Software, your way.
How To Get Good Custom Software
(Download)
(PDF)
burger menu icon
WillMaster

WillMasterBlog > Content Protection

FREE! Coding tips, tricks, and treasures.

Possibilities weekly ezine

Get the weekly email website developers read:

 

Your email address

name@example.com
YES! Send Possibilities every week!

Harvestable Email Addresses

This 6-line PHP script was designed for two purposes:

  1. To test your web pages for vulnerable email addresses.

  2. To show how vulnerable web pages are to email harvesting robots by demonstrating how very little code is required.

The script to recognize harvestable email addresses requires PHP to be configured so http://... URLs can be used with function file_get_contents(). Many, if not most, PHP installations are configured accordingly.

Some harvesting robots are likely to be more sophisticated and may find email addresses where this script does not — email addresses broken up and reassembled with JavaScript, for example. In other words, if an email address isn't found with this script, it may still be found by other robots.

Here's the script:

<?php
$URL = "http://example.com/webpage.html";
preg_match_all('/[a-zA-Z0-9\-\_\.]+@[a-zA-Z0-9\-\_\.]*[a-zA-Z0-9][a-zA-Z0-9]/',html_entity_decode(rawurldecode(file_get_contents($URL))),$matches);
if( count($matches) and count($matches[0]) ) { echo implode('<br>',$matches[0]); }
else { echo "No email addresses recognized at $URL"; }
?>

To use the script, follow these steps:

  1. Copy the code and replace "http://example.com/webpage.html" with the URL of your own web page.

  2. Paste the code into a new or existing PHP page and upload it to your server.

  3. Type the uploaded page's URL into your browser.

Remember, even if this script doesn't find an email address on your page, other robots may still find it.

Will Bontrager

Was this blog post helpful to you?
(anonymous form)

Support This Website

Some of our support is from people like you who see the value of all that's offered for FREE at this website.

"Yes, let me contribute."

Amount (USD):

Tap to Choose
Contribution
Method


All information in WillMaster Blog articles is presented AS-IS.

We only suggest and recommend what we believe is of value. As remuneration for the time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.

Recent Articles in the Library

Keeping Image Location Secret

The URL of an image embedded in a web page may be kept secret.

Easier Reading of JSON Data

For easier reading of JSON data, convert the JSON into an array.

Fixed Position Image

Position an image within a browser window that won't move even with page scroll.

Visually Centering Images

Sometimes an image that is technically centered doesn't look quite centered when viewed.

Cookie Directory Protection

Protecting subdirectories with a cookie can be an especially good method when access needs to be allowed from various internet connections.

Check SSL Certificate

An easy-to-use SSL checker to see when your secure certificate expires.

Strong Form Protection From Bots

A web page form that is invisible to spam bots.

How Can We Help You? balloons
How Can We Help You?
bullet Custom Programming
bullet Ready-Made Software
bullet Technical Support
bullet Possibilities Newsletter
bullet Website "How-To" Info
bullet Useful Information List

© 1998-2001 William and Mari Bontrager
© 2001-2011 Bontrager Connection, LLC
© 2011-2024 Will Bontrager Software LLC