should have bolded changes
Authored by: Anonymous on Thursday, June 20 2013 @ 12:16 AM EDT
5. A method according to claim 4, wherein said decoding step does not automatically retrieve the data from the predetermined location when a user decodes the message because the user forbids the retrieval of the data corresponding to the URL.
Achieved by a simple check box in the Preferences, designed to thwart the application's natural behaviour, as described by PolR, and found by me under Corrections after I'd first posted.

[ Reply to This | Parent | # ]

Spammers and phishers stopped my infringment long ago
Authored by: globularity on Thursday, June 20 2013 @ 02:51 AM EDT
html email is such an opportunity for deception it was turned off sometime in
2000. Plain text with all headers makes phishing very difficult. It is a pity
modern mail servers have so much junk to the headers,

---
Windows vista, a marriage between operating system and trojan horse.

[ Reply to This | Parent | # ]

A patent work around - you criminal you
Authored by: Anonymous on Thursday, June 20 2013 @ 08:18 AM EDT

At least, that's been the opinion of some who post here who are quite pro-patent:

    If someone works around a patent it's deliberate evasion - a wrong-doing!
Of course, we keep pointing out that's perfectly legal....

I've got my email arriving in text format as well - for security purposes. I'm just as evil for deliberately avoiding the patent I never knew was granted.... shucks!

RAS

[ Reply to This | Parent | # ]

Whew!
Authored by: Anonymous on Thursday, June 20 2013 @ 06:56 PM EDT
It used to be the default in most mail clients I have used that remote images and resources were not automatically downloaded.

That's an anti-spam and anti-tracking measure. The default used to be to automatically download attachments. Spammers would put their messages into images and send those as links to the attachments on their servers. This also told them that your e-mail address was active, as they would know when you downloaded the attachments.

It was also used by people who wanted to know if you read their e-mail. They would send a 1 pixel "image" with a unique name. If you opened the e-mail, your client would download the image from their server, and that event would be logged.

Current practice in modern e-mail clients is to making downloading resources which link to another server (e.g. not direct in-line attachments), happen only if you ask for them.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )